While I think the correct answer is YES (perhaps by implementing a custom filter), I guess the answer is going to be "use a reverse proxy".
Sent: Tuesday, December 18, 2018 at 6:16 PM From: "Marco Neumann" <[email protected]> To: [email protected] Subject: blocking IP to prevent malicious sparql queries is it possible to block indiviual IPs with the shiro.ini? We receive a number of malicious sparql queries from an IP in France (193.52.210.70) today that continuously issues the following SPARQL query: SELECT ?r (count(*) AS ?count) WHERE{ ?x ?r ?s { SELECT ?s WHERE { ?s a ?o } OFFSET 124639 LIMIT 1000 } } GROUP BY ?s ?r OFFSET 0 LIMIT 10000 resulting in: [2018-12-18 18:10:31] AbstractConnector WARN java.lang.OutOfMemoryError: GC overhead limit exceeded [2018-12-18 18:10:34] Fuseki WARN [424] RC = 500 : GC overhead limit exceeded java.lang.OutOfMemoryError: GC overhead limit exceeded [2018-12-18 18:10:34] Fuseki INFO [424] 500 GC overhead limit exceeded (39.946 s) and pushes fuseki offline for a few minutes. -- --- Marco Neumann KONA
