I’ve a big problem. i Bought Cloudflare firewall cause 3 months ago i was getting visitor spam on my WHMCS dologin.php path… i added a captcha, but still doesn’t work… so i added Cloudflare and i mitigated the attack.
Now… i don’t know how, but they are bypassing my Cloudflare. i’m getting again 100% CPU usage , they are spamming on www.mydomain.info/billing/dologin.php and website is crashing every minute.
i also cannot block their IP manually cause they are changing IP every action. I don’t know now how to fix… i solved by adding Cloudflare…but now…
This is why it is called a DDoS. You should analyze the details and find patterns for example in URL they are requesting or in User-Agent, although that is not always possible.
I’m not an authorized CF staff (just a user as you) and you should not trust random people. From your story I can tell attacker(s) are serious to conduct a layer 7 attack with ability to bypass jsChallenge (that needs more resources) against you, so ask from support and they may provide such service.
You may want to add the lower() function to your rule, so that:
http.host eq "example.com"
becomes
lower(http.host) eq "example.com"
This will avoid that they bypass the rule by requesting EXAMPLE.COM.
Also, that IP is from an ISP from South Africa. If that is not part of your site’s main market, you may want to add a Block rule for countries (check every IP that has been added to this attack and check their country). If it is a part of your main market, than use Challenge:
(ip.geoip.country in {"ZA" "UA"}) then Challenge.
A better alternative, if your market is mostly local, would be to challenge every country except your own:
(ip.geoip.country ne "IT" and not cf.client.bot)
As @Xaq said, it’s important to find patterns that identify the botnet behind the attack, and act accordingly.