My server uses NFTables for its firewall and has a list of over 500 IP addresses that are known to be apart of, or host, botnets, in its ban list. That list is also apart of most routing tables, but I slapped it in there in case my servers router happens not to have those addresses. My server has never generated a 429 (then again, I don't have a forum at this time). If the admins like, I'd be happy to open that list up to them. The full list is available at https://iplists.firehol.org/files/fireh … l1.netset, but to get it to work with mine I had to do some fiddling. (My firewall IP list also blocks all betternet IPs, too, which is a plus. If people wouldn't use it as a ban evasion system, they wouldn't be on there. But they do, so they are.)
"On two occasions I have been asked [by members of Parliament!]: 'Pray, Mr. Babbage, if you put into the machine wrong figures, will the right answers come out ?' I am not able rightly to apprehend the kind of confusion of ideas that could provoke such a question." — Charles Babbage.
My Github