20150288715 | Systems And Methods For Protecting Websites From Botnet Attacks - A computer-implemented method for preventing an unauthorized login attempt includes the steps of: (i) receiving, at a central server in communication with a plurality of servers in a distributed computing network, a first communication comprising a security key and an IP address associated with an entity attempting to login to a website hosted by a server; (ii) comparing, by the central server, the received security key to a stored list of security keys; (iii) authenticating the first communication if the received security key matches one of the stored security keys; (iv) comparing, by the central server, the received IP address to blacklisted IP addresses; (v) determining whether the received IP address is one of the blacklisted IP addresses; and (vi) providing, to the server, an indication of whether the IP address is one of the blacklisted IP addresses. | 10-08-2015 |