Forum Moderators: open

Message Too Old, No Replies

MSN stealth 'bot?

MSIE 7 User-agent

         

jdMorgan

1:38 am on Apr 25, 2009 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I've seen several of these requests over the past few months. It looks like MSN/Live is running a stealth 'bot from the 207.46.n.n and 65.55.126.n ranges. All resolve back to msnbot-nn-nn-nn-nn.msn.com.

Here's an example of the browser UA it's been using recently:

Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)

Did not request robots.txt, just regular HTML pages. Got 403-kicked-to-the-curb because although it spoofed the User-agent, it didn't get any of the other MSIE 7 request headers right.

Bad form, MSN.

Jim

dstiles

9:23 pm on Apr 25, 2009 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Seeing similar here but from different IP ranges and different UA.

These hits do not always carry a referer although at least some of the hit groups begin with the common (and $%& annoying) live test referer q=#*$!.

Hitting one site very badly - by which I mean clumsily, requesting associated frames on every call which a browser wouldn't normally do but a bot might IF it were trying to be a browser.

Cannot comment on robots.txt as these results are from "bad behaviour" security logs.

The are getting through because I'm lenient - some of my clients' customers come in with similar bad headers via proxies, privacy software etc and clients get upset if you block their customers. :)

Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322)

IP: 65.55.107.nnn 65.55.109.0-65.55.110.255

dstiles

7:38 pm on Apr 26, 2009 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



I'm now getting hits from msnbot IPs with your UA that are following bot trap links - no legit SE has done that for years and that was Yahoo.

IP: 207.46.126.nnn

UA: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.2; WOW64; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)

enigma1

12:03 pm on Apr 29, 2009 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



In my case they look like hack attempts so I doubt that its an msnbot. eg:
207.46.92.nnn - - "GET /v/vspfiles/assets/images/freeshipping.gif HTTP/1.1" 301 5 "-" "LWP::Simple/5.814"

dstiles

10:52 pm on Apr 29, 2009 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member Top Contributors Of The Month



Your IP range doesn't, on a quick spot check, include any rDNS so you're probably right. The range I quoted had rDNS for the half-dozen or so IPs I checked but the UA was still a "forgery".

As far as I'm concerned LWP is permanently banned. At the rate MS are introducing new UAs on new IP ranges, albeit with rDNS claiming (incorrectly) that it's msnbot, they are also heading to be banned.

I'm currently thinking about an update to my trap to ban IP blocks selectively - lets 'em onto a customer site, kills 'em on my own sites. Could well be applied to MSN; and Yahoo isn't too far behind. Trouble is, I don't like (or trust) Google either. :(