Forum Moderators: open
Regs' recs in this forum are routinely reasonable and bankable re which UAs/strings are more block-worthy than not. Of course, if you're iffy, you can certainly review your logs over time to see whether certain blocks would be more prudent than not on your site(s).
If the former, you can: 403 the UA; 403 the suspicious IP(s); rewrite either/both to a custom error page with a graphic or otherwise obfuscated address (a good happy medium); 301 the worst to 127.0.0.1; etc.
Depending on who-what-where, I prefer a belt-and-suspenders approach. Which means the following Chinese botnet mini-assault on a single site yesterday was 403'd (in more ways than one):
124.115.1.*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 17:47:32
01/10 19:42:14
58.61.164.14*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 17:30:56
01/10 17:31:09
124.115.1.*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 17:18:58
01/10 18:03:41
58.61.164.14*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 17:10:09
01/10 17:49:26
58.61.164.13*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 17:03:37
01/10 17:42:40
58.61.164.4*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 16:33:53
01/10 17:08:20
58.61.164.3*
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
01/10 16:32:17
01/10 18:05:24
For me, "occasional legitimate users" simply cannot have unfettered access using an approx. 9 y.o., unpatched (& w/ bots, probably faked anyway) UA that's a botnet/Zombie fave.
Accept
Accept-Language
Accept-Encoding
Connection
... all of these are more useful.
Jim