Forum Moderators: open
Any info on who these folks are and what they do, other than the disingenuous
provides powerful, easy to implement solutions that allow web properties, ad networks, and mobile providers to optimize the relevancy of ads, content, and recommendationsbla bla on their site?
A couple of oddities:
It's slow crawling, requests from 40 seconds - 16 minutes apart. From its asking for our dev server, I can only presume that we have some data leakage somewhere that I need to look at (either on the dev server, one of the machines on our local network, the dns provider, the isp, carnivore, ?).
Could this be a Phorm-like traffic intercepting appliance?
Don't like this at all!
67.228.207.nnn - - [27/Aug/2008:20:51:16 -0500] "GET /file.html HTTP/1.1" 200 123456 "-" "Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)"
nslookup 67.228.207.nnn
Non-authoritative answer:
nnn.207.228.67.in-addr.arpa name = adsoft-development.nnn.
...and blocked now
That IP belongs to SoftLayer. I've had the range blocked for a long time - Mokita
And caribguy, as you've found out, that Googlebot UA is spoofed. I've had good results using a white list of IP addresses for all things Google, since they get spoofed the most.
We think it was ripped using a keyboard monitor but we also discovered that the person whose private access it was used a google search to go to the URL instead of the browser Location/Address bar. It seems a lot of people do this. As far as I know google do not add such searches to their bot scan lists. :)
As far as I know google do not add such searches to their bot scan lists. :)
Are you suggesting that 3rd party browser extensions / toolbars could intercept searches and send the data to their developers? /sarcasm
That could have happened in my case too. While I try to keep my development environment as clean as possible, I did pull up the test/internal site from other machines on our network - wouldn't be surprised if those machines would be full of junkware...