Forum Moderators: Robert Charlton & goodroi
Second, and more technical, you can create a honeypot folder, block it in robots.txt, and ping a random file in that folder from infringing domain so you can catch every single bot IP they are using. For me, it was more than 3K and continuously changing.
Blocking it in robots.txt kinda gives away the honeypot but you can reverse/forward dns googlebot and show them a different robots.txt containing the honeypot and show the attacker robots.txt without honeypot.
$servername = $_SERVER['SERVER_NAME'];
if($servername == 'your-domain.com'){
}elseif($servername == 'your-domain-with-www.com'){
}else{
die("Direct ip access not allowed!");
}
More info: [serverfault.com...]
<script type="text/javascript">
if (parent.frames.length > 0) {
parent.location.href = location.href;
}
</script>
Header append X-FRAME-OPTIONS "deny"