Tag: ip address

bb.sky.com Content Scraper: Research, Ban

bb.sky.com is a regular content scraper on my site, so I have decided to track them down. I finally figured out their hex IP address, so I can target ranges better.

Sky is a very large TV and internet provider in the Uk. They have a huge range of IPs.

Site hits:
5ad4e517.bb.sky.com 90.212.229.12 90.212.0.0 – 90.213.255.255
027e2f4c.bb.sky.com 2.126.47.76 2.126.0.0 – 2.126.255.255
5ad00af4.bb.sky.com 90.208.10.244 90.208.0.0 – 90.209.255.255
b0fb523c.bb.sky.com 176.251.82.60 176.248.0.0 – 176.251.255.255

megared.net.mx: Research, Ban

This is part of the keywords-monitoring-your-success.com, free-video-tool.com Semalt Botnet that spread to other South American hosts, but they have changed the referrer name slightly to keywords-monitoring-success.com. This host is tricky because they only provide the last 2 octets of the IP address, leaving me to guess the first two.

Here is my clue: customer-qro-199-67.megared.net.mx

There are clues to the same pattern used by megared.net.mx, using a variety of new 2 initial octets combined with the last 2 from the host name. While I only have this one IP as a content scraper, their reputation is one of an email spammer. I guess they moved into a newer but related business model.

hosted-by.snel.com Content Scraper: Research, Ban

This bot comes around and scrapes content pretty much every week. It is not rampant but still annoying. I banned it.

Observations:
5.104.224.7 hosted-by.snel.com 2016-oct-12

These are the most common to ban:
78.41.202.116 78.41.200.0 – 78.41.207.255 78.41.200.0/21
128.204.207.19 128.204.207.0/24
77.95.224.121 77.95.224.0 – 77.95.231.255 77.95.224.0/21
77.95.225.0/24
77.95.229.0/24
37.148.160.27 37.148.160.0 – 37.148.167.255 37.148.160.0/21
193.33.61.64 193.33.60.0 – 193.33.61.255 193.33.60.0/23
128.204.203.103 128.204.192.0 – 128.204.207.255 128.204.192.0/20
128.204.207.19 128.204.207.0/24
89.207.130.11 89.207.128.0 – 89.207.135.255 89.207.128.0/21

These are less common:
5.104.224.0/24 5.104.224.0/21
176.124.255.0/24
185.62.56.0/22
195.20.204.0/23
193.34.166.0 – 193.34.167.255 193.34.166.0/23

virtua.com.br Content Scraper: Research, Ban

Persistent this botnet is. It’s like a virus that mutates but does not go away. Or an itch you scratch but does not stop. virtua.com.br has a content scraping bot going at my site that I need to stop. virtua.com.br is part of a large Semalt-led botnet I am trying to remove. They have no website. The host addresses I receive on my access log do not resolve, and there’s nothing specific on Google. I’m just giving this a simple domain ban to see how it goes. They also have a huge number of IP blocks, as they are connected to Akamai in the US.

keywords-monitoring-your-success.com and free-video-tool.com: Semalt Botnet

Both keywords-monitoring-your-success.com and free-video-tool.com are Semalt tools for content scraping. This botnet is pretty extensive and tiring to kill.

The raw access log entries look seemingly legit, but being referred from the two Semalt tools, they could not be legit users.

These host names and Ip address, masquerading as valid browsers, took up a lot of my bandwidth. This botnet used mainly companies from Brazil such as TELEFÔNICA BRASIL, Vivo, Global Village, Brasil Telecom, Yawl, portalmail but also used a bunch of Italian and US companies as well.

Virtua.com.br continues to content scrape for Semalt. I have a separate research report on them.

hosted-ny.securefastserver.com Content Scraper: Research and Ban

This one is difficult. They are elusive. They use partial IP ranges that start randomly, like a disk that needs defragmenting. This masks their use of larger IP ranges. The names James Prado and Private Layer are always involved. What they do is bury the hosted-ny.securefastserver into small IP segments, but the IP ranges before and after are also owned by the same company but are under the Private Layer or James Prado name. Tricky. Just ban the complete range, as it is the same company.

DNS Record:
Fast Serv Inc. d.b.a. QHoster.com
1 Mapp Str.
Belize City, Belize

pinspb.ru, Content Scraper: Research and Ban

This content scraper pinspb.ru is a regular on my site and I’d like to ban it. Very mysterious and hard to pin down. Not much on the DNS record. At least they have a web site. They look like an ISP. They have a lot of IP blocks.

Observations:
46.161.62.74 pinspb.ru 2016-dec-26
46.161.63.90 2016/sept/22
46.161.63.109 pinspb.ru 2016-oct-16

Google Pattern Examples, ban these:
5.8.78.132 5.8.72.0 – 5.8.79.255 5.8.72.0/21
5.101.67.0 5.101.64.0 – 5.101.67.255 5.101.64.0/22
46.161.54.109 46.161.0.0 – 46.161.63.255 46.161.0.0/18
46.161.60.177
46.161.61.68
195.2.240.4 195.2.240.0 – 195.2.241.255 195.2.240.0/23

17 + 128
18 + 63
19 + 31
20 + 15
21 + 7
22 +3
23 +1

Furanet.com: Research and Banning

There is not much for this, and it seems they like to be unknown. There is no web site for furanet.com. Let me try to tease their pattern.

93.93.68.0/24
COMVIVE SERVIDORES S.L.
Sevilla, Spain
email@comvive.es

My content scraper host name was 98-68.furanet.com. It looks like their pattern or strategy is a reverse order domain name with the first 2 octets missing. Looking at their IP range I would guess 93.93.64.0/21, which covers the 68 of 98-68.furanet.com. From my Google search I’ve added 91.192.108.0/22 which they also commonly use.

Ban these most commonly used IPs:
91.192.108.0/22
93.93.64.0/21

XFone 018.net.il: Research and Banning

My site has been getting content and image scraped by bb-81-107.018.net.il and bb-153-46.018.net.il, but these two host names do not resolve. Furthermore there is very little on the internet on them. My next step is to ban their complete IP range.

Observation:
cust-68.196.102.5.018.net.il 5.102.196.68
CUST-89.242.102.5.018.net.il 5.102.242.89 2017-jan-23
cust-186.224.102.5.018.net.il 5.102.224.186
cust-140.227.102.5.018.net.il 5.102.227.140
cust-151.241.102.5.018.net.il 5.102.241.151
cust-132.255.102.5.018.net.il 5.102.255.132
bb-81-107.018.net.il 94.230.81.107
bb-84-30.018.net.il 94.230.84.30
bb-132-134.018.net.il 188.120.132.134
bb-134-60.018.net.il 188.120.134.60
BB-151-179.018.net.il 188.120.151.179 2017-jan-18
bb-153-46.018.net.il 188.120.153.46
BB-154-107.018.net.il 188.120.154.107 2016-oct-08
141.226.151.47 2016-oct-14

Pattern:
If there are 4 octets in the host name, then reverse the octets. If there are only 2 octets then these are the last 2 of the IP. You will need to use the host command and try the first 2 octets of their common ranges.