Telegram Web Link
22🔥3💩2
test-ipv6.com will stay online (Score: 150+ in 18 hours)

Link: https://readhacker.news/s/6DHCM
Comments: https://readhacker.news/c/6DHCM

Recent: Retiring Test-Ipv6.com - https://news.ycombinator.com/item/id45481609 - Oct 2025 (185 comments)
19
Ruby Core Takes Ownership of Rubygems and Bundler (🔥 Score: 163+ in 1 hour)

Link: https://readhacker.news/s/6DKSZ
Comments: https://readhacker.news/c/6DKSZ
👎8👍4🔥1
Live Stream from the Namib Desert (🔥 Score: 152+ in 3 hours)

Link: https://readhacker.news/s/6DKUd
Comments: https://readhacker.news/c/6DKUd
🔥1
The Rapper 50 Cent, Adjusted for Inflation (🔥 Score: 174+ in 59 minutes)

Link: https://readhacker.news/s/6DLPg
Comments: https://readhacker.news/c/6DLPg
😁66
Ask HN: How to stop an AWS bot sending 2B requests/month? (Score: 150+ in 12 hours)

Link: https://readhacker.news/c/6DK9Z

I have been struggling with a bot– 'Mozilla/5.0 (compatible; crawler)' coming from AWS Singapore – and sending an absurd number of requests to a domain of mine, averaging over 700 requests/second for several months now.
Thankfully, CloudFlare is able to handle the traffic with a simple WAF rule and 444 response to reduce the outbound traffic.
I've submitted several complaints to AWS to get this traffic to stop, their typical followup is:
We have engaged with our customer, and based on this engagement have determined that the reported activity does not require further action from AWS at this time.
I've tried various 4XX responses to see if the bot will back off, I've tried 30X redirects (which it follows) to no avail.
The traffic is hitting numbers that require me to re-negotiate my contract with CloudFlare and is otherwise a nuisance when reviewing analytics/logs.
I've considered redirecting the entirety of the traffic to aws abuse report page, but at this scall, it's essentially a small DDoS network and sending it anywhere could be considered abuse in itself.
Are there others that have similar experience?
👍91
2025/10/21 22:57:19
Back to Top
HTML Embed Code: