Blacklist

From DISI
Revision as of 20:01, 29 August 2024 by Jgutierrez6 (talk | contribs) (→‎Handy Tips)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

HA! We do not have a blacklist for ZINC, a list of compound vendors who have been difficult or unresponsive in the past. Instead, we simply remove these vendors from ZINC completely.

If you have trouble with a vendor, whether it is failure to deliver, failure to communicate in a timely fashion, or some other reason that makes you not want to do business with them, please write to us so that we incorporate your feedback to make ZINC more useful to everyone.

Thank you John Irwin


Blacklist IP Address

Once in a while, we would have bot submitting huge amount of requests to ZINC and overload our database 1. Figure the problematic IP Address by going to this address below and figuring out the ones with the most requests

http://epyc/server-status

2. Add IP address to blackhole list

ssh epyc
sudo ip route add blackhole <ip_address>

3. Remove the ip address from blacklist (if neccessary)

sudo ip route show // to list the black listed ips
sudo ip route del <ip_address> 

Generally, we remove from the blacklist after 24 hours. If the problem persists, we leave them on the blacklist.

Handy Tips

  1. Check the top 10 IPs that have made requests on HTTPD
    grep -h "\[$(date +'%d/%b/%Y:%H:')" /var/log/httpd/*/access_log | cut -d' ' -f1 | sort | uniq -c | sort -nr | head -n10
  2. Go to server-status of HTTPD proxy hosts to see if any IPs are doing a suspicious amount of requests.
  3. Go to this website to check if an IP is malicious.