UA looks like a ripper, but netork and behaviour do not
graeme_p
9:18 am on Feb 13, 2010 (gmt 0)
I get some traffic that sends a "rippers 0" user agent.
It mostly comes from corporate networks (especially investment banks) and government agencies. It does not usually request a lot of pages, so, despite the name, it does not look like a ripper.
Anyone know what is going on?
Pfui
4:42 am on Feb 14, 2010 (gmt 0)
When you search for "rippers 0", you'll find numerous mentions [google.com] here on WW and elsewhere about what it may be, ditto many iffy places from whence it comes.
Personally, I'd 403 it. If the name alone isn't enough of a red flag, the fact someone is using something atypical and/or joking and/or ignoring robots.txt, is enough for me to send the UA packing. And I'd also send the 'user' packing by blocking iffy Hosts/IPs and redirecting any apparently-legit ones.
Why so tough? Because there's no reason for anyone from anywhere to use 'ripper' anything (imho).
Alternatively, you could redirect the UA and Hosts/IPs to a special page with your e-mail address -- use a graphic; or reCAPTCHA'net's free Mailhide [mailhide.recaptcha.net] -- for access.
Note: If you opt for the latter route and use mod_rewrite, remember to !allow the special page and any graphic.
tangor
4:51 am on Feb 14, 2010 (gmt 0)
Like Pfui I am pretty simple and non-tolerant: That duck quacking suggests I protect bandwidth and associated costs with the boot. And (perhaps unlike Pfui, but I don't know this for a fact) I give the boot regardless of rDNS if I don't like the UA or the behavior. :)
Aside: Though on the commercial sites I am less restrictive but my hobby sites come out of my own pocket.
Realities of scale.
Pfui
5:34 am on Feb 14, 2010 (gmt 0)
I whitelist. So I reckon that makes me a fairly hard-core, pro-boot, bot-spotter. And/or incrediBill's female counterpart. (Just minus cursing because I'm a lady, dammit:)
tangor
6:18 am on Feb 14, 2010 (gmt 0)
If nobody else says it, we do know you are a lady and we are well blessed with your presence.
Thank you.
graeme_p
7:35 am on Feb 18, 2010 (gmt 0)
Alternatively, you could redirect the UA and Hosts/IPs to a special page with your e-mail address -- use a graphic; or reCAPTCHA'net's free Mailhide [mailhide.recaptcha.net] -- for access.
Thanks, that is a great suggestion.
This is a commercial not a hobby site, and the users come from exactly the sort of organisations I do not want to block, so I do not want a very hardcore approach to this, so a moderate approach like that is perfect.
blend27
11:59 pm on Feb 18, 2010 (gmt 0)
graeme_p, do these requests follow by Normal UA Requests from the same IP?
graeme_p
7:43 am on Feb 24, 2010 (gmt 0)
I have looked at the logs, and it appears that although statcounter claims the browser is "Rippers 0", the UA is IE7 with multiple versions of .NET CLR.
Looks like one of a Statcounter bug, an IE bug, or a .NET script of some kind.
graeme_p
9:02 am on Feb 24, 2010 (gmt 0)
@blend, any particular significance to that?
blend27
3:09 pm on Feb 24, 2010 (gmt 0)
Could be that the browser has some type of half-backed plugin installed thar tries to follow the user around the web.
graeme_p
6:44 am on Mar 9, 2010 (gmt 0)
I have come to the conclusion that it is either a "half-baked" plugin as blend suggests, or something been done by corporate firewalls, so I am leaving well alone for the moment, and will implement Pfui's suggestion when I can.