Sometimes you just need to resort to something simple.
I don’t recommend this in anyway for a real security plan / hardening. You should be using something proper if you’re under these kinds of malicious attacks.
But, in Azure Web Apps you can add IP Address blocking via the IIS “Dynamic IP Restrictions” Module .
While I think this is the “wrong” way to do this (a real firewall should be in place), I was able to “block” IP addresses in Azure Web Apps (site) by using an applicationHost.xdt transform like so:
This becomes a “site” extension – and is deployed as a Site Extension https://github.com/projectkudu/kudu/wiki/Azure-Site-Extensions
This modifies the applicationHost.config for your Web App. https://azure.microsoft.com/en-us/documentation/articles/web-sites-transform-extend/
<?xml version="1.0"?> <configuration xmlns:xdt="http://schemas.microsoft.com/XML-Document-Transform"> <system.webServer> <security> <ipSecurity allowUnlisted="true" xdt:Transform="Replace"> <add ipAddress="126.96.36.199"/> </ipSecurity> </security> </system.webServer> </configuration>