I’m running a website that is getting a lot of bot traffic and found Cloudflare free rule tier to be a bit limiting. (5 custom rules with length limits)

Ive got subnets for major VPS providers to block and will run analysis against my traffic to build on these lists.

What do others do?

I’m contemplating my Cloudflared tunnel into Crowdsec to my app.

    • AustralianSimon@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      9 hours ago

      I have more than 50k but even that page doesn’t recommend it.

      Top of that page

      Recommendation: Use WAF custom rules instead

      Cloudflare recommends that you create WAF custom rules instead of IP Access rules to perform IP-based or geography-based blocking (geoblocking):

      • For IP-based blocking, use an IP list in the custom rule expression.

      On the fail2ban front, can I run my traffic through a f2b container and out into my app?

      • ArrowMax@feddit.org
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 hours ago

        WAF custom rules are more flexible, of course, and from a business perspective, I can understand why they would recommend that option instead.

        I currently filter on an nginx access log file among other filters (sshd, bot-search, bad-requests) and let fail2ban execute the ban/unban action itself.

        From a quick search, it should be possible to handle bans/unbans externally, if that’s what you’re after.