Database logging ban operation

A screenshot of the Drupal 7 Recent log messages screen showing a ban link next to one log message, and an unban link next to another message.


Have you ever looked through the list of recent messages for a public website and noticed certain IP addresses repeatedly trying to do bad stuff? For example, repeatedly trying to log in with various usernames, trying to access node/add, or trying a bunch of different path prefixes to the backend / CKEditor scripts, etc.

Honeypot Ajax

Sandbox for a Honeypot helper module. This module allows time limit protected forms on cached pages for anonymous users.

Serverside, the module sets the honeypot time limit so that 25 hours must pass before the form can submit, and it turns page caching back on for the page with the form. On page load ajax updates the form to the time limit in the Honeypot configuration. This allows the page to be cached.

Mail Guide

This module provides advanced email address checking. Detecting mistyped email addresses in javascript. Domain blacklist.

Nocaptcha Recaptcha

Nocaptcha Recaptcha integrates the standard captcha module with the nocaptcha service provided by google.

On websites using this new API, a significant number of users will be able to securely and easily verify they’re human without actually having to solve a CAPTCHA. Instead, with just a single click, they’ll confirm they are not a robot.

Automatic IP ban (Autoban)

Ban bots using rules

Autoban allows to automatize IP ban using watchdog table by the module rules. Need enable Database logging module (core). The module ban IP by cron (cron mode) or at every dblog event (force mode).

Rule module finds IP in watchlog table entries and inserts IP to banned IP table. By default, IP is inserted into blocked_ips table (admin/config/people/ip-blocking). After installing IP_ranges module you can ban IP range (aaa.bbb.ccc.0 - aaa.bbb.ccc.255).


Subscribe with RSS Subscribe to RSS - Spam Prevention