Is ASN 203020 (HOSTROYALE) Responsible for Bot or Legit Traffic?

0
8
Asked By TechyTommy99 On

I'm seeking insights from anyone who has dealt with traffic coming from ASN 203020, also known as HOSTROYALE. Recently, one of our services has been hit with an overwhelming number of requests, reaching millions at peak times. The behavior of this traffic seems more automated than human, which raises some red flags for us. However, since HOSTROYALE is a hosting provider, we're cautious about blocking the entire ASN because there might be legitimate users among them.

Right now, we're temporarily blocking ASN 203020 at the Cloudflare ASN level for stability, but I wonder if this is a good long-term strategy. I'm looking for advice on a few points:

1. Have any of you experienced abuse or scraping from ASN 203020?
2. What methods do you use to differentiate between real user traffic and bot traffic?
3. In situations like this, do you typically:
- Fully block the ASN, or
- Target smaller IP ranges based on behavior?
4. What techniques have you found useful before resorting to a full ASN block? (like rate limiting or analyzing request patterns)

I hope to get shared experiences and best practices to safeguard our infrastructure without blocking potential legitimate traffic!

5 Answers

Answered By ServerGuru19 On

I suggest starting with a temporary block of the ASN and reporting the abusive IPs to HOSTROYALE's abuse email. They take this seriously and generally respond well. They might help address specific problematic IPs without requiring you to block the entire ASN.

Answered By CloudProtectorX On

HOSTROYALE is kind of like the Walmart of hosting providers, so blocking the whole ASN might really hurt legitimate users. Instead of a complete block, check if the traffic is actually reaching your application or just overwhelming your front end. If it’s the latter, using Cloudflare’s filtering options based on user agent or referrer can be more effective. If all the requests are similar, it might be better to rate limit by IP and let the bots exhaust their quotas while allowing real users to get through. That way, you won't accidentally block genuine sites using their service!

Answered By WebScraperSam On

Just send them an abuse report! If it’s suspicious, gather logs and a list of the IPs involved, and follow their reporting procedures. They are strict when it comes to legitimate complaints, and it’s a good step to take since they do cater to less desirable users occasionally.

Answered By BotBuster2023 On

As a bot detection researcher, I can tell you that HOSTROYALE is often used by bot developers. We see a lot of click fraud traffic from their servers. To spot bot behavior from this ASN, I look for signs like browser tampering and specific automation triggers. As far as blocking goes, aiming for individual verification instead of relying on broader ASN blocks tends to be more effective.

Answered By TrafficGuard101 On

When it comes to handling massive scraping, blocking isn't usually the best move. From my experience with a SaaS that faced heavy scraping, a layered approach works wonders. You might want to consider caching aggressively for high-risk sources, slowing down responses to problematic traffic, or intermittently challenging them with captchas to ensure you’re not disrupting legit users. This way, you control unwanted traffic without hindering genuine interactions.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.