I really can’t - is is so hard to believe?
Anyway - the firewall settings did help a bit. So last night they tried again for about 3 hours - however only managed to get about 180x5 requests through - as nginx rate limiting blocked them out.
It’s too bad nginx rate limiting can only block by minute, I would need a rate limit per hour or even day. I will see if it makes sense ot maintain a local patched version of nginx.
Actually I wanted to block their IP directly - they don’t seem to be changing often at all, but made a small mistake there. Let’s wait another night. At least I’ve heavily reduced their requests - and the blocks are bombproof via stripe radar rules.
For anyone interested - here is my nginx rules - I’m pretty sure I’m not blocking any legitimate users so far - they did catch some bots however already according to my logs.:
nginx.conf - main part:
geo $limit {
default 1;
5.9.122.XX 0;
}
map $limit $limit_key {
0 “”;
1 $binary_remote_addr;
}
limit_req_status 403;
limit_req_zone $limit_key zone=two:5m rate=5r/m;
domain block:
location ~ /support/membership/ {
limit_req zone=two burst=1 nodelay;
limit_req_status 503;
try_files $uri $uri/ /index.php?$args;
}