Yes, I've blocked most of the IP's that are trying to leach the lists.
Still working on an auth system that is reliable. I think it's going to have to be based on the the Cloud DNS.. [/ip cloud set ddns-enable=yes] is going to be required, unless MikroTik gives me a way to authenticate better than that.
Good times, thankyou.
“Oh bugger” he says with his CHR! I may end up notifying you of my static IP and hoping you’d do me a solid then?
A question, do I need BOTH a firewall filter rule AND a raw drop rule? I’m currently using just raw drop rules for source and then another for destination of the BL but wondered if there was any gain in running a filter rule of each as well? (Appreciate I could create rules and watch counters but wondering on your recommendation).