Actually, scratch last three lines (starting from # these belong to...) and 
replace with

- subnet: 141.0.0.0/8


On Thursday, August 9, 2012 11:32:03 PM UTC+2, alex wrote:
>
> A lot of those IPs are assigned to universities, like almost literally all 
> of them. More than 50% are US universities. This really looks like a big 
> distributed bot network to me.
>
> Anyway, here you go (some IPs are from the same net block so there are 
> less than 100 entries):
>
>
> - subnet: 82.179.176.0/20
> - subnet: 83.230.96.0/19
> - subnet: 88.2.0.0/16
> - subnet: 128.10.0.0/16
> - subnet: 128.84.0.0/16
> - subnet: 128.42.0.0/16
> - subnet: 128.36.0.0/16
> - subnet: 128.111.0.0/16
> - subnet: 128.114.0.0/16
> - subnet: 128.138.0.0/16
> - subnet: 128.227.0.0/16
> - subnet: 128.208.0.0/16
> - subnet: 128.151.0.0/16
> - subnet: 128.223.0.0/16
> - subnet: 128.232.0.0/16
> - subnet: 129.10.0.0/16
> - subnet: 129.15.0.0/16
> - subnet: 129.74.0.0/16
> - subnet: 129.82.0.0/16
> - subnet: 129.93.0.0/16
> - subnet: 129.97.0.0/16
> - subnet: 129.108.0.0/16
> - subnet: 129.130.0.0/16
> - subnet: 129.237.0.0/16
> - subnet: 130.37.0.0/16
> - subnet: 130.83.0.0/16
> - subnet: 130.104.0.0/16
> - subnet: 130.216.0.0/16
> - subnet: 130.253.0.0/16
> - subnet: 130.195.4.0/24
> - subnet: 130.237.0.0/18
> - subnet: 131.179.0.0/16
> - subnet: 131.188.0.0/16
> - subnet: 132.64.0.0/13
> - subnet: 132.72.0.0/14
> - subnet: 134.151.0.0/16
> - subnet: 138.4.0.0/16
> - subnet: 138.250.0.0/15
> - subnet: 138.48.0.0/16
> - subnet: 139.165.0.0/16
> - subnet: 140.109.0.0/16
> - subnet: 143.225.0.0/16
> - subnet: 155.245.0.0/16
> - subnet: 160.80.0.0/16
> - subnet: 161.106.0.0/16
> - subnet: 192.16.124.0/22
> - subnet: 192.38.0.0/17
> - subnet: 192.41.132.0/22
> - subnet: 192.42.42.0/23
> - subnet: 193.1.0.0/16
> - subnet: 193.138.2.0/24
> - subnet: 193.196.0.0/15
> - subnet: 193.166.0.0/15
> - subnet: 193.136.0.0/15
> - subnet: 193.166.0.0/15
> - subnet: 193.204.0.0/15
> - subnet: 193.226.0.0/19
> - subnet: 194.29.176.0/22
> - subnet: 194.167.0.0/16
> - subnet: 194.254.0.0/16
> - subnet: 195.130.124.0/22
> - subnet: 203.110.240.0/24
> - subnet: 212.51.208.0/20
> - subnet: 213.73.32.0/19
> - subnet: 213.131.0.0/19
> - subnet: 136.159.0.0/16
> - subnet: 132.170.0.0/16
> - subnet: 132.181.0.0/16
> - subnet: 133.0.0.0/8
> - subnet: 203.0.0.0/8
> - subnet: 198.82.0.0/16
> - subnet: 200.0.0.0/8
> - subnet: 192.107.171.0/24
> - subnet: 140.112.0.0/12
> - subnet: 140.123.0.0/16
> - subnet: 142.103.0.0/16
> - subnet: 143.89.0.0/16
> - subnet: 139.78.0.0/16
> - subnet: 155.246.0.0/16
> - subnet: 156.56.0.0/16
> - subnet: 156.62.0.0/16
> - subnet: 157.92.0.0/16
> - subnet: 169.226.0.0/16
> - subnet: 165.91.0.0/16
> - subnet: 165.230.0.0/16
> - subnet: 192.1.0.0/16
> - subnet: 192.12.33.0/24
> - subnet: 169.229.0.0/16
> - subnet: 141.219.0.0/16
> # these belong to a too big block
> - subnet: 141.11.0.162
> - subnet: 141.20.103.211
>
>
>
> On Thursday, August 9, 2012 10:21:03 PM UTC+2, Kate wrote:
>>
>>
>> I did that but don't think it will catch them all.
>>
>> I had a list of 100 individual ones, see below. Can you recognize subnets 
>> in them?
>> blacklist:
>> - subnet: 82.179.176.44
>> - subnet: 83.230.127.124
>> - subnet: 88.2.234.60
>> - subnet: 128.10.19.53
>> - subnet: 128.84.154.45
>> - subnet: 128.42.142.44
>> - subnet: 128.36.233.154
>> - subnet: 128.111.52.59
>> - subnet: 128.114.63.64
>> - subnet: 128.138.207.45
>> - subnet: 128.227.150.12
>> - subnet: 128.208.4.198
>> - subnet: 128.151.65.101
>> - subnet: 128.223.8.112
>> - subnet: 128.232.103.201
>> - subnet: 129.10.120.194
>> - subnet: 129.15.78.30
>> - subnet: 129.74.74.20
>> - subnet: 129.82.12.188
>> - subnet: 129.93.229.139
>> - subnet: 129.97.74.14
>> - subnet: 129.108.202.11
>> - subnet: 129.130.252.140
>> - subnet: 129.237.161.194
>> - subnet: 130.37.193.143
>> - subnet: 130.83.166.243
>> - subnet: 130.104.72.213
>> - subnet: 130.216.1.22
>> - subnet: 130.253.21.123
>> - subnet: 130.195.4.68
>> - subnet: 130.237.50.125
>> - subnet: 131.179.150.72
>> - subnet: 131.188.44.102
>> - subnet: 132.65.240.100
>> - subnet: 132.72.23.10
>> - subnet: 132.170.3.32
>> - subnet: 132.181.10.56
>> - subnet: 133.1.74.163
>> - subnet: 133.15.59.2
>> - subnet: 133.68.253.242
>> - subnet: 134.151.255.181
>> - subnet: 138.4.0.120
>> - subnet: 138.251.214.78
>> - subnet: 136.159.220.40
>> - subnet: 138.48.3.202
>> - subnet: 139.78.141.245
>> - subnet: 139.165.12.211
>> - subnet: 140.109.17.181
>> - subnet: 140.112.107.82
>> - subnet: 140.123.230.248
>> - subnet: 141.11.0.162
>> - subnet: 141.20.103.211
>> - subnet: 141.219.252.133
>> - subnet: 142.103.2.2
>> - subnet: 143.89.49.73
>> - subnet: 143.225.229.238
>> - subnet: 155.245.47.225
>> - subnet: 155.246.12.163
>> - subnet: 156.56.250.226
>> - subnet: 156.62.231.244
>> - subnet: 157.92.44.101
>> - subnet: 160.80.221.39
>> - subnet: 161.106.240.19
>> - subnet: 169.226.40.2
>> - subnet:  169.229.50.15
>> - subnet: 165.91.55.8
>> - subnet: 165.230.49.115
>> - subnet: 192.1.249.138
>> - subnet: 192.12.33.102
>> - subnet: 192.16.125.11
>> - subnet: 192.38.109.144
>> - subnet: 192.41.135.219
>> - subnet: 192.42.43.23
>> - subnet: 192.107.171.145
>> - subnet: 193.1.201.27
>> - subnet: 193.138.2.13
>> - subnet: 193.196.39.9
>> - subnet: 193.167.187.185
>> - subnet: 193.136.19.13
>> - subnet: 193.166.167.5
>> - subnet: 193.205.215.74
>> - subnet: 193.226.19.31
>> - subnet: 194.29.178.13
>> - subnet: 194.167.254.19
>> - subnet: 194.254.215.12
>> - subnet: 195.130.124.1
>> - subnet: 198.82.160.221
>> - subnet: 200.0.206.137
>> - subnet: 200.0.206.168
>> - subnet: 200.17.202.195
>> - subnet: 200.129.132.19
>> - subnet: 202.23.159.52
>> - subnet: 202.125.215.12
>> - subnet: 202.237.248.222
>> - subnet: 202.249.37.67
>> - subnet: 203.110.240.190
>> - subnet: 203.178.133.2
>> - subnet: 212.51.218.235
>> - subnet: 213.73.40.106
>> - subnet: 213.131.1.101
>>
>> Thanks
>> Kate
>>
>>
>> On Thursday, August 9, 2012 2:37:48 PM UTC-4, alex wrote:
>>>
>>> well, while you're notifying planetlab and whatnot you could create and 
>>> upload a dos.yaml for the time being with a content similar to this:
>>>
>>> blacklist:
>>> - subnet: 132.65.0.0/16
>>> - subnet: 133.0.0.0/8
>>>   description: somewhere in china
>>> - subnet: 136.159.0.0/16
>>> - subnet: 138.250.0.0/15
>>> - subnet: 138.48.0.0/16
>>> - subnet: 139.165.0.0/16
>>> - subnet: 141.219.252.0/24
>>> - subnet: 193.1.0.0/16
>>>   description: planetlab
>>> - subnet: 193.136.16.0/24
>>> - subnet: 193.166.167.0/24
>>> - subnet: 195.130.124.0/22
>>> - subnet: 200.17.192.0/19
>>>
>>>
>>> - put that file in your app root dir and do something like this from a 
>>> terminal:
>>>
>>> "appcfg.py update_dos ."
>>>
>>>
>>> On Thursday, August 9, 2012 6:13:14 PM UTC+2, Kate wrote:
>>>>
>>>> They are not coming from the same IP. They are mostly in Europe but 
>>>> there are no subnets.
>>>>
>>>> There are hundreds of them and google only lets you block 100.
>>>>
>>>> eg
>>>>
>>>> 132.65.240.100 
>>>> 133.15.59.2 
>>>> 193.136.19.13 
>>>> 139.165.12.211 
>>>> 193.166.167.5 
>>>> 141.219.252.133 
>>>> 200.17.202.195
>>>> 195.130.124.1
>>>> 193.1.201.27 
>>>> 138.48.3.202 
>>>> 136.159.220.40 
>>>> 138.251.214.78 
>>>>
>>>>
>>>> all these and more within a minute.
>>>>
>>>> They are all different.
>>>>
>>>> Kate
>>>>
>>>>
>>>>
>>>> On Thursday, August 9, 2012 9:55:29 AM UTC-4, alex wrote:
>>>>>
>>>>> Kate,
>>>>>
>>>>> If barryhunter is right and all the IPs are coming from the same ISP 
>>>>> anyway, you can simply block the whole subnetwork ranges of that ISP (at 
>>>>> least temporary) using dos.yaml:
>>>>> https://developers.google.com/appengine/docs/python/config/dos
>>>>>
>>>>> It'll be pain in the ass updating the file every time you encounter 
>>>>> new subnets but at least you could probably save some quota 'till you 
>>>>> move 
>>>>> somewhere else or figure something out.
>>>>>
>>>>> -- alex
>>>>>
>>>>> On Thursday, August 9, 2012 1:59:57 PM UTC+2, Kate wrote:
>>>>>>
>>>>>> Hi Sergey,
>>>>>>
>>>>>> Here is a typical example
>>>>>> 2012-08-09 06:51:16.597 / 302 30ms 0kb curl/7.18.2 
>>>>>> (i386-redhat-linux-gnu) libcurl/7.18.2 NSS/3.12.2.0 zlib/1.2.3 
>>>>>> libidn/0.6.14 libssh2/0.18
>>>>>> 202.125.215.12 - - [09/Aug/2012:04:51:16 -0700] "HEAD / HTTP/1.1" 302 
>>>>>> 153 - "curl/7.18.2 (i386-redhat-linux-gnu) libcurl/7.18.2 NSS/
>>>>>> 3.12.2.0 zlib/1.2.3 libidn/0.6.14 libssh2/0.18" "
>>>>>> aussieclouds.appspot.com" ms=31 cpu_ms=0 api_cpu_ms=0 
>>>>>> cpm_usd=0.000049 instance=00c61b117c2f994812ed63184c9c5544dea738
>>>>>>
>>>>>> But the ip address varies. My code forces 302 response. Before I 
>>>>>> added the code they were throwing errors head method not found. But even 
>>>>>> though I am doing the 303 I am still getting front end time exceeded and 
>>>>>> these requests are taking up about 95% of my quota. So to keep the site 
>>>>>> alive I would have to pay for them, I have lost most of my European and 
>>>>>> Australian visitors because the site is down every night during those 
>>>>>> places daylight hours. Obviously I can't continue like this and so will 
>>>>>> have to move to a provider capable of blocking these requests,
>>>>>>
>>>>>>
> On Thursday, August 9, 2012 10:21:03 PM UTC+2, Kate wrote:
>>
>>
>> I did that but don't think it will catch them all.
>>
>> I had a list of 100 individual ones, see below. Can you recognize subnets 
>> in them?
>> blacklist:
>> - subnet: 82.179.176.44
>> - subnet: 83.230.127.124
>> - subnet: 88.2.234.60
>> - subnet: 128.10.19.53
>> - subnet: 128.84.154.45
>> - subnet: 128.42.142.44
>> - subnet: 128.36.233.154
>> - subnet: 128.111.52.59
>> - subnet: 128.114.63.64
>> - subnet: 128.138.207.45
>> - subnet: 128.227.150.12
>> - subnet: 128.208.4.198
>> - subnet: 128.151.65.101
>> - subnet: 128.223.8.112
>> - subnet: 128.232.103.201
>> - subnet: 129.10.120.194
>> - subnet: 129.15.78.30
>> - subnet: 129.74.74.20
>> - subnet: 129.82.12.188
>> - subnet: 129.93.229.139
>> - subnet: 129.97.74.14
>> - subnet: 129.108.202.11
>> - subnet: 129.130.252.140
>> - subnet: 129.237.161.194
>> - subnet: 130.37.193.143
>> - subnet: 130.83.166.243
>> - subnet: 130.104.72.213
>> - subnet: 130.216.1.22
>> - subnet: 130.253.21.123
>> - subnet: 130.195.4.68
>> - subnet: 130.237.50.125
>> - subnet: 131.179.150.72
>> - subnet: 131.188.44.102
>> - subnet: 132.65.240.100
>> - subnet: 132.72.23.10
>> - subnet: 132.170.3.32
>> - subnet: 132.181.10.56
>> - subnet: 133.1.74.163
>> - subnet: 133.15.59.2
>> - subnet: 133.68.253.242
>> - subnet: 134.151.255.181
>> - subnet: 138.4.0.120
>> - subnet: 138.251.214.78
>> - subnet: 136.159.220.40
>> - subnet: 138.48.3.202
>> - subnet: 139.78.141.245
>> - subnet: 139.165.12.211
>> - subnet: 140.109.17.181
>> - subnet: 140.112.107.82
>> - subnet: 140.123.230.248
>> - subnet: 141.11.0.162
>> - subnet: 141.20.103.211
>> - subnet: 141.219.252.133
>> - subnet: 142.103.2.2
>> - subnet: 143.89.49.73
>> - subnet: 143.225.229.238
>> - subnet: 155.245.47.225
>> - subnet: 155.246.12.163
>> - subnet: 156.56.250.226
>> - subnet: 156.62.231.244
>> - subnet: 157.92.44.101
>> - subnet: 160.80.221.39
>> - subnet: 161.106.240.19
>> - subnet: 169.226.40.2
>> - subnet:  169.229.50.15
>> - subnet: 165.91.55.8
>> - subnet: 165.230.49.115
>> - subnet: 192.1.249.138
>> - subnet: 192.12.33.102
>> - subnet: 192.16.125.11
>> - subnet: 192.38.109.144
>> - subnet: 192.41.135.219
>> - subnet: 192.42.43.23
>> - subnet: 192.107.171.145
>> - subnet: 193.1.201.27
>> - subnet: 193.138.2.13
>> - subnet: 193.196.39.9
>> - subnet: 193.167.187.185
>> - subnet: 193.136.19.13
>> - subnet: 193.166.167.5
>> - subnet: 193.205.215.74
>> - subnet: 193.226.19.31
>> - subnet: 194.29.178.13
>> - subnet: 194.167.254.19
>> - subnet: 194.254.215.12
>> - subnet: 195.130.124.1
>> - subnet: 198.82.160.221
>> - subnet: 200.0.206.137
>> - subnet: 200.0.206.168
>> - subnet: 200.17.202.195
>> - subnet: 200.129.132.19
>> - subnet: 202.23.159.52
>> - subnet: 202.125.215.12
>> - subnet: 202.237.248.222
>> - subnet: 202.249.37.67
>> - subnet: 203.110.240.190
>> - subnet: 203.178.133.2
>> - subnet: 212.51.218.235
>> - subnet: 213.73.40.106
>> - subnet: 213.131.1.101
>>
>> Thanks
>> Kate
>>
>>
>> On Thursday, August 9, 2012 2:37:48 PM UTC-4, alex wrote:
>>>
>>> well, while you're notifying planetlab and whatnot you could create and 
>>> upload a dos.yaml for the time being with a content similar to this:
>>>
>>> blacklist:
>>> - subnet: 132.65.0.0/16
>>> - subnet: 133.0.0.0/8
>>>   description: somewhere in china
>>> - subnet: 136.159.0.0/16
>>> - subnet: 138.250.0.0/15
>>> - subnet: 138.48.0.0/16
>>> - subnet: 139.165.0.0/16
>>> - subnet: 141.219.252.0/24
>>> - subnet: 193.1.0.0/16
>>>   description: planetlab
>>> - subnet: 193.136.16.0/24
>>> - subnet: 193.166.167.0/24
>>> - subnet: 195.130.124.0/22
>>> - subnet: 200.17.192.0/19
>>>
>>>
>>> - put that file in your app root dir and do something like this from a 
>>> terminal:
>>>
>>> "appcfg.py update_dos ."
>>>
>>>
>>> On Thursday, August 9, 2012 6:13:14 PM UTC+2, Kate wrote:
>>>>
>>>> They are not coming from the same IP. They are mostly in Europe but 
>>>> there are no subnets.
>>>>
>>>> There are hundreds of them and google only lets you block 100.
>>>>
>>>> eg
>>>>
>>>> 132.65.240.100 
>>>> 133.15.59.2 
>>>> 193.136.19.13 
>>>> 139.165.12.211 
>>>> 193.166.167.5 
>>>> 141.219.252.133 
>>>> 200.17.202.195
>>>> 195.130.124.1
>>>> 193.1.201.27 
>>>> 138.48.3.202 
>>>> 136.159.220.40 
>>>> 138.251.214.78 
>>>>
>>>>
>>>> all these and more within a minute.
>>>>
>>>> They are all different.
>>>>
>>>> Kate
>>>>
>>>>
>>>>
>>>> On Thursday, August 9, 2012 9:55:29 AM UTC-4, alex wrote:
>>>>>
>>>>> Kate,
>>>>>
>>>>> If barryhunter is right and all the IPs are coming from the same ISP 
>>>>> anyway, you can simply block the whole subnetwork ranges of that ISP (at 
>>>>> least temporary) using dos.yaml:
>>>>> https://developers.google.com/appengine/docs/python/config/dos
>>>>>
>>>>> It'll be pain in the ass updating the file every time you encounter 
>>>>> new subnets but at least you could probably save some quota 'till you 
>>>>> move 
>>>>> somewhere else or figure something out.
>>>>>
>>>>> -- alex
>>>>>
>>>>> On Thursday, August 9, 2012 1:59:57 PM UTC+2, Kate wrote:
>>>>>>
>>>>>> Hi Sergey,
>>>>>>
>>>>>> Here is a typical example
>>>>>> 2012-08-09 06:51:16.597 / 302 30ms 0kb curl/7.18.2 
>>>>>> (i386-redhat-linux-gnu) libcurl/7.18.2 NSS/3.12.2.0 zlib/1.2.3 
>>>>>> libidn/0.6.14 libssh2/0.18
>>>>>> 202.125.215.12 - - [09/Aug/2012:04:51:16 -0700] "HEAD / HTTP/1.1" 302 
>>>>>> 153 - "curl/7.18.2 (i386-redhat-linux-gnu) libcurl/7.18.2 NSS/
>>>>>> 3.12.2.0 zlib/1.2.3 libidn/0.6.14 libssh2/0.18" "
>>>>>> aussieclouds.appspot.com" ms=31 cpu_ms=0 api_cpu_ms=0 
>>>>>> cpm_usd=0.000049 instance=00c61b117c2f994812ed63184c9c5544dea738
>>>>>>
>>>>>> But the ip address varies. My code forces 302 response. Before I 
>>>>>> added the code they were throwing errors head method not found. But even 
>>>>>> though I am doing the 303 I am still getting front end time exceeded and 
>>>>>> these requests are taking up about 95% of my quota. So to keep the site 
>>>>>> alive I would have to pay for them, I have lost most of my European and 
>>>>>> Australian visitors because the site is down every night during those 
>>>>>> places daylight hours. Obviously I can't continue like this and so will 
>>>>>> have to move to a provider capable of blocking these requests,
>>>>>>
>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"Google App Engine" group.
To view this discussion on the web visit 
https://groups.google.com/d/msg/google-appengine/-/CD7NTIaf7NEJ.
To post to this group, send email to google-appengine@googlegroups.com.
To unsubscribe from this group, send email to 
google-appengine+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/google-appengine?hl=en.

Reply via email to