Skip to Main Content
View DateLast View DateFirst View DateScoreNPage Id NIp StartIp Address 1Ip Address 2Ip Address NAgentAgent NBot Pk IdBot TypeIp FromIp ToInfo SourceUser Agent RegexDescription
2024-11-242024-11-24 12:18:302024-11-24 12:12:542.036914.155.4.155.***.***4.155.***.***1Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.3613
2024-11-222024-11-22 21:50:492024-11-22 04:06:501.01816557.141.57.141.***.***57.141.***.***30meta-externalagent/1.1 (+https://developers.facebook.com/docs/sharing/webmasters/crawler)1
2024-11-202024-11-20 20:52:292024-11-20 16:39:180.01151642.191.42.191.***.***42.191.***.***1Mozilla/5.0 (X11; Linux x86_64; rv:103.0) Gecko/20100101 Firefox/103.01
2024-11-202024-11-20 18:52:472024-11-20 12:26:381.02068757.141.57.141.***.***57.141.***.***30meta-externalagent/1.1 (+https://developers.facebook.com/docs/sharing/webmasters/crawler)1
2024-11-192024-11-19 09:01:582024-11-19 00:54:251.0698542.191.42.191.***.***42.191.***.***1Gaisbot/3.0 (robot@gais.cs.ccu.edu.tw; http://gais.cs.ccu.edu.tw/robot.php)45
2024-11-182024-11-18 23:56:312024-11-18 12:36:221.01696157.141.57.141.***.***57.141.***.***29meta-externalagent/1.1 (+https://developers.facebook.com/docs/sharing/webmasters/crawler)1
2024-11-172024-11-17 15:36:252024-11-17 07:29:192.014849193.186.193.186.***.***193.186.***.***6Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.362
2024-11-162024-11-16 18:12:362024-11-16 11:53:421.02768757.141.57.141.***.***57.141.***.***30meta-externalagent/1.1 (+https://developers.facebook.com/docs/sharing/webmasters/crawler)1
2024-11-152024-11-15 16:19:252024-11-15 12:04:041.02218057.141.57.141.***.***57.141.***.***30meta-externalagent/1.1 (+https://developers.facebook.com/docs/sharing/webmasters/crawler)1
2024-11-142024-11-14 21:55:152024-11-14 11:54:161.02597957.141.57.141.***.***57.141.***.***29meta-externalagent/1.1 (+https://developers.facebook.com/docs/sharing/webmasters/crawler)1
  • 1 - 10 of 25

Info

DDoS attacks (or Brute Force attacks or other bot-related behavior that amounts to the same thing) are becoming a bit of a problem for my server.
Thousands of requests per hour are too much for my modest setup, so I had to take some measures.
So I created a query to find suspicious IP addresses and/or User Agents using apex_workspace_activity_log. See the code below - I hid the complete IP addresses for privacy reasons.
If I identify an attack, I can add a "rewrite rule" to Apache (on my proxy server) to block an IP range or User Agent. More info on that here and here.

This is not ideal of course. A problem has to arise first, before I can act. But it's better than doing nothing.
I should look into other measures like Mod_evasive, Mod_security, Fail2ban, etc., but for now this sort of works.

Update May 2023:
Things were getting out of hand, so I installed ModSecurity on my Apache reverse proxy server (Apache 2.4 on AlmaLinux 8).
That turned out to be quite simple (after a few hours of trying all sorts of cookbooks that did not work...). Here's what I did:
You will need to deactivate ModSecurity from any machine/subnet that is allowed to use Apex Builder. Otherwise saving anything in the Apex Builder will result in a 403 error.
In my case I need to do this for IP 192.168.2.254, which is my internal router address. You can check the log here: And to check if it all works, perform an "illegal" request: which should return:

Code

Page

Identification
Page ID
Name
Page Alias

Region

Identification
Sequence
Title
Type
Source
Source Type
Region Source

View

View
Name
DDL