That looks promising. BTW most Google Image bots are fake. But I don't allow hot linking. A legitimate Google user viewing the reduced resolution image provided by Google can click to see the referring page, so no loss to real users. That hacker was quite insistent. I got a 414 (large request) for the first time. Perhaps a buffer overflow attempt.
Some time ago I wrote this module to check when an access is done through the Google Proxy using reverse DNS + DNS resolve and comparing the results to validate the access. You can do something similar. On Sun, Sep 25, 2016 at 11:58 PM, li...@lazygranch.com <li...@lazygranch.com> wrote: I got a spoofed googlebot hit. It was easy to detect since there were |
_______________________________________________ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx