Forum Moderators: open
"Microsoft Internet Explorer/4.40.426 (Windows 95)"
Now to the best of my knowledge a v4.4 was never released which makes me skeptical about this being a real browser - it also seems to be hunting for images and a content type (at least to me) called "www/source".
Also it seems to be able to handle cookies as a basic minimum, but doesn't discard them when it leaves other people's sites - normally this is the sort of behaviour I'd expect from an exploit hunting bot!
Spotted it three times so far;
30.09.2002 21:14:57 @ 65.190.87.105 (Telocity)
02.10.2002 08:45:12 @ 24.196.228.64 (Charter Communications)
03.10.2002 19:31:52 @ 65.190.87.105 (Telocity)
Both addresses are part of large-ish ranges and a quick google for their names turn up DSL/Cable type services. So far they have never requested robots.txt and only load the default document on the root.
If anyone is interested it's requests look like this;
Accept: www/source, text/html, video/mpeg, image/jpeg, image/x-tiff,image/x-rgb, image/x-xbm, image/gif, */*, application/postscript
Host: mysite.example.com
User-Agent: Microsoft Internet Explorer/4.40.426 (Windows 95)
-Tony
[xtra.co.nz...]
Of course this doesn't preclude someone using the user agent for nefarious purposes, but it looks to be a valid (but more or less obsolete) user agent.
I've extracted a list of the user agents that Nitro can use - it's just a list of late 90s browsers which might still be in use - sticky me if you want a copy.
[Edit]
But defaults to:
"Mozilla/3.Mozilla/2.01 (Win95; I)"
The irony is that I've already coded for the default Nitro UA on any pages featuring email addresses and in this case the request failed to pass a set of rules I cooked up so they got given nothing worth the time and effort of scraping the page :)
Cheers for pointing out what I'd forgotten (doh!)
- Tony