Ever since I started using OpenX.org's ad server I'm getting a rash of hits that look like this:
"GET /'http://d1.openx.org/avw.php?zoneid=****&cb=INSERT_RANDOM_NUMBER_HERE&n=******* HTTP/1.1" "Mozilla/4.0 (compatible;)"
First, the malformed GET shows me something is having a problem parsing the OpenX code which uses a single quote instead of a double quote and then mucks up the GET request sending it back to my server instead of OpenX.
The server response is obviously a 404, but I'm getting 100s of these a day now.
However, what tool is going this under the guise of "Mozilla/4.0 (compatible;)"?
Most of the UA's using "Mozilla/4.0 (compatible;)" I see like this seem to be coming from .MIL and .GOV which points to something specific for their installations.
I'm also seeing the same problem coming from UAs claiming to be iPhone, Apple Webkit on other devices, Firefox and even Table PCs, etc.
It this some ad blocker or virus scanner tool?
I'm going to try patching the openx.org code to use double quotes instead of single and hope the problem goes away, but to the untrained eye the rash of 404s hitting the server for no reason almost looked like an attack.
Anyone else using OpenX ad server and their script see this and figure out what's failing to interpret their scripts properly?
Sure would be nice to tell everyone how to solve this bug and stop it.