Looking at my server error logs, I see a lot of attempts from IP addresses in China, Thailand, and whatnot trying to access non-existent directories called "manager", "phpmyadmin", "admin", anything in cgi-bin, and the like. There are a couple odd repeated requests for something called "w00tw00t.at.blackhats.romanian.anti-sec:" and "HNAP1".
I was thinking of figuring out how to write an .htaccess rule to redirect the request back to the requesting IP address, but wondered if there were other nasty tricks that would frustrate these dirtbags, given that the same 4 or 5 nonexistent directories are always attempted.
Update: Following the suggestion of "Michael - sqlbot" below, I attempted to set up mod_security on my server as a tarpit. I installed it just fine, and configured it, but even though I can verify it's compiling my configuration script (verified by introducing a syntax error and restarting httpd), it seems to be ignoring the undesirable access attempts.
Here's what I have in /etc/httpd/modsecurity.d/activated_rules/tarpit.conf
<IfModule mod_security2.c>
SecRuleEngine On
SecDefaultAction log,allow,status:406,phase:2
SecRule REQUEST_URI phpmyadmin t:lowercase,id:14142,pause:5000,log,noauditlog,status:402,deny
SecDebugLog /var/log/httpd/modsec_debug.log
SecDebugLogLevel 0
</IfModule>
The modsec_debug.log file is created initially but always empty. Requesting mydomain.com/phpmyadmin just returns the usual 403 error as if mod_security wasn't there. (I am not sure why I am getting the 403 error, maybe it's due to an old symlink I had to the phpmyadmin directory, which hasn't been there for a long time).