Jump to content
UBot Underground

Google Detects Bot, Even On Elite Anonymous Private Proxies


Recommended Posts

Google blocking bot, can I be passing a fingerprint?

 

I have a bot that was working yesterday.  Today all source code is returned

as encoded JS.  

 

I switched to anonymous proxies and I am blocked instantly on the first

request, either with a bot warning or with the same encoded source code.

 

These proxies are good, I use them with Scrapebox, Rank Tracker & others

on Google with no issues.

 

I have the following code at the top of the script:

 

allow flash("No")

allow javascript("No")

clear cookies

plugin command("OSCommandsFunctions.dll", "os clear cache")

plugin command("OSCommandsFunctions.dll", "os clear cookies")

plugin command("OSCommandsFunctions.dll", "os clear flash")

plugin command("OSCommandsFunctions.dll", "os clear history")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Folder")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Recent")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Flash Objects")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Internet Files")

 

Then on each loop, before even trying Google:

 

set proxy credentials(#proxyusername, #proxypassword)

set(#proxy, $random list item(%proxylist), "Global")

change proxy(#proxy)

set(#ua, $random list item(%ualist), "Global")

set user agent("{#ua}")

clear cookies

plugin command("OSCommandsFunctions.dll", "os clear cache")

plugin command("OSCommandsFunctions.dll", "os clear cookies")

plugin command("OSCommandsFunctions.dll", "os clear flash")

plugin command("OSCommandsFunctions.dll", "os clear history")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Folder")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Recent")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Flash Objects")

plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Internet Files")

set user agent("{#ua}")

 

Even through anonymous proxies, Google recognizes it and blocks it (by obfuscating all of the source code in JS)

 

Any thoughts?  What fingerprints might be bleeding through?

 

Link to post
Share on other sites

Are they residential proxies?

 

Google can easily do a who is and see if proxy is a server or from an ISP.

 

Also, screen size, view port size(browser window) and software installed.

 

But mostly webrtc leak. With ubot's native browser you can not disable webrtc cuz it is Chromium(Google product).

https://browserleaks.com/webrtc

So, you would need to use selenium or Exbrowser with an extension for Chrome.

 

Regards,

Nick

  • Like 1
Link to post
Share on other sites

and least but not last, don't forget about timezone, if your local timezone is different with your proxy's timezone(different geo).. it might tip gugel..

  • Like 1
Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
×
×
  • Create New...