rabryst/ncane-com-short-url-generator/master/.htaccess - Htaccess File

rabryst/ncane-com-short-url-generator/master/.htaccess

ErrorDocument 400 /
ErrorDocument 401 /
ErrorDocument 403 /
ErrorDocument 404 /
ErrorDocument 500 /

# Options All -Indexes

<Files *>
order deny,allow

##### READ THIS BEFORE USING THE LISTS BELOW HERE!
### If your website, or dedicated server, has an IP address falling within the ones below and you use absolute URLs in your includes or links, those pages will be blocked from loading.
### If this occurs you should find the IP of your website, or server, and allow it, using the example form: allow from (your IP address(es))
### You can find your website's IP address by logging into your website's Control Panel (e.g. Cpanel, Plesk, vDeck, Ensim) and it should be displayed on the control panel home page.
### You can also run a Whois lookup, at - http://whois.domaintools.com - on your domain name, to see the IP where it is hosted.
### Example of a page that might be blocked: You use PHP (or SSI) includes for headers, navigation links, or footers, using this form: <php include('http://www.example.com/folder/filename');
### If your web server is covered by this blocklist the included page will get a 403 forbidden server status.
### You can avoid having your own includes or linked pages blocked, by using relative URLs instead. E.g: <php include('/folder/filename');
## Servers should not be contacting other servers, trying to spam or exploit them. That's how they got on these lists in the first place!
## There are a lot of commonly used web servers covered by the following "deny from" lists! Your website may be hosted on an IP in these blocklists.
#####################################################

# Exploited - shared, VPS and dedicated web servers, listed by the entire CIDR assigned to each hosting company. These are not ISPs or PCs. They are website hosting servers, parked domain hosts and datacenters, including Schlund AG and 1&1 Internet AG servers.
# The web servers blocked here are being used as proxy servers, or for harvesting, scraping, spamming, phishing, or hosting hostile scripts used to infect personal computers. As such they are threats to your website, even if you are with a host on this list.
deny from 24.172.171.18 38.100.22.104/29 38.100.22.112/28 38.100.22.128/26 62.21.96.0/22 62.75.202.0/24 62.141.48.0/20 62.141.56.0/21 64.15.138.160/27 64.20.32.0/19 64.22.64.0/18 64.27.0.0/19 64.34.176.0/20 64.38.0.0/18 64.91.224.0/19 64.92.199.0/24 64.92.200.0/24 64.118.80.0/20 64.182.0.0/16 64.185.224.0/20 64.191.0.0/17 65.23.153.0/24 65.23.154.0/24 65.36.128.0/17 65.98.0.0/17 65.167.19.30 65.182.188.0/22 66.7.192.0/19 66.35.39.128/25 66.38.130.192/26 66.49.128.0/17 66.79.160.0/19 66.90.64.0/18 66.116.125.0/24 66.148.64.0/18 66.154.0.0/18 66.154.64.0/19 66.160.186.0/24 66.186.36.195 66.197.128.0/17 66.199.224.0/19 66.225.212.0/22 66.232.96.0/19 66.235.160.0/19 66.235.192.0/19 67.131.248.0/24 67.159.0.0/18 67.205.69.32/27 67.228.0.0/16 69.13.0.0/16 69.16.192.0/18 69.31.40.0/21 69.31.80.0/21 69.50.160.0/19 69.60.111.0/24 69.64.64.0/20 69.65.0.0/18 69.65.20.0/22 69.73.128.0/18 69.93.241.192/27 70.38.71.128/27 70.87.208.34 72.18.150.0/23 72.21.32.0/19 72.22.64.0/19 72.29.64.0/19 72.32.0.0/16 72.36.128.0/17 72.36.168.153/29 72.51.32.0/20 72.52.116.40/29 72.52.128.0/17 72.55.128.0/18 72.232.0.0/16 72.233.0.0/17 72.249.32.0/23 74.50.0.0/20 74.50.96.0/19 74.63.64.0/18 74.86.0.0/16 74.124.192.0/24 74.200.192.0/18 74.208.15.0/24 74.208.16.0/24 74.208.64.0/19 77.92.88.0/23 77.130.0.0/16 77.232.66.0/23 78.46.0.0/15 78.129.208.0/24 79.32.0.0/15 79.135.160.0/19 80.67.25.0/24 80.67.27.0/24 80.69.92.0/25 80.86.80.0/20 80.92.64.0/19 80.237.128.0/17 81.19.183.0/27 81.29.70.0/24 81.169.144.0/20 82.61.0.0/16 82.99.30.0/25 82.165.0.0/16 82.208.60.0/22 83.65.62.0/24 83.149.90.0/24 83.233.165.0/24 84.19.176.0/20 85.8.128.0/18 85.10.192.0/18 85.17.0.0/16 85.18.0.0/16 85.25.0.0/16 85.88.0.0/19 85.113.224.0/19 85.114.140.0/22 85.119.152.0/21 85.158.181.0/24 87.106.0.0/16 87.118.64.0/18 87.118.96.0/19 87.230.0.0/20 87.237.60.64/27 87.253.128.0/19 87.253.176.0/21 88.84.128.0/19 88.198.16.0/20 88.198.32.0/19 88.208.238.0/24 89.138.0.0/16 89.149.192.0/18 89.163.128.0/17 89.238.75.0/24 89.238.76.0/24 89.245.192.0/18 91.121.0.0/16 91.186.0.0/19 91.192.116.0/22 92.48.64.0/18 92.48.65.0/24 92.48.112.64/26 92.56.0.0/16 92.243.8.0/21 93.174.93.0/24 94.102.48.0/20 123.242.229.0/24 193.164.132.0/23 193.192.58.0/23 193.200.193.0/24 193.254.184.0/24 194.8.74.0/23 194.116.186.0/23 195.35.82.0/23 195.56.55.0/28 195.56.189.32/28 195.225.176.0/22 195.234.171.0/24 195.242.98.0/23 200.63.40.0/22 204.13.64.0/21 205.177.79.0/24 205.178.128.0/18 205.234.96.0/20 205.234.132.0/24 206.51.224.0/20 206.188.0.0/26 206.190.65.128/25 207.58.128.0/18 207.150.188.0/24 207.234.128.0/17 208.53.128.0/18 208.66.68.0/22 208.66.194.160/28 208.71.128.0/22 208.72.159.68 208.99.192.0/19 208.101.0.0/18 208.109.0.0/16 208.112.107.20 208.184.65.0/24 209.2.34.112/28 209.9.240.0/21 209.25.128.0/17 209.40.192.0/20 209.41.160.0/19 209.59.167.50/31 209.66.122.0/24 209.85.0.0/17 209.97.192.0/19 209.126.128.0/17 209.160.0.0/18 209.160.64.0/20 209.163.169.0/24 209.172.32.0/19 209.200.0.0/18 209.205.0.0/18 212.241.182.240 213.165.64.0/19 213.194.149.0/24 213.225.101.128/27 216.17.96.0/20 216.32.64.0/19 216.67.244.0/24 216.93.160.0/19 216.104.37.120/29 216.120.224.0/19 216.180.224.0/19 216.182.224.0/20 216.185.128.0/24 216.242.44.96 216.245.192.0/20 216.255.176.0/20 217.20.208.0/20 217.70.128.0/22 217.70.132.0/23 217.148.93.128/26 217.169.46.96/28 217.172.187.0/24 217.197.152.0/24

# Added on Feb 1, 2009, with extreme prejudice: 212.241.182.240 for numerous server exploits
# Added on Feb 16, 2009: 66.79.160.0/19 - managedsg-inc.com - for spamming and exploits
# Added on Mar 2, 2009: 70.38.71.128/27 - iWeb Dedicated CL2
# Added on Mar 2, 2009: 77.232.66.0/23 - Servage.net - Hosting Segment H1
# Added on Mar 2, 2009: 85.18.0.0/16 - Fastweb.it for numerous exploit probes
# Added on Mar 12, 2009: 193.200.193.0/24 - vps4less.de, for spambots
# Added on Mar 14, 2009: 89.245.192.0/18 - Veratel - for Copyright Sheriff
# Added on Mar 14, 2009: 194.8.74.0/23 - Dragonara.net - for hostile probles and exploit attempts
# Added on Mar 17, 2009: 195.35.82.0/23 - Fsdata-SE - for exploit probes
# Added on Mar 29, 2009: 88.198.32.0/19 - Hetzner Online AG Datacenter - For exploit attacks
# Added on Apr 08, 2009: 94.82.0.0/15 - InterBusiness.it - added below
# Added on Apr 13, 2009: 85.158.181.0/24 HostProfis Colocation, in Austria, for exploit attacks
# Added on Apr 17, 2009: 209.139.208.236 Gowingo proxy service, under individual Proxy Server IPs
# Added on May 16, 2009: 93.174.93.0/24 Elcatel.net, in The Netherlands, for server email harvester attempts
# Added on May 17, 2009: 67.192.0.0/16 Another Rackspace CIDR
# Added on May 17, 2009: 65.23.154.0/24 Rackmounted DTT
# Added on May 25, 2009: 89.238.75.0/24 and 89.238.76.0/24 Dedicated server customers in Germany, for server exploit attacks
# Added on May 31, 2009: 77.130.0.0/16 Freenet in Germany, due to numerous blog spam attempts (failed because I have commenting turned off)
# Added on June 3, 2009: 85.88.0.0/19 and 85.119.152.0/21 - in Germany, due to repeated log and email spam attacks

# Removed 82.165.128.0/17 from the exploited servers list on Jan 20, 2009 (Schlund US, including SIM.ORG)
allow from 82.165.128.0/17

# Technorail.com/aruba.it - hosting iframe SQL injection compromised Italian websites
deny from 62.149.128.0/17

# Interbusiness.it and Telecom Italia Net. Content Scrapers and scammers use these CIDRs
deny from 79.15.0.0/16 79.22.0.0/15 79.29.0.0/16 80.180.0.0/16 82.185.0.0/16 85.39.0.0/16 87.8.0.0/15 94.82.0.0/15

# Added CI Host - 64.182.0.0/16 - on 11/8/2008, due to compromised customer websites spamming my access logs

# Added SoftLayer's CIDR: 75.126.0.0/16 into the Proxy servers list, due to proxy servers exploiting my and my client's websites.

# Sorry LiquidWeb; you're now on my blocklist for numerous exploits coming from your servers. 64.91.224.0/19 and 69.16.192.0/18

# Proxy servers and services and hosting companies with proxy server clients, listed by the full CIDR of the hosting company.
deny from 61.206.125.0/24 62.171.194.0/23 75.126.0.0/16 80.33.0.0/16 80.58.0.0/16 81.12.0.0/17 83.16.154.152/29 85.10.219.104/29 85.92.130.0/24 85.185.0.0/16 88.198.241.104/29 88.198.252.144/29 145.253.239.8/29 150.188.0.0/15 193.164.131.0/24 194.112.195.202 198.145.112.128/25 198.145.182.0/26 200.30.64.0/20 200.43.108.0/24 200.75.128.0/20 200.126.112.0/20 200.172.222.0/26 200.202.192.0/18 200.210.0.0/16 203.160.0.0/23 207.44.128.0/17 207.210.192.0/18 208.110.68.144/29 216.104.32.0/20

# Individual Proxy Server IPs
deny from 64.20.205.251 64.202.161.130 66.6.122.130 66.36.230.163 66.37.153.74 66.63.167.166 66.79.162.102 66.212.18.89 69.50.208.74 69.94.124.137 72.55.146.175 72.167.115.164 74.208.16.108 75.175.243.195 76.76.15.73 77.235.40.189 85.92.130.117 88.198.5.220 88.214.192.24 91.186.21.78 206.221.184.108 208.100.20.148 209.139.208.236

# ThePlanet.com and Everyones Internet; home of many spammers, hackers and trojan horses. I will unblock these CIDRs when Hell freezes over!
deny from 64.5.32.0/19 64.246.0.0/18 66.98.128.0/17 67.15.0.0/16 67.18.0.0/15 69.93.0.0/16 70.84.0.0/14 74.52.0.0/14 75.125.0.0/16 207.44.128.0/17 209.62.0.0/17 216.127.64.0/19

# Rackspace - Hackers, spammers, scammers and phishers
deny from 67.192.0.0/16 69.20.0.0/17 72.3.128.0/17 72.32.0.0/16 74.205.0.0/17

# Performance Systems International (PSI) (Spies) (entire CIDR = 38.0.0.0/8 - blocking this is not advised)
deny from 38.100.41.64/26

#######################################################
# We occasionally move some of the individual proxy IP addresses into the Exploited Servers list, as their host's CIDR is confirmed as not belonging to an ISP.
# The IP addresses in this blocklist belong to various types of web hosting companies, server farms and datacenters.

# Add other blocked domain names or IP addresses here, starting with "deny from " without quotes

# If you find that you need to poke a hole in the blocklist for legitimate visitors, follow this example: allow from 123.456.789.0

# Add "allow from" IP addresses, or CIDR Ranges, after all of the "deny from" items, just before the closing Files tag.

# Everything not included within these deny from ranges is PERMITTED by the allow portion of the directive.

# If some or all of your own webpages are 403'd by this blocklist, place your server's IP address(es)s after "allow from" below, then remove the comment before it.

# allow from #your server's IP

# Russia, Ukraine, Bulgaria, Romania, Latvia, Estonia, Kazakstan, Moldavia/Moldova, Poland, Serbia, Siberia, Slovakia, Slovenia
deny from 62.64.64.0/18 62.76.126.0/24 62.85.0.0/17 62.133.128.0/19 62.168.224.0/19 62.182.104.0/21 62.213.64.0/18 62.233.142.0/26 70.85.189.224/29 77.37.128.0/17 77.41.0.0/17 77.43.128.0/17 77.45.128.0/17 77.51.0.0/18 77.51.64.0/18 77.75.8.0/21 77.79.244.0/22 77.87.152.0/21 77.88.0.0/18 77.91.224.0/21 77.94.124.0/22 77.120.0.0/14 77.221.128.0/19 77.234.0.0/19 77.244.208.0/20 78.26.128.0/18 78.36.0.0/15 78.85.0.0/16 78.96.0.0/15 78.106.0.0/15 78.108.176.0/20 78.110.160.0/20 78.129.128.0/17 78.157.128.0/19 79.99.216.0/21 79.111.0.0/16 79.120.0.0/17 79.126.0.0/18 79.139.128.0/17 79.140.160.0/20 80.48.0.0/13 80.71.240.0/20 80.73.64.0/21 80.77.80.0/24 80.82.160.0/20 80.85.176.0/20 80.86.96.0/19 80.86.240.0/21 80.233.128.0/17 80.235.0.0/17 81.5.96.0/20 81.9.0.0/20 81.16.80.0/20 81.19.64.0/19 81.21.0.0/20 81.30.176.0/20 81.88.208.0/20 81.89.112.0/20 81.90.224.0/20 81.94.32.0/20 81.95.144.0/20 81.176.0.0/15 81.181.16.0/22 81.195.0.0/16 81.196.0.0/16 81.200.0.0/20 81.222.128.0/20 82.76.0.0/14 82.103.64.0/18 82.114.224.0/19 82.138.6.128/25 82.138.32.0/19 82.140.64.0/18 82.144.192.0/19 82.146.56.0/21 82.151.112.0/21 82.160.203.0/24 82.179.160.0/20 82.204.128.0/17 83.19.145.232/29 83.102.128.0/17 83.166.192.0/19 83.167.96.0/19 83.170.192.0/18 83.174.192.0/18 83.219.129.0/24 83.222.0.0/19 83.229.128.0/17 83.237.0.0/16 84.21.64.0/19 84.51.64.0/19 84.253.64.0/18 85.14.35.0/24 85.21.0.0/16 85.29.192.0/18 85.90.192.0/19 85.93.32.0/19 85.94.0.0/19 85.94.32.0/19 85.112.112.0/20 85.121.180.0/23 85.140.0.0/15 85.142.0.0/15 85.192.60.0/23 85.204.24.0/23 85.249.0.0/16 85.255.0.0/20 85.255.112.0/20 86.34.0.0/16 86.57.128.0/17 86.125.88.0/21 86.127.19.0/24 87.99.64.0/19 87.103.192.0/20 87.103.208.0/20 87.110.0.0/16 87.117.0.0/18 87.118.128.0/18 87.119.224.0/19 87.120.16.0/20 87.204.0.0/15 87.226.0.0/17 87.242.116.0/23 87.248.160.0/19 87.253.192.0/19 88.147.128.0/17 88.200.128.0/17 88.201.128.0/17 88.205.128.0/17 88.212.192.0/18 89.20.128.0/19 89.28.0.0/17 89.32.152.0/21 89.35.64.0/21 89.37.144.0/21 89.38.112.0/20 89.38.128.0/21 89.41.176.0/20 89.44.142.0/23 89.106.96.0/19 89.187.48.0/23 89.108.64.0/19 89.109.0.0/18 89.110.0.0/18 89.110.64.0/18 89.111.160.0/20 89.111.176.0/20 89.113.72.0/21 89.114.54.0/23 89.122.0.0/16 89.123.0.0/16 89.149.0.0/17 89.175.0.0/16 89.178.0.0/15 89.186.0.0/19 89.187.49.0/24 89.190.224.0/19 89.208.160.0/19 89.212.64.0/18 89.218.0.0/16 89.223.0.0/17 89.251.96.0/20 89.253.0.0/18 90.150.112.0/20 90.150.128.0/20 90.151.128.0/20 90.156.128.0/17 91.76.0.0/14 91.122.0.0/16 91.123.0.0/19 91.124.0.0/16 91.135.192.0/22 91.143.160.0/20 91.149.180.0/24 91.189.80.0/21 91.191.64.0/18 91.192.68.0/22 91.193.140.0/22 91.197.128.0/22 91.200.228.0/22 91.203.4.0/22 91.203.92.0/22 91.205.124.0/22 91.206.200.0/23 91.206.226.0/23 91.207.4.0/22 91.207.60.0/23 91.208.228.0/24 91.211.64.0/22 91.211.68.0/22 91.212.41.0/24 91.212.65.0/24 92.36.0.0/17 92.46.0.0/15 92.48.126.128/25 92.48.201.0/26 92.53.104.0/22 92.80.0.0/14 92.82.0.0/16 92.83.0.0/16 92.84.0.0/16 92.112.0.0/15 92.114.128.0/17 92.124.0.0/14 92.241.160.0/19 92.244.224.0/19 92.255.0.0/16 93.80.0.0/15 93.92.32.0/21 93.120.128.0/18 94.25.0.0/17 94.50.0.0/15 94.100.181.128/25 94.103.80.0/20 94.176.96.0/24 94.188.0.0/17 94.229.65.160/27 94.230.0.0/20 94.247.0.0/21 95.24.0.0/13 141.85.0.0/16 158.197.0.0/16 160.99.0.0/16 192.129.3.0/24 193.25.112.0/23 193.39.113.0/24 193.47.166.0/24 193.108.248.0/22 193.178.144.0/22 193.178.228.0/23 193.200.50.0/23 193.223.101.0/24 193.227.226.0/23 193.230.232.0/24 193.238.128.0/22 194.29.60.0/22 194.44.36.0/24 194.85.90.0/23 194.102.114.0/24 194.160.0.0/16 194.176.176.0/24 194.181.0.0/16 194.186.0.0/16 195.2.96.0/19 195.2.240.0/23 195.2.252.0/23 195.3.148.0/22 195.5.116.0/23 195.28.32.0/19 195.34.224.0/19 195.42.160.0/19 195.60.174.0/23 195.88.32.0/23 195.93.218.0/23 195.93.218.0/24 195.95.218.0/23 195.95.228.0/23 195.112.96.0/19 195.128.16.0/22 195.128.48.0/21 195.131.0.0/16 195.137.200.0/23 195.138.64.0/19 195.138.198.0/24 195.170.192.0/19 195.189.246.0/23 195.190.13.0/24 195.208.0.0/15 195.209.32.0/19 195.225.64.0/22 195.225.176.0/22 195.239.0.0/16 195.242.98.0/23 195.242.232.0/22 195.244.128.128/25 195.245.112.0/23 195.245.208.0/24 204.9.184.0/21 212.9.224.0/19 212.24.32.0/19 212.33.224.0/19 212.44.64.0/20 212.44.80.0/22 212.44.128.0/19 212.58.192.0/19 212.92.128.0/18 212.96.160.0/19 212.118.32.0/19 212.158.160.0/20 213.35.224.0/23 213.91.128.0/17 213.140.96.0/19 213.142.192.0/19 213.154.192.0/19 213.156.192.0/24 213.215.64.0/18 213.233.101.0/24 213.242.12.0/22 213.248.0.0/18 217.12.112.0/20 217.12.240.0/20 217.16.16.0/20 217.20.160.0/20 217.28.208.0/21 217.65.208.0/20 217.67.16.0/20 217.77.208.0/20 217.106.0.0/15 217.114.224.0/20 217.146.240.0/20 217.147.0.0/19 217.149.240.0/20 217.174.96.0/20

# Turkey: web hosts and Turk Telekom customers - scammers, spammers, phishing websites and server script exploiters:
deny from 77.79.64.0/18 78.160.0.0/11 79.135.160.0/19 81.213.0.0/16 81.214.0.0/16 81.215.0.0/16 82.222.0.0/16 84.51.0.0/18 85.96.0.0/12 85.100.128.0/17 85.101.0.0/17 85.103.0.0/17 85.105.0.0/17 85.110.0.0/16 88.226.0.0/16 88.229.0.0/16 88.231.0.0/16 88.232.0.0/16 88.233.0.0/16 88.234.0.0/16 88.238.0.0/16 88.239.0.0/17 88.241.128.0/17 88.243.0.0/17 88.245.0.0/16 88.247.128.0/17 88.248.0.0/13 89.106.0.0/19 89.113.72.0/21 92.63.0.0/20 94.78.64.0/18 160.75.0.0/16 194.27.48.0/23 195.174.0.0/15 195.175.0.0/17 212.15.0.0/19 212.95.40.0/23 212.174.113.0/24 212.175.0.0/16

# Add other blocked domain names or IP addresses here, starting with "deny from " without quotes

# If you find that you need to poke a hole in the blocklist, for legitimate visitors, follow this example: allow from 123.456.789.0

# Add "allow from" IP addresses, or CIDR Ranges, after all of the "deny from" items, just before the closing Files tag.

# Everything not included within these deny from ranges is PERMITTED by the allow portion of the directive.

# Place friendly IPs, caught by the blocklists, after "allow from" below, then remove the comment before it.

# allow from

# Chinese IP addresses follow:
deny from 58.17.0.0/16 58.20.0.0/16 58.21.0.0/16 58.22.0.0/15 58.56.0.0/15 58.58.0.0/16 58.59.0.0/17 58.60.0.0/14 58.82.0.0/15 58.208.0.0/12 58.246.0.0/15 58.248.0.0/13 59.32.0.0/13 59.40.0.0/15 59.42.0.0/16 59.52.0.0/14 59.56.0.0/13 59.108.0.0/15 60.12.0.0/16 60.28.0.0/15 60.160.0.0/11 60.194.0.0/15 60.208.0.0/13 60.216.0.0/15 60.220.28.0/22 61.4.64.0/20 61.48.0.0/13 61.128.0.0/10 61.135.0.0/16 61.145.73.208/28 61.160.0.0/16 61.162.0.0/15 61.164.0.0/16 61.179.0.0/16 61.183.0.0/16 61.184.0.0/16 61.185.219.232/29 61.188.0.0/16 61.191.0.0/16 61.232.0.0/14 61.236.0.0/15 116.76.0.0/15 116.208.0.0/14 117.21.0.0/16 117.80.0.0/12 118.132.0.0/14 118.144.0.0/14 119.18.192.0/20 121.0.16.0/20 121.8.0.0/13 121.16.0.0/12 121.32.0.0/14 122.51.128.0/17 122.198.0.0/16 122.200.64.0/18 123.4.0.0/14 123.52.0.0/14 123.97.128.0/17 123.100.0.0/19 123.128.0.0/13 123.232.0.0/14 124.42.64.0/18 124.114.0.0/15 124.200.0.0/13 124.236.0.0/14 125.40.0.0/13 125.80.0.0/13 159.226.0.0/16 202.66.0.0/16 202.96.0.0/12 202.96.128.0/18 202.108.0.0/16 202.114.64.0/20 203.69.0.0/16 203.93.0.0/16 203.169.160.0/19 210.5.0.0/19 210.14.128.0/19 210.21.0.0/16 210.51.0.0/16 210.52.0.0/15 210.192.96.0/19 211.76.96.0/20 211.78.208.0/20 211.90.0.0/15 211.136.0.0/13 211.233.70.0/24 211.144.12.0/22 211.144.160.0/20 211.147.208.0/20 211.152.14.0/24 211.154.128.0/19 211.157.32.0/19 211.161.24.128/26 218.0.0.0/11 218.56.0.0/13 218.64.0.0/11 218.96.0.0/14 218.102.0.0/16 218.104.0.0/14 218.194.80.0/20 218.242.0.0/16 218.246.0.0/16 219.128.0.0/11 219.232.0.0/19 220.160.0.0/11 220.181.0.0/16 220.192.0.0/12 220.228.70.0/24 220.248.0.0/14 220.250.0.0/19 220.252.0.0/16 221.0.0.0/12 221.122.0.0/15 221.192.0.0/14 221.200.0.0/14 221.208.0.0/14 221.212.0.0/16 221.216.0.0/13 221.224.0.0/13 221.228.0.0/14 221.238.0.0/15 222.32.0.0/11 222.76.0.0/14 222.80.0.0/12 222.136.0.0/13 222.166.0.0/16 222.168.0.0/15 222.172.222.0/24 222.184.0.0/13

# Hong Kong
deny from 58.65.232.0/21 59.148.0.0/15 123.242.229.0/24 202.69.64.0/19 202.85.128.0/19 202.133.8.0/21 210.176.0.0/19 210.176.48.0/20 210.176.64.0/18 210.176.128.0/17 210.177.0.0/16 218.252.0.0/14 222.166.0.0/16

# India and Pakistan
deny from 59.88.0.0/15 61.247.238.0/24 193.53.87.0/24 121.240.0.0/13 122.160.0.0/16 122.167.0.0/16 202.154.224.0/24

# Japan (hacking, scraping, or spamming)
deny from 118.13.128.0/17 118.86.0.0/15 122.208.0.0/12 123.216.0.0/13 150.70.84.41 218.225.179.0/24 219.125.233.0/24 221.121.160.0/20 222.144.0.0/13

# Korea IP addresses follow:
deny from 58.72.0.0/13 58.140.0.0/14 58.180.40.0/21 58.224.0.0/12 59.0.0.0/11 59.86.192.0/18 59.186.0.0/15 61.96.0.0/12 61.110.16.0/20 61.248.0.0/13 113.30.64.0/18 116.40.0.0/16 116.45.176.0/20 116.120.0.0/13 117.110.0.0/15 118.32.0.0/11 118.128.0.0/14 118.220.16.0/20 121.128.0.0/10 122.44.112.0/20 122.99.128.0/17 123.111.0.0/16 123.140.0.0/14 124.0.0.0/15 124.50.87.161 125.128.0.0/11 125.176.0.0/12 125.240.0.0/13 143.248.0.0/16 202.133.16.0/20 202.179.176.0/21 210.93.0.0/16 210.94.0.0/15 210.112.0.0/16 210.118.216.192/26 210.178.0.0/15 210.180.0.0/15 210.204.0.0/15 210.219.0.0/16 211.32.0.0/12 211.48.0.0/15 211.50.0.0/15 211.62.35.0/24 211.104.0.0/13 211.112.0.0/13 211.168.0.0/14 211.172.0.0/14 211.176.0.0/12 211.192.0.0/13 211.202.0.0/16 211.211.36.0/23 211.232.0.0/13 211.240.0.0/12 218.36.0.0/14 218.144.138.0/26 218.147.0.0/16 218.232.120.0/25 218.234.18.0/24 219.240.0.0/15 219.248.0.0/13 219.250.88.0/21 220.73.22.160/27 220.95.88.0/24 220.118.0.0/16 220.119.0.0/16 221.128.0.0/12 221.144.0.0/12 221.160.0.0/13 221.168.0.0/16 221.163.46.0/24 222.96.0.0/12 222.112.0.0/13 222.120.0.0/15 222.122.0.0/16 222.231.0.0/18

# Neighboring Asian countries:

# Malaysia
deny from 60.48.0.0/14 60.52.0.0/15 60.54.0.0/16 112.137.160.0/20 116.206.0.0/16 124.82.0.0/16 124.217.224.0/19 202.58.80.0/20 202.71.96.0/20 202.75.32.0/19 203.223.128.0/19 210.187.49.0/25 218.111.0.0/16 218.208.12.64/27

# Phillipines
deny from 85.92.152.0/21 125.60.128.0/17 202.133.192.0/24 222.127.32.0/19 222.127.64.0/19

# Singapore
deny from 59.189.0.0/16 116.14.0.0/15 121.6.0.0/15 165.21.0.0/16 203.92.64.0/18 218.212.0.0/16 219.74.0.0/16 219.75.0.0/17

# Taiwan
deny from 59.124.0.0/14 61.31.0.0/16 115.85.144.0/20 122.116.0.0/15 203.71.0.0/16 203.72.0.0/16 210.59.0.0/17 211.21.0.0/16 211.23.0.0/16 211.75.0.0/16 211.79.32.0/20 218.160.0.0/12 219.84.0.0/15

# Thailand
deny from 58.8.0.0/16 58.9.0.0/16 58.137.13.0/24 61.19.64.0/18 117.47.0.0/16 124.120.0.0/16 124.121.0.0/16 124.122.0.0/16 202.28.0.0/15 202.44.135.0/24 202.133.128.0/18 202.143.128.0/18 203.107.142.0/24 203.113.13.0/24 203.144.128.0/17 203.148.128.0/17 203.149.0.0/18 203.150.128.0/17 203.151.38.0/24 203.155.0.0/16 203.158.96.0/19 203.158.128.0/17 203.172.128.0/17 210.213.0.0/18 222.123.0.0/16

# Vietnam
deny from 58.186.0.0/16 58.187.112.0/20 116.96.0.0/12 117.0.0.0/13 118.68.0.0/14 123.16.0.0/14 125.234.0.0/15 203.113.128.0/18 203.162.0.0/16 210.245.80.0/21

# End Chinese/Korean blocklist

# Add other blocked domain names or IP addresses here, starting with "deny from " without quotes

# If you find that you need to poke a hole in the blocklist, for legitimate visitors, follow this example: allow from 123.456.789.0

# Add "allow from" IP addresses, or CIDR Ranges, after all of the "deny from" items, just before the closing Files tag.

# Everything not included within these deny from ranges is PERMITTED by the allow portion of the directive.

allow from 89.16.177.129

</Files>

# This prevents web browsers or spiders from seeing your .htaccess directives:
<Files .htaccess>
deny from all
</Files>

AddDefaultCharset utf-8

RewriteEngine on
RewriteRule ^(w*)$ /index.php

On Github License

Files

Download PDF of Htaccess file

Comments

Apache