So, apparently, mod_qos did not help. Sometimes, the load is too low-level on the network, for Apache modules to effectively mitigate it.
A more low-level block can be tried with iptables.
iptables -I INPUT 2 -p tcp -s z.y.z.w -m comment --comment "whitelist ip 1" -j ACCEPT
iptables -I INPUT 2 -p tcp -s z.a.b.c -m comment --comment "whitelist ip 2" -j ACCEPT
iptables -N WEBTHROTTLE
iptables -A WEBTHROTTLE -m recent --set --name WEB --rsource
iptables -A WEBTHROTTLE -m recent --update --seconds 60 --hitcount 200 --name WEB --rsource -j LOG --log-prefix "Anti Web-Bruteforce: " --log-level notice
iptables -A WEBTHROTTLE -m recent --update --seconds 60 --hitcount 200 --name WEB --rsource -j DROP
iptables -I INPUT 4 -i if-entry -p tcp -m tcp --dport 443 -m state --state NEW -j WEBTHROTTLE
This does require that you already have some INPUT rules. The numbers directly after INPUT are the insertion point in the order of the rules. Everything after that number will shift one number up. In the last rule you should replace with something like eth0/ens192, the interface of entry.
Similar rules can be used on ip6tables.
To get a list of your current rules:
iptables -S INPUT