searxng/searx/botdetection
Markus Heiser 52f1452c09 [mod] limiter: ip_limt - monitore suspicious IPs
To intercept bots that get their IPs from a range of IPs, there is a
``SUSPICIOUS_IP_WINDOW``.  In this window the suspicious IPs are stored for a
longer time.  IPs stored in this sliding window have a maximum of
``SUSPICIOUS_IP_MAX`` accesses before they are blocked.  As soon as the IP makes
a request that is not suspicious, the sliding window for this IP is droped.

Signed-off-by: Markus Heiser <markus.heiser@darmarit.de>
2023-06-01 14:38:53 +02:00
..
__init__.py [mod] limiter -> botdetection: modularization and documentation 2023-05-29 14:54:56 +02:00
http_accept_encoding.py [mod] limiter: add config file /etc/searxng/limiter.toml 2023-06-01 14:38:53 +02:00
http_accept_language.py [mod] limiter: add config file /etc/searxng/limiter.toml 2023-06-01 14:38:53 +02:00
http_accept.py [mod] limiter: add config file /etc/searxng/limiter.toml 2023-06-01 14:38:53 +02:00
http_connection.py [mod] limiter: add config file /etc/searxng/limiter.toml 2023-06-01 14:38:53 +02:00
http_user_agent.py [mod] limiter: add config file /etc/searxng/limiter.toml 2023-06-01 14:38:53 +02:00
ip_limit.py [mod] limiter: ip_limt - monitore suspicious IPs 2023-06-01 14:38:53 +02:00
limiter.py [mod] limiter: add config file /etc/searxng/limiter.toml 2023-06-01 14:38:53 +02:00
limiter.toml [fix] limiter.toml: botdetection.ip_limit turn off link_token by default 2023-06-01 14:38:53 +02:00
link_token.py [mod] limiter -> botdetection: modularization and documentation 2023-05-29 14:54:56 +02:00