It's amazing how many people access my web sites anticipating the ability to hack some lamer wordpress installation. They hit just about every known folder configuration in these efforts and simply afford me an interlude whereby I may block them and their cohorts with wild abandon.
That's exactly what I do.
Then there are the mail server exploit attempts. Trying to gain access to dedicated ports intercepted by a specific set of protocols as though it were merely open and available.
The same pitfalls await these individuals as well. They too get a variety of blocks set before them — some are pretty brazen filling my log with their unsuccessful antics. It's as if they don't realize that the rules for access are theirs to circumvent. A lot of them are sophomoric and laughable.
I am far less likely to block a domestic network than I am a foreign network. After all, my assets are domestic in nature and I'm not looking for a lot of international communication. When the vast bulk of your business is within a ten mile radius what is to be said for a 5,000 mile distance for some packet ?
When you come to my site and you're from a problematic network you likely will not get past that soft minefield I maintain for your elimination. I keep up on the rules of passage because I have gone up against some very formidable exploit attempts and prevailed.
MIT, the psychz network, the dns sites, the reverse variants, and so many of the tor entrance and exit points are filtered due to where they went and how they behaved when they first arrived.
Suffice it to say that you can behave or begone.
I'm not one to suffer exploits laying down and I actively pursue those who would cross my patio with malintent ... not the homeland security program, but "bad" intent.
What began as an effort to share openly with the world has been closed down due to the exploitave nature of too many ... particularly foreign nationals.
Can you say china boys and girls ?