Groups | Search | Server Info | Login | Register
Groups > comp.infosystems.www.misc > #145
| From | Eli the Bearded <*@eli.users.panix.com> |
|---|---|
| Newsgroups | comp.infosystems.www.misc |
| Subject | Re: /ads.txt |
| Date | 2018-08-26 02:47 +0000 |
| Organization | Some absurd concept |
| Message-ID | <eli$1808252238@qaz.wtf> (permalink) |
| References | <eli$1808241910@qaz.wtf> <pls855$tdl$1@dont-email.me> |
In comp.infosystems.www.misc, Doc O'Leary <droleary@2017usenet1.subsume.com> wrote: > For your reference, records indicate that > Eli the Bearded <*@eli.users.panix.com> wrote: >> So why am I seeing so many hits to ads.txt? > Malicious scans. Do you also see a lot of bogus WordPress URLs? > Same thing. These days the biggest malicious scan offender is the D-Link one (tries to use /login.cgi to wget and run a shell script). I don't have any reason to think Googlebot doing a GET on a .txt file is a malicious scan. > It’s better to block their IP address completely. Even better, block > entire ranges by those “cloud” providers. Stop the abuse rather than > the notification of the problem. Advice like this I get can get from any hypochondriac webmaster forum. I'm perfectly capable of deciding what to block or not block on my own. My question was just about how ad agencies use ads.txt. Elijah ------ doesn't think the dlink scan has yet repeated a source IP address
Back to comp.infosystems.www.misc | Previous | Next — Previous in thread | Next in thread | Find similar
/ads.txt Eli the Bearded <*@eli.users.panix.com> - 2018-08-24 23:14 +0000
Re: /ads.txt Doc O'Leary <droleary@2017usenet1.subsume.com> - 2018-08-25 18:45 +0000
Re: /ads.txt Eli the Bearded <*@eli.users.panix.com> - 2018-08-26 02:47 +0000
Re: /ads.txt Doc O'Leary <droleary@2017usenet1.subsume.com> - 2018-08-26 16:20 +0000
csiph-web