Title: Advise
Last modified: August 21, 2016

---

# Advise

 *  Resolved [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/)
 * On what i can do to block this
    `http://from-the-sidelines.blogspot.co.uk/2013/
   12/forget-mystery-meat-how-about-mystery.html`
 * Coming from all different IPs different countries.
 * [http://wordpress.org/plugins/bulletproof-security/](http://wordpress.org/plugins/bulletproof-security/)

Viewing 15 replies - 1 through 15 (of 73 total)

1 [2](https://wordpress.org/support/topic/advise-1/page/2/?output_format=md) [3](https://wordpress.org/support/topic/advise-1/page/3/?output_format=md)
[4](https://wordpress.org/support/topic/advise-1/page/4/?output_format=md) [5](https://wordpress.org/support/topic/advise-1/page/5/?output_format=md)
[→](https://wordpress.org/support/topic/advise-1/page/2/?output_format=md)

 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518013)
 * Well first off blocking IP addresses is very time consuming and goes on till 
   the end of time and is a waste of time.
 * From what I understand of the link you posted this person saw a referer spam 
   link in his stats, which he then clicked to see what it was. It turns out the
   link goes to a phishing site of sorts and possibly a site that can infect your
   computer with a virus or malware IF you do not have some sort of security app
   installed on your computer.
 * So my question to you is: What do you want to block? Since this is a classic 
   lure link to lure you to a bad site the obvious solution is to not click on the
   link.
 *  Thread Starter [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518032)
 * Understood, my stats are all messed up due to this though so i guess other than
   block all other countries not a lot i can do? cheers
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518051)
 * Instead of trying to block by IP address you can use part of the Referer URI/
   URL and block that. This code would only work if the Referer site is the dummy
   site that contains the phishing/malware Referer URI/URL. In theory it would work
   based on the scenario that is explained in the link you posted above.
 *     ```
       # Block/Forbid dummies based on Referer
       RewriteCond %{HTTP_REFERER} ^.*(dummy1.com|dummy2.com).*$ [NC]
       RewriteRule ^(.*)$ - [F,L]
       ```
   
 * This custom code would go in this Custom Code text box: **CUSTOM CODE BOTTOM 
   HOTLINKING/FORBID COMMENT SPAMMERS/BLOCK BOTS/BLOCK IP/REDIRECT CODE: Add miscellaneous
   code here **
 * Click the Save Root Custom Code button.
 * Go to the Security Modes page, click the AutoMagic buttons for your site type
   and activate Root folder BulletProof Mode again.
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518052)
 * Actually in order for the rule to work on all URL levels above the root URL level
   you would need to incorporate it into the BPS Query String Exploits block of 
   code.
 * Copy the entire block of BPS Query String Exploits code into this Custom Code
   text box: **CUSTOM CODE BPSQSE BPS QUERY STRING EXPLOITS: Modify Query String
   Exploit code here**
 * Then edit the block of BPS Query String Exploits code and add this anywhere in
   that block of code. For this example I added it at the very top of the code.
 *     ```
       ...
       ...
       ...
       # If you want a list of bad bots / User Agents to block then scroll to the end of this file.
       RewriteCond %{HTTP_REFERER} ^.*(dummy1.com|dummy2.com).*$ [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR]
       ...
       ...
       ...
       ```
   
 * Click the Save Root Custom Code button.
 * Go to the Security Modes page, click the AutoMagic buttons for your site type
   and activate Root folder BulletProof Mode again.
 *  Thread Starter [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518056)
 * Hi Thank you.
    I understood first post (4th actually) but your last post i,m 
   unsure what i i now should put in **CUSTOM CODE BPSQSE BPS QUERY STRING EXPLOITS:
   Modify Query String Exploit code here**
 * Copy the entire block of BPS Query String Exploits code into this Custom Code
   text box:?
    Is that
 *     ```
       # BEGIN BPSQSE BPS QUERY STRING EXPLOITS
       # The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too.
       # Good sites such as W3C use it for their W3C-LinkChecker.
       # Add or remove user agents temporarily or permanently from the first User Agent filter below.
       # If you want a list of bad bots / User Agents to block then scroll to the end of this file.
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|python|nikto|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|python|nikto|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR]
       RewriteCond %{THE_REQUEST} \?\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} \/\*\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} etc/passwd [NC,OR]
       RewriteCond %{THE_REQUEST} cgi-bin [NC,OR]
       RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR]
       RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR]
       RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR]
       RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR]
       RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR]
       RewriteCond %{QUERY_STRING} (\.\./|\.\.) [OR]
       RewriteCond %{QUERY_STRING} ftp\: [NC,OR]
       RewriteCond %{QUERY_STRING} http\: [NC,OR]
       RewriteCond %{QUERY_STRING} https\: [NC,OR]
       RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)cPath=http://(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR]
       RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR]
       RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR]
       RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR]
       RewriteCond %{QUERY_STRING} (\./|\../|\.../)+(motd|etc|bin) [NC,OR]
       RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR]
       RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR]
       RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR]
       RewriteCond %{QUERY_STRING} (sp_executesql) [NC]
       RewriteRule ^(.*)$ - [F,L]
       # END BPSQSE BPS QUERY STRING EXPLOITS
       ```
   
 * So now
 *     ```
       # BEGIN BPSQSE BPS QUERY STRING EXPLOITS
       # The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too.
       # Good sites such as W3C use it for their W3C-LinkChecker.
       # Add or remove user agents temporarily or permanently from the first User Agent filter below.
       # If you want a list of bad bots / User Agents to block then scroll to the end of this file.
       # If you want a list of bad bots / User Agents to block then scroll to the end of this file.
       RewriteCond %{HTTP_REFERER} ^.*(dummy1.com|dummy2.com).*$ [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|python|nikto|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|python|nikto|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR]
       RewriteCond %{THE_REQUEST} \?\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} \/\*\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} etc/passwd [NC,OR]
       RewriteCond %{THE_REQUEST} cgi-bin [NC,OR]
       RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR]
       RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR]
       RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR]
       RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR]
       RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR]
       RewriteCond %{QUERY_STRING} (\.\./|\.\.) [OR]
       RewriteCond %{QUERY_STRING} ftp\: [NC,OR]
       RewriteCond %{QUERY_STRING} http\: [NC,OR]
       RewriteCond %{QUERY_STRING} https\: [NC,OR]
       RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)cPath=http://(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR]
       RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR]
       RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR]
       RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR]
       RewriteCond %{QUERY_STRING} (\./|\../|\.../)+(motd|etc|bin) [NC,OR]
       RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR]
       RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR]
       RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR]
       RewriteCond %{QUERY_STRING} (sp_executesql) [NC]
       RewriteRule ^(.*)$ - [F,L]
       # END BPSQSE BPS QUERY STRING EXPLOITS
       ```
   
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518057)
 * Yes, that is correct. And you could even just combine this rule/security filter
   into the other Referer rule/security filters if you wanted to do that instead.
 *     ```
       RewriteCond %{HTTP_REFERER} ^.*(\.opendirviewer\.|users\.skynet\.be|dummy1.com|dummy2.com).* [NC,OR]
       ```
   
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518058)
 * In general, we intentionally made the BPS Query String block of code a bit redundant
   in order to show examples of possible security filters to add.
 *  Thread Starter [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518059)
 * SO add this to **CUSTOM CODE BPSQSE BPS QUERY STRING EXPLOITS: Modify Query String
   Exploit code here
 *     ```
       # BEGIN BPSQSE BPS QUERY STRING EXPLOITS
       # The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too.
       # Good sites such as W3C use it for their W3C-LinkChecker.
       # Add or remove user agents temporarily or permanently from the first User Agent filter below.
       # If you want a list of bad bots / User Agents to block then scroll to the end of this file.
       RewriteCond %{HTTP_REFERER} ^.*(\.opendirviewer\.|users\.skynet\.be|dummy1.com|dummy2.com).* [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|python|nikto|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|python|nikto|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR]
       RewriteCond %{THE_REQUEST} \?\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} \/\*\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} etc/passwd [NC,OR]
       RewriteCond %{THE_REQUEST} cgi-bin [NC,OR]
       RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR]
       RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR]
       RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR]
       RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR]
       RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR]
       RewriteCond %{QUERY_STRING} (\.\./|\.\.) [OR]
       RewriteCond %{QUERY_STRING} ftp\: [NC,OR]
       RewriteCond %{QUERY_STRING} http\: [NC,OR]
       RewriteCond %{QUERY_STRING} https\: [NC,OR]
       RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)cPath=http://(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR]
       RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR]
       RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR]
       RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR]
       RewriteCond %{QUERY_STRING} (\./|\../|\.../)+(motd|etc|bin) [NC,OR]
       RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR]
       RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR]
       RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR]
       RewriteCond %{QUERY_STRING} (sp_executesql) [NC]
       RewriteRule ^(.*)$ - [F,L]
       # END BPSQSE BPS QUERY STRING EXPLOITS
       ```
   
 *  Thread Starter [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518061)
 * I use Events Manager i read somewhere this causes issues with searches in the
   site or am i misunderstanding that?
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518062)
 * And just to be safe and not accidentally block any good Referer domains add a
   backslash for the domain’s domain name.
 * `RewriteCond %{HTTP_REFERER} ^.*(\.opendirviewer\.|users\.skynet\.be|dummy1\.
   com|dummy2\.com).* [NC,OR]`
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518063)
 * I would need an example of what you are talking about regarding Events Manager
   in order to provide any sort of answer.
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518064)
 * And then delete these security rules/filters since you have combined them into
   another rule/filter or leave them.
 *     ```
       RewriteCond %{HTTP_REFERER} \.opendirviewer\. [NC,OR]
       RewriteCond %{HTTP_REFERER} users\.skynet\.be.* [NC,OR]
       ```
   
 *  Thread Starter [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518065)
 * might be nothing to do with this though
    [http://wordpress.org/support/topic/allowing-and-in-events-managers-searches?replies=23](http://wordpress.org/support/topic/allowing-and-in-events-managers-searches?replies=23)
 *  Plugin Author [AITpro](https://wordpress.org/support/users/aitpro/)
 * (@aitpro)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518066)
 * If you want to allow searches in Events Manager that use the single quote code
   character then you would make the modifications to the BPS Query String block
   of code in Custom Code. Personally I do not recommend doing that. It is up to
   you of course.
 *  Thread Starter [mrppp](https://wordpress.org/support/users/mrppp/)
 * (@mrppp)
 * [12 years, 4 months ago](https://wordpress.org/support/topic/advise-1/#post-4518067)
 * \\\\\\\\\\\\ok think this should be correct
 *     ```
       # BEGIN BPSQSE BPS QUERY STRING EXPLOITS
       # The libwww-perl User Agent is forbidden - Many bad bots use libwww-perl modules, but some good bots use it too.
       # Good sites such as W3C use it for their W3C-LinkChecker.
       # Add or remove user agents temporarily or permanently from the first User Agent filter below.
       # If you want a list of bad bots / User Agents to block then scroll to the end of this file.
       RewriteCond %{HTTP_REFERER} ^.*(\.opendirviewer\.|users\.skynet\.be|dummy1\.com|dummy2\.com).* [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|wget|python|nikto|curl|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (havij|libwww-perl|python|nikto|scan|java|winhttp|clshttp|loader) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{HTTP_USER_AGENT} (;|<|>|'|"|\)|\(|%0A|%0D|%22|%27|%28|%3C|%3E|%00).*(libwww-perl|python|nikto|scan|java|winhttp|HTTrack|clshttp|archiver|loader|email|harvest|extract|grab|miner) [NC,OR]
       RewriteCond %{THE_REQUEST} \?\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} \/\*\ HTTP/ [NC,OR]
       RewriteCond %{THE_REQUEST} etc/passwd [NC,OR]
       RewriteCond %{THE_REQUEST} cgi-bin [NC,OR]
       RewriteCond %{THE_REQUEST} (%0A|%0D|\\r|\\n) [NC,OR]
       RewriteCond %{REQUEST_URI} owssvr\.dll [NC,OR]
       RewriteCond %{HTTP_REFERER} (%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=http:// [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=(\.\.//?)+ [OR]
       RewriteCond %{QUERY_STRING} [a-zA-Z0-9_]=/([a-z0-9_.]//?)+ [NC,OR]
       RewriteCond %{QUERY_STRING} \=PHP[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} [NC,OR]
       RewriteCond %{QUERY_STRING} (\.\./|\.\.) [OR]
       RewriteCond %{QUERY_STRING} ftp\: [NC,OR]
       RewriteCond %{QUERY_STRING} http\: [NC,OR]
       RewriteCond %{QUERY_STRING} https\: [NC,OR]
       RewriteCond %{QUERY_STRING} \=\|w\| [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)/self/(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} ^(.*)cPath=http://(.*)$ [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*script.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^s]*s)+cript.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*embed.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^e]*e)+mbed.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*object.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^o]*o)+bject.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (\<|%3C).*iframe.*(\>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|%3C)([^i]*i)+frame.*(>|%3E) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_encode.*\(.*\) [NC,OR]
       RewriteCond %{QUERY_STRING} base64_(en|de)code[^(]*\([^)]*\) [NC,OR]
       RewriteCond %{QUERY_STRING} GLOBALS(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} _REQUEST(=|\[|\%[0-9A-Z]{0,2}) [OR]
       RewriteCond %{QUERY_STRING} ^.*(\(|\)|<|>|%3c|%3e).* [NC,OR]
       RewriteCond %{QUERY_STRING} ^.*(\x00|\x04|\x08|\x0d|\x1b|\x20|\x3c|\x3e|\x7f).* [NC,OR]
       RewriteCond %{QUERY_STRING} (NULL|OUTFILE|LOAD_FILE) [OR]
       RewriteCond %{QUERY_STRING} (\./|\../|\.../)+(motd|etc|bin) [NC,OR]
       RewriteCond %{QUERY_STRING} (localhost|loopback|127\.0\.0\.1) [NC,OR]
       RewriteCond %{QUERY_STRING} (<|>|'|%0A|%0D|%27|%3C|%3E|%00) [NC,OR]
       RewriteCond %{QUERY_STRING} concat[^\(]*\( [NC,OR]
       RewriteCond %{QUERY_STRING} union([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} union([^a]*a)+ll([^s]*s)+elect [NC,OR]
       RewriteCond %{QUERY_STRING} \-[sdcr].*(allow_url_include|allow_url_fopen|safe_mode|disable_functions|auto_prepend_file) [NC,OR]
       RewriteCond %{QUERY_STRING} (;|<|>|'|"|\)|%0A|%0D|%22|%27|%3C|%3E|%00).*(/\*|union|select|insert|drop|delete|update|cast|create|char|convert|alter|declare|order|script|set|md5|benchmark|encode) [NC,OR]
       RewriteCond %{QUERY_STRING} (sp_executesql) [NC]
       RewriteRule ^(.*)$ - [F,L]
       # END BPSQSE BPS QUERY STRING EXPLOITS
       ```
   

Viewing 15 replies - 1 through 15 (of 73 total)

1 [2](https://wordpress.org/support/topic/advise-1/page/2/?output_format=md) [3](https://wordpress.org/support/topic/advise-1/page/3/?output_format=md)
[4](https://wordpress.org/support/topic/advise-1/page/4/?output_format=md) [5](https://wordpress.org/support/topic/advise-1/page/5/?output_format=md)
[→](https://wordpress.org/support/topic/advise-1/page/2/?output_format=md)

The topic ‘Advise’ is closed to new replies.

 * ![](https://ps.w.org/bulletproof-security/assets/icon-128x128.png?rev=1731938)
 * [BulletProof Security](https://wordpress.org/plugins/bulletproof-security/)
 * [Support Threads](https://wordpress.org/support/plugin/bulletproof-security/)
 * [Active Topics](https://wordpress.org/support/plugin/bulletproof-security/active/)
 * [Unresolved Topics](https://wordpress.org/support/plugin/bulletproof-security/unresolved/)
 * [Reviews](https://wordpress.org/support/plugin/bulletproof-security/reviews/)

 * 73 replies
 * 3 participants
 * Last reply from: [AITpro](https://wordpress.org/support/users/aitpro/)
 * Last activity: [12 years, 2 months ago](https://wordpress.org/support/topic/advise-1/page/5/#post-4518288)
 * Status: resolved