Hey, I know I'm a bit late to the party. But I'm looking to protect my company's redis instance from these attacks and your approach looks very promising. Things is, I don't know what to do now that I've written a similar script. Where should I use this code? In the redis.conf file?
Bear in mind, I'm a front end developer, so this is absolutely not my forte. Thanks for the help.