| 10:57 pm on Nov 28, 2011 (gmt 0)|
Note AWS-related prefix below --
= "Stellar.io is a domain controlled by four domain name servers at awsdns-22.org, awsdns-63.net, awsdns-09.com and awsdns-40.co.uk." [robtex.com...]
Noteworthy: awsdns- (Includes employee pet sites/projects?)
| 10:57 pm on Nov 29, 2011 (gmt 0)|
Got hits from shopwiki bot today, looking genuine but from an AWS range.
UA: ShopWiki/1.0 ( +http://www.shopwiki.com/wiki/Help:Bot)
If this is genuine then goodbye shopwiki.
| 12:36 am on Nov 30, 2011 (gmt 0)|
I allowed them for a while since I do sell products, but they were crawling the entire site every day of the week, so I now stop them at robots.txt.
So far Shopwiki has always obeyed the deny in robots.txt.
dstiles - one of the (many) irritating dynamics of AWS is the unaccountability. I'm interested in how you would confirm this is a valid Shopwiki bot if coming from an AWS range?
| 10:40 pm on Nov 30, 2011 (gmt 0)|
You're right, but I did say "looking genuine" and "if this is genuine". Without a proper rDNS I cannot be sure it's valid except for the crawl pattern, which looks as extensive as others.
My own findings are that shopwiki does not always give a proper rDNS. Of three ranges I get bots from, only one seems to resolve and that is their acknowledged IP range. Two that do not are in Hurricane and XO ranges; they seem to work as expected and not as forgeries.
Yes, the bot crawls every day, as do other SEs that have the capacity (G, B etc). The proper way is to change the cache header times (expire and cachecontrol) from (eg) 24 hours to 240 hours. That should fix the problem. If not, ask the SE why not (NB: it may still crawl to check the timing but should be happy with the header and not reload the complete page.
The above is partly conjectural for SEs as my sites all ask for 24 hour refresh periods. Does anyone have further onfo on this?
| 9:46 pm on Dec 1, 2011 (gmt 0)|
FWIW... Baby-botnet bedfellows:
184.108.40.206 <= S. Korea: Threat 22: [projecthoneypot.org...]
220.127.116.11 <= Taiwan: Threat 21 [projecthoneypot.org...]
18.104.22.168 <= Slovakia: Threat 27 [projecthoneypot.org...]
ec2-50-19-13-173.compute-1.amazonaws.com <= Threat 26 [projecthoneypot.org...]
Faked UA of choice today:
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; FunWebProducts; .NET CLR 1.1.4322; PeoplePal 6.2)
| 7:37 pm on Dec 3, 2011 (gmt 0)|
This just in... Kindle Fire's Silk hit html files, graphics, and favicon from amazonaws.com AND, seconds later, from Comcast: [webmasterworld.com...]
| 1:34 pm on Dec 11, 2011 (gmt 0)|
I reckon this is G spoofery:
| 8:39 pm on Dec 19, 2011 (gmt 0)|
I don't understand the connections, but thought I'd report in because of the surprise tie-in(s) I found after noting a hit from a .zae.cc domain:
= 22.214.171.124/16 Amazon IAD prefix
You'll see that IP and many, many, many more via this extensive (albeit based in Turkey) eye-opener --
Sites published on ISP: Amazon.com, Inc. (598) [livepageranks.com...]
(imagine the data Amazon AWS gets a crack at from hosting all those!)
-- including aggressive Twitter-swarmer bot-runner "paper.li", as in:
Mozilla/5.0 (compatible; PaperLiBot/2.1; httpt://support.paper.li/entries/20023257-what-is-paper-li)
| 7:33 pm on Jan 6, 2012 (gmt 0)|
Same-second hits from:
Quora Link Preview/1.0 (http://www.quora.com)
More details in the just-posted "Quora Link Preview" [webmasterworld.com...]
| 6:40 pm on Jan 12, 2012 (gmt 0)|
UA: SkimBot/1.0 (www.skimlinks.com <firstname.lastname@example.org>)
Coming from these AWS ranges:
| 5:01 pm on Jan 17, 2012 (gmt 0)|
New (to me) Amazon range, registered September 2011...
NetRange: 126.96.36.199 - 188.8.131.52
Comment: The activity you have detected originates from a dynamic hosting environment.
Single hit today from bot calling itself linkdex.com/v2.0. No idea about robots.txt without delving deeper. Page was an unusual mid-site one.
| 7:01 pm on Jan 17, 2012 (gmt 0)|
Thanks dstiles, I didn't have that range.
| 7:17 am on Jan 22, 2012 (gmt 0)|
1.) Name change. Note space before closing paren:
SkimBot/1.0 (www.skimlinks.com )
That was from AWS CIDRs:
2.) 'Nother bot (184.108.40.206/16 again):
| 8:30 am on Jan 22, 2012 (gmt 0)|
2.) 'Nother bot (220.127.116.11/16 again):
I use a wider ban:
18.104.22.168 - 22.214.171.124
| 9:02 pm on Jan 22, 2012 (gmt 0)|
| 9:44 pm on Jan 22, 2012 (gmt 0)|
Speaking of wider bans... Recently I spent some time tracking (the) Amazon back to its sources. With help from robtex [robtex.com...] --
## u1.amazonaws.com; [robtex.com...]
deny from 126.96.36.199/24
## u2.amazonaws.com; [robtex.com...]
deny from 188.8.131.52/24
## u3.amazonaws.com / u3.amazonaws.info; [robtex.com...]
## u3.amazonaws.info and u3.amazonaws.com point to 184.108.40.206. Amazonaws.info, amazonaws.org, amazonaws.com, geo.amazonaws.com, compute-1.amazonaws.com and at least six other hosts use 220.127.116.11 as a name server
deny from 18.104.22.168/24
## u4.amazonaws.com; [robtex.com...]
deny from 22.214.171.124/24
## u5.amazonaws.com / u5.amazonaws.org; [robtex.com...]
deny from 126.96.36.199/24
## u6.amazonaws.com / u6.amazonaws.org; [robtex.com...]
deny from 188.8.131.52/24
Just more drops in the literally world-wide AWS bucket.
| 10:11 pm on Jan 22, 2012 (gmt 0)|
Interesting Pfui. AWS may be buying up unused D ranges all over.
| 9:03 am on Feb 2, 2012 (gmt 0)|
And they're infected all over. Literally:
IP Location: Singapore Bedok Amazon Web Services Elastic Compute Cloud Ec2 Sg
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; en) Opera 8.00
Project Honey Pot Threat Rating 26 as of this writing:
= 184.108.40.206 [projecthoneypot.org...]
= .mapmyindia.com [robtex.com...]
| 5:47 pm on Feb 4, 2012 (gmt 0)|
Mozilla/5.0 (TREC-KBA-Bot http://www.mit.edu/~jrf/knowledge-base-acceleration/bot/)
Two hits in one sec. UA info is a dead-end. One dir up has info but not about bot.
| 9:16 pm on Feb 21, 2012 (gmt 0)|
This same Host came through twice, hours apart, so it may be dedicated. Note the exact UA that appears in logs, backslashed/escaped quotes and all:
\"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_2) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.63 Safari/535.7\"
In a word: Idiotic.
| 9:24 pm on Feb 21, 2012 (gmt 0)|
And now one with no UA and a faked instapaper'esque-service referrer. Hard to say who/what's doing what:
Fake REF: Magazinify - Daemon
| 5:49 pm on Feb 23, 2012 (gmt 0)|
Hit from a new (to me) Amazon range today:
Amazon Ireland (IE)
Various sub-ranges registered to FR and NL.
No indication in DNS records that this is cloud but the hit I received was from 88.208.193.nnn (Fasthosts dedicated servers) using an Amazon IP as a proxy. Amazon range appears to be named servers. No obvious registration dates.
Chacking further: I had the range 220.127.116.11/17 blocked as being Amazon but not the first half.
| 3:43 am on Mar 3, 2012 (gmt 0)|
| 5:43 pm on Apr 1, 2012 (gmt 0)|
And another EC2, registered last August, updated four weeks ago, first hit today with the UA:
18.104.22.168 - 22.214.171.124
Are they ever going to stop?
| 6:24 pm on Apr 1, 2012 (gmt 0)|
|Are they ever going to stop? |
perhaps when hell freezes over.
| 7:48 pm on Apr 1, 2012 (gmt 0)|
I don't think they issue weather forecasts for that place. :(
| 9:43 pm on Apr 1, 2012 (gmt 0)|
Fresh from the press
GSLFbot - 126.96.36.199
robots.txt : yes
Couldn't find itself (first visit, what did it expect?)
Went on to the home page where it got a 403, all Amazon ranges are blocked
| 10:06 pm on Apr 1, 2012 (gmt 0)|
I didn't "heads up", because there was some recent discussion of the IP Range:
188.8.131.52 - - [01/Apr/2012:14:31:35 +0100] "GET /robots.txt HTTP/1.1" 200 2536 "" "GSLFbot"
184.108.40.206 - - [01/Apr/2012:14:31:35 +0100] "GET / HTTP/1.1" 301 234 "" "GSLFbot"
220.127.116.11 - - [01/Apr/2012:14:31:35 +0100] "GET / HTTP/1.1" 403 533 "" "GSLFbot"
| 7:42 pm on Apr 4, 2012 (gmt 0)|
I've been getting hammered on several site by this GSLF bot, it has a lot of IP's, they keep changing.
I have been using quick deny on my server to block the IP's individually but this is taking too much of my time.
How can I block the user agent GSLF? I think it ignores robots.
Is this the best way to block, meaning by blocking the user agent?
| 7:59 pm on Apr 4, 2012 (gmt 0)|
Block every IP range belonging to Amazon. That's what many of us here are doing and it blocks a LOT of bots. You can find all the ranges we know about in this thread.
| 8:28 pm on Apr 4, 2012 (gmt 0)|
|Block every IP range belonging to Amazon |
Are you guys just blocking using IP Deny in shared hosting or quick deny in the Firewall on a VPS server?
About the ranges, is /24 the one that includes the entire range?
I see some people using /18, /15..etc?
| This 88 message thread spans 3 pages: < < 88 ( 1  3 ) > > |