Forum Moderators: open
The above UA, where example.com replaces my actual domain names, has been visiting my sites once a week for the last week or so. Does anyone know what DomainCrawler.com is all about? Is anyone blocking them from crawling their site(s)? Thanks.
right now im blocking
<Limit GET HEAD POST>
order allow,deny
deny from 216.145.16.0/24
deny from 66.249.16.*
deny from 66.249.17.*
deny from 64.246.165.*
deny from 64.79.192.0/19
deny from 64.246.165.128/25
deny from 66.249.0.0/19
deny from 209.59.192.0/19
deny from 216.145.16.0/24
deny from 83.168.240.5
deny from 66.249.0.0/19
allow from all
</LIMIT>
but maybe we should place a name also and is there a option to block those on whole server, instead changing htaccess on each domain
I removed IP address range duplicates and overlaps.
I also removed the <Limit> container, since using <Limit> as shown would have allowed other methods, such as PUT and DELETE -- without any restrictions.
I show a safer, friendlier Allow/Deny construct:
All IP addresses can access robots.txt (it is only fair to warn them that they are Disallowed, and many simple-minded robots will treat any error fetching robots.txt as permission to spider the entire site).
All IP addresses are also allowed to fetch the custom 403 error page, so that a 403 error when an IP address is blocked does not result in another 403 as the client attempts to fetch the custom 403 error document, and another 403 because that fails, and another, and another... (This avoids a looping self-inflicted Denial-of-Service attack.)
I also show an example of the syntax for blocking the "example.com" domain.
# Set EnVar to allow all IP addresses to access robots.txt & custom 403 error page
SetEnvIf Request_URI ^/robots\.txt$ allowit
SetEnvIf Request_URI ^/path-to-your-custom-403-error-page\.html$ allowit
#
# Configure so that Allow is the default state, and Allows can override Denys
Order Deny,Allow
#
# Not sure who this denies
Deny from 64.79.192.0/19
# Name-Intelligence, Whois.ess-cee, Do-main-Tools at Compass
Deny from 64.246.165.0/19
# More from Compass
Deny from 64.246.165.128/25
# Name-Intelligence at Spry Hosting
Deny from 66.249.0.0/19
# Domaincrawler at Chrystone AB
Deny from 83.168.240.5
# More Spry Hosting
Deny from 209.59.192.0/19
# Name-Intelligence at Compass
Deny from 216.145.16.0/24
#
# An example of hostname blocking
Deny from example.com
#
Allow from env=allowit
Jim
Here's a small snippet of godaddys privacy policy:
"We will share your information in order to comply with ICANN's rules, regulations and policies."
ICANNs privacy policy says that all information must be made public. If you don't want it to
be public it's possible to get around that by purchasing "Whois Privacy Protection" by godaddy.
and there own domain they also have privacy shield on it.