Tagged articles
32 articles
Page 1 of 1
Top Architect
Top Architect
Apr 13, 2026 · Operations

How to Block Foreign IPs with Nginx and GeoIP2 – Step‑by‑Step Guide

This article walks through installing the libmaxminddb library, downloading and compiling the ngx_http_geoip2 module, upgrading Nginx to version 1.18, adding the latest GeoLite2 database, configuring Nginx to reject non‑Chinese IPs, and verifying the setup with test requests.

IP blockingNginxSecurity
0 likes · 8 min read
How to Block Foreign IPs with Nginx and GeoIP2 – Step‑by‑Step Guide
Xiao Liu Lab
Xiao Liu Lab
Nov 14, 2025 · Operations

Three Production‑Ready Dynamic IP Blocking Solutions for Nginx (No Manual Reload)

This guide presents three practical, production‑grade methods to dynamically block IP addresses in Nginx—using OpenResty with Redis for millisecond response, fail2ban with log analysis for automated bans, and a pure‑shell file‑watch approach—each with step‑by‑step installation, configuration, and usage instructions.

Fail2banIP blockingOpenResty
0 likes · 8 min read
Three Production‑Ready Dynamic IP Blocking Solutions for Nginx (No Manual Reload)
Ray's Galactic Tech
Ray's Galactic Tech
Oct 13, 2025 · Information Security

How to Implement Dynamic IP Blocking in Nginx: 3 Proven Methods

This guide explains three practical ways to achieve dynamic IP blocking in Nginx—using Fail2ban, Lua with Redis, and Nginx's built‑in limit modules—detailing configuration steps, code examples, advantages, drawbacks, and best‑practice recommendations for various deployment scenarios.

Fail2banIP blockingLua
0 likes · 7 min read
How to Implement Dynamic IP Blocking in Nginx: 3 Proven Methods
Architecture Digest
Architecture Digest
Sep 18, 2025 · Information Security

How to Harden Login APIs: From Brute‑Force to MITM Protection

This article examines common login security risks such as brute‑force attacks, captcha bypass, IP blocking, and man‑in‑the‑middle threats, and proposes layered defenses including password‑retry limits, captcha, phone verification, HTTPS, and encrypted payloads to significantly raise the attack cost.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Harden Login APIs: From Brute‑Force to MITM Protection
Liangxu Linux
Liangxu Linux
May 5, 2025 · Backend Development

How to Dynamically Block IPs with Nginx, Lua, and Redis

This guide explains how to use Nginx, Lua (via OpenResty), and Redis to automatically block any IP that exceeds 60 requests per minute, storing the blacklist in Redis with a default one‑day ban and providing performance optimizations and testing steps.

BackendIP blockingLua
0 likes · 7 min read
How to Dynamically Block IPs with Nginx, Lua, and Redis
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
Architecture Digest
Architecture Digest
Jun 8, 2022 · Backend Development

Blocking Foreign IP Access with Nginx Using the ngx_http_geoip2 Module

This tutorial explains how to prevent overseas IP addresses from reaching a website by installing the libmaxminddb-devel dependency, adding the ngx_http_geoip2 module to Nginx, upgrading to Nginx 1.18, configuring GeoIP2 database paths, mapping country codes, and returning a 404 response for foreign requests.

BackendIP blockingNginx
0 likes · 7 min read
Blocking Foreign IP Access with Nginx Using the ngx_http_geoip2 Module
Architecture Digest
Architecture Digest
Nov 15, 2021 · Information Security

Security Considerations for Designing Login Interfaces

This article examines common security risks such as brute‑force attacks, CAPTCHA bypass, login throttling, IP blocking, man‑in‑the‑middle threats, and outlines practical mitigation techniques including CAPTCHA, rate limiting, IP restrictions, mobile verification, HTTPS enforcement, and data encryption to harden web login functionality.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Liangxu Linux
Liangxu Linux
May 17, 2021 · Operations

Block Foreign IPs Using NGINX ngx_http_geoip2 Module

This step‑by‑step guide shows how to install the libmaxminddb library, compile NGINX with the ngx_http_geoip2 module, download the latest GeoLite2 database, configure geoip2 directives, and verify that foreign IP addresses are blocked with a 404 response.

DevOpsIP blockingNginx
0 likes · 8 min read
Block Foreign IPs Using NGINX ngx_http_geoip2 Module
Open Source Linux
Open Source Linux
May 16, 2021 · Information Security

How to Block Foreign IPs in NGINX Using the GeoIP2 Module

This guide walks you through installing the GeoIP2 dependencies, adding the ngx_http_geoip2 module to NGINX, upgrading NGINX, downloading the latest GeoIP2 database, configuring NGINX to block non‑Chinese IPs, and verifying the setup with test requests.

IP blockingLinuxgeoip2
0 likes · 7 min read
How to Block Foreign IPs in NGINX Using the GeoIP2 Module
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Top Architect
Top Architect
Dec 19, 2020 · Information Security

Designing Secure Login Interfaces: Risks and Countermeasures

This article examines common security threats to login APIs such as brute‑force attacks, man‑in‑the‑middle interception, and credential enumeration, and presents practical countermeasures including captchas, IP and account lockout, mobile verification, HTTPS enforcement, and comprehensive logging to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
Designing Secure Login Interfaces: Risks and Countermeasures
Liangxu Linux
Liangxu Linux
Sep 22, 2020 · Information Security

How to Block Frequent Malicious IPs from Accessing Nginx with iptables

This guide shows how to install Nginx on a RedHat 6.5 system, simulate rapid requests from a malicious IP using ApacheBench, examine the access logs, and then block that IP permanently with an iptables rule or Nginx configuration, verifying the block with curl.

IP blockingLinux securityNginx
0 likes · 7 min read
How to Block Frequent Malicious IPs from Accessing Nginx with iptables
ITPUB
ITPUB
Jun 3, 2016 · Operations

How to Block Specific Country IPs with Nginx and GeoIP on a VPS

This guide explains how to compile Nginx with the GeoIP module, install MaxMind's GeoIP library and database, configure the system linker, and set up Nginx directives to redirect traffic from selected countries to custom pages on a single VPS.

GeoIPIP blockingNginx
0 likes · 5 min read
How to Block Specific Country IPs with Nginx and GeoIP on a VPS
MaGe Linux Operations
MaGe Linux Operations
Feb 4, 2015 · Operations

How to Block Scrapers with Nginx: Simple IP Deny Rules

This guide explains how to identify high‑frequency visitor IPs from Nginx logs and configure Nginx to deny those IPs—or entire ranges—using block files, includes, and reload commands, providing both basic and advanced blocking techniques.

IP blockingNginxOperations
0 likes · 4 min read
How to Block Scrapers with Nginx: Simple IP Deny Rules