@eastdakota @CloudFlare yes. means at least 2 of 3 botnets are breezing right by it. meh
-
-
Replying to @attritionorg
@attritionorg@CloudFlare might want to ACL off all requests that aren't coming from our IP ranges.1 reply 0 retweets 0 likes -
Replying to @eastdakota
@eastdakota@CloudFlare implying you aren't funneling all requests through you? request by IP is stopped.2 replies 0 retweets 0 likes -
Replying to @attritionorg
@attritionorg tips on protecting your origin: http://blog.cloudflare.com/ddos-prevention-protecting-the-origin …2 replies 0 retweets 0 likes -
Replying to @eastdakota
@eastdakota if i goto server using IP from DNS, request is blocked. we use a custom 'direct' alias via CF interface. seems that would do it?2 replies 0 retweets 0 likes -
Replying to @attritionorg
@attritionorg can you look in logs for boys' requests and see if they're routed via CloudFlare?1 reply 0 retweets 0 likes -
Replying to @eastdakota
@eastdakota not sure what you mean by "boys' requests". i have access to logs though.1 reply 0 retweets 0 likes -
-
Replying to @eastdakota
@eastdakota we have mod installed for apache that translates to original IP, so we can use that info to block via 'threat control'. catch221 reply 0 retweets 0 likes -
Replying to @attritionorg
@attritionorg check if there's a RayID in some logs but not others.2 replies 0 retweets 0 likes
@eastdakota link to info on what "RayID" is? =)
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.