Forum Moderators: open
this thing, obviously a spider of some kind, shows up on my system from the same appsitehosting address each time... i'm trying to find out what it is, who owns it and who is running it...
"Mozilla/4.0+(compatible;+MSIE+6.0;+Windows+NT+5.0;)"
i'm unable to find anything via google because it eats the +'s :? :(
anyone?
advTHANKSance
I've seen stuff like this before by someone that just cut & paste that user agent string from an Windows log file which adds the "+" where spaces used to be. They think that's how it really looks and it's not valid whatsoever so it's pretty safe to block anything with "MSIE+" in a user agent string.
while i tend to agree with the overall assessment, i must point out that this particular appsitehosting PITA has been hitting me for years and not just with this UA... so i'm a bit "speculative" on the "cut and paste and think that's how it really looks" portion of your assessment ;)
unfortunately, though, i think we've just purged our old logs or i'd offer up more UAs from whoever this is... the really ugly part is that they are still around and no one seems to know anything about them :?
while i tend to agree with the overall assessment, i must point out that this particular appsitehosting PITA has been hitting me for years and not just with this UA... so i'm a bit "speculative" on the "cut and paste and think that's how it really looks" portion of your assessment wink
"appsitehosting", this implies the home of some sort of hosting farm and best practice is the uppermost range of the backbone.
unfortunately, though, i think we've just purged our old logs or i'd offer up more UAs from whoever this is... the really ugly part is that they are still around and no one seems to know anything about them :?
Don't you keep any records of website abuses of protocol outside of your visitor logs?
Just because a dictionary hasn't been updated to include an abusive word, doesn't imply that the word is any less abusive!
Same goes for IP's and backbone which "harbor" these pests.
If the backbone is a provider to less than reputable websites that fail to offer any benefits to your own website (s), simply take out the entire range of the backbone.
generally speaking, though, all they do is scarf up the entries for my files areas and "validate" that all the listed zip/archive files still exist... i have a few instances of HEAD entries but most all are GET entries... so far as i can tell, the same UA has been used in all of these appsite related accesses except a few which do not contain the +'s for spaces... those entries i also suspect are actual human and that does lend more credence to bill's original hypothesis that the UA might be copied from an IIS log and pasted into the spider's UA field by a st00pid human thinking they're being "smart" :lol:
in more recent appearances, it almost look like there's a human visiting with a background downloader following up to pull the files... i say this because i get a "normal" UA with spaces for the directory name and then there's another UA with the +'s pulling each of the filenames...
like it or not, i do recall conversing with some entity that i believe, without further research into my past sent emails, to have been appsitehosting and all they would do was confirm that that was one of their hosted sites but they would not give me any more information... i may be confusing this with another site, though, as i'm also recalling discussion about a specific spider id in the UA but nothing shows up in the logs when searched for appsite...
oh well, i could just simply lock out all of appsite's ip blocks... it isn't like anyone's gonna tell me anything and if my data goes missing, well, that's their effin' loss until such time as they decide to go legit and let me know about their activities :? ;) no skin off my back... now, if their cohorts, vericenter, sungard, and sgns want to go fess up, that's ok, too ;)
Don't you keep any records of website abuses of protocol outside of your visitor logs?
my "visitor logs" contain everything that i need to know and, as i recently discovered, i do have all of them going back at least 10 years... this is also why i run webalizer and awstats ;)
The reflections also tend to make decisions easier in the future, especially reagrding what I refer to as "short-denials", where I've attempted to keep the IP ranges to a minimum and attempting to exclude as most innocents as possible.
"short-denials" nearly always, returns to bite one in the backside.
now, to wait and see if they actually trigger the rule ;)