Forum Moderators: open
66.125.173.224
64.160.49.82
64.166.159.198
64.166.156.221
64.165.204.84
64.166.157.42
Does anyone know who/what this is? Any reason not to ban it? A search on google turned up nothing.
I know Amazon webservices uses a bot named "aranhabot" but does this one belong to Amazon?
P.S. - Thanks to all on Webmasterworld for all the good reading. I've been lurking for quite a long time!
So Amazon does have a bot named amzn_assoc. I wonder though why it's comming from pacbell.net.
Last week I banned it using .htaccess because it downloaded over 350 megs of dynamically generated content without once checking robots.txt.
There is more information and discussion about this in this thread [forums.prosperotechnologies.com] on their Associates Board.
I have few hard-and-fast, non-negotiable rules, but this is one: Respect robots.txt or eat 403s.
Jim
P.S. Spinnercee: Welcome to WebmasterWorld!
It's really refreshing to see both Amazon and Alexa respond like this.
BTW, don't I get a "Welcome to WWW", too?!
Where are my manners?!? ... :o
Welcome to WebmasterWorld [webmasterworld.com]!
Let us know how this turns out. If they fix it, I'll unblock them.
Thanks,
Jim
Yes, this UA is a real plonker and it did indeed make a nice *plonk* sound when it hit the bottom of my kill file. Which, BTW, was created by the bad-bot banning script [webmasterworld.com] originally written and posted here on WebmasterWorld by Key_Master, for which I am very grateful. I was encouraged - even goaded - into installing said script by member carfac, for which I am also very grateful. I can't believe I used to try to keep up with this manually!
Thanks,
Jim
dave
BTW, I made some minor changes to Key_Master's script- I added a time stamp (so you can empty out the ones over a week old easily) and a bypass for wap users. I would be happy to send any changes to anyone who wants.
I had a few requests, and the script is not a secret, so I decided to post here. Apologies to Key_Master for hacking his script! Comments welcome- thats why we are in this forum, right? Lets make it all better!
OK, here is the script. See instructions AFTER the script!
#!/usr/local/bin/perl
# Name this script trap.pl, upload it in ASCII mode to your cgi-bin and set the file permissions to CHMOD 755.
# Original script by Key_Master taken from [webmasterworld.com...]
# This is the only variable that needs to be modified. Replace it with the absolute path to your root directory.
$rootdir = "/path/to/root/directory";
# Grab the IP of the bad bot
$visitor_ip = $ENV{'REMOTE_ADDR'};
if ($visitor_ip =~ /^216\.239\.3([3¦7¦9]\.5)$¦^216\.239\.35\.4$/) {
print "Content-type: text/html\n\n";
print "<html>\n";
print "<head>\n";
print "<title>Forward On</title>\n<META NAME=\"robots\" CONTENT=\"NOINDEX,NOFOLLOW\">\n";
print "</head>\n";
print "<body>\n";
print "<p><b>We had an error.<BR>Please return to continue!</b></p>\n";
print "</body>\n";
print "</html>\n";
exit;
}
else {
$visitor_ip =~ s/\./\\\./gi;
# Set Date
$date = scalar localtime ( time );
# Open .htaccess file
open(HTACCESS,"".$rootdir."/bad_ip.txt") ¦¦ die $!;
@htaccess = <HTACCESS>;
close(HTACCESS);
# Write banned IP to .htaccess file
open(HTACCESS,">".$rootdir."/bad_ip.txt") ¦¦ die $!;
print HTACCESS "\^".$visitor_ip."\$\n\# $date\n";
foreach $deny_ip (@htaccess) {
print HTACCESS $deny_ip;
}
close(HTACCESS);
# Close
print "Content-type: text/html\n\n";
print "<html>\n";
print "<head>\n";
print "<title>Error</title>\n<META NAME=\"robots\" CONTENT=\"NOINDEX,NOFOLLOW\">\n";
print "</head>\n";
print "<body>\n";
print "<p><b>A fatal error has occured:</b></p>\n";
print "<p><b>Invalid Site HTML method...</b></p>\n";
print "<p><b>Please enable debugging in setup for more details.</b></p>\n";
print "<A HREF=\"http://www.imdb.com/harvest_me/\"> </A>\n";
print "</body>\n";
print "</html>\n";
exit;
}
########################## END OF SCRIPT
OK, so take and pop this little puppie into the same directory you want protected, chmod 755. I use a file I call "bad_ip.txt" to hold my bad IP's, but you can change to anything (including .htaccess, but make sure you escape the "."!) This will write to the TOP of any file you have set up, so, the older stuff goes down two linbes every time this gets written to.
If you edit bad_ip.txt (or .htaccess) make SURE to upload to your server ASCII, or it wiull not work.
I think that is it... comments welcome!
dave
[stonehenge.com...]
Prevents any one IP address from submitting requests too quickly.
Andy.