[ale] ufw help

Bob Toxen transam at verysecurelinux.com
Mon Apr 6 11:07:34 EDT 2026


You can use the following to see what rules are operating on packets:

  iptables -n -v --line-numbers -L !:* | sed "s/          //" | more

Bob

On Sun, Apr 05, 2026 at 06:52:38PM +0000, lollipopman691 via Ale wrote:
> In recent days facebook's crawlers ( or someone impersonating them)
> have been hammering my website hard enough to bring it to its knees.

> The hits all seem to originate from addresses in 57.141.0.0/32, which
> iplocation.net puts in Ashburn,VA and owned by facebook//meta.

> Here's an example of a hit from
> /var/log/apache2/other_vhosts_access.log:

> tomshiro.org:443 57.141.0.50 - - [05/Apr/2026:14:26:23 -0400]
> "GET /foswiki/bin/edit/System/WebSearch?t=1775413530
> HTTP/1.1" 504 2571 "-" "meta-webindexer/1.1
> (+https://developers.facebook.com/docs/sharing/webmasters/crawler)"

> I am getting a *massive* number of these. My (crude) weblog analyzer
> lists 9515 of them between midnight and 2 pm, many of them in bursts
> less than a second apart.

> So I have attempted to ban that ip address through ufw, using the
> command "ufw deny from 57.141.0.0/32" .  Here's the output from "ufw
> status numbered:

> Status: active

>      To                         Action      From
>      --                         ------      ----
> [ 1] 25/tcp                     ALLOW IN    Anywhere
> [ 2] 22/tcp                     ALLOW IN    Anywhere
> [ 3] Anywhere                   DENY IN     146.174.0.0/16
> [ 4] Anywhere                   DENY IN     185.171.0.0/16
> [ 5] Anywhere                   DENY IN     20.171.207.109
> [ 6] Anywhere                   DENY IN     202.76.0.0/16
> [ 7] Anywhere                   DENY IN     212.52.0.0/16
> [ 8] Anywhere                   DENY IN     216.73.216.125
> [ 9] Anywhere                   DENY IN     47.238.0.0/16
> [10] Anywhere                   DENY IN     47.239.0.0/16
> [11] Anywhere                   DENY IN     47.242.0.0/16
> [12] Anywhere                   DENY IN     47.243.0.0/16
> [13] Anywhere                   DENY IN     47.76.0.0/16
> [14] Anywhere                   DENY IN     8.210.0.0/16
> [15] Anywhere                   DENY IN     8.218.0.0/16
> [16] Anywhere                   DENY IN     45.206.0.0
> [17] Anywhere                   DENY IN     47.128.0.0
> [18] Anywhere                   DENY IN     57.141.0.0
> [19] 80 (v6)                    ALLOW IN    Anywhere (v6)
> [20] 443 (v6)                   ALLOW IN    Anywhere (v6)
> [21] 25/tcp (v6)                ALLOW IN    Anywhere (v6)
> [22] 22/tcp (v6)                ALLOW IN    Anywhere (v6)

> You can see the ban rule in line 18, above. 
> Theoretically this should stop these hits, yes? Or should I be saying "ufw deny from 57.141.0.0/16" ?
> This is on a pretty much stock Debian 12 server running on aws ec2, FWIW.

> -- CHS


More information about the Ale mailing list