Try writing a IP netmask to block the traffic from attackers, while allowing HTTP access for the valid users.
Harmful traffic detected.
Click here to learn how netmasks work.