pokerdawg 2 Posted January 31, 2017 Report Share Posted January 31, 2017 Google blocking bot, can I be passing a fingerprint? I have a bot that was working yesterday. Today all source code is returned as encoded JS. I switched to anonymous proxies and I am blocked instantly on the first request, either with a bot warning or with the same encoded source code. These proxies are good, I use them with Scrapebox, Rank Tracker & others on Google with no issues. I have the following code at the top of the script: allow flash("No") allow javascript("No") clear cookies plugin command("OSCommandsFunctions.dll", "os clear cache") plugin command("OSCommandsFunctions.dll", "os clear cookies") plugin command("OSCommandsFunctions.dll", "os clear flash") plugin command("OSCommandsFunctions.dll", "os clear history") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Folder") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Recent") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Flash Objects") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Internet Files") Then on each loop, before even trying Google: set proxy credentials(#proxyusername, #proxypassword) set(#proxy, $random list item(%proxylist), "Global") change proxy(#proxy) set(#ua, $random list item(%ualist), "Global") set user agent("{#ua}") clear cookies plugin command("OSCommandsFunctions.dll", "os clear cache") plugin command("OSCommandsFunctions.dll", "os clear cookies") plugin command("OSCommandsFunctions.dll", "os clear flash") plugin command("OSCommandsFunctions.dll", "os clear history") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Folder") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Recent") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Flash Objects") plugin command("OSCommandsFunctions.dll", "os clear options", "Clear Temp Internet Files") set user agent("{#ua}") Even through anonymous proxies, Google recognizes it and blocks it (by obfuscating all of the source code in JS) Any thoughts? What fingerprints might be bleeding through? Quote Link to post Share on other sites
Code Docta (Nick C.) 638 Posted February 1, 2017 Report Share Posted February 1, 2017 Are they residential proxies? Google can easily do a who is and see if proxy is a server or from an ISP. Also, screen size, view port size(browser window) and software installed. But mostly webrtc leak. With ubot's native browser you can not disable webrtc cuz it is Chromium(Google product). https://browserleaks.com/webrtc So, you would need to use selenium or Exbrowser with an extension for Chrome. Regards,Nick 1 Quote Link to post Share on other sites
zozo31 10 Posted February 2, 2017 Report Share Posted February 2, 2017 and least but not last, don't forget about timezone, if your local timezone is different with your proxy's timezone(different geo).. it might tip gugel.. 1 Quote Link to post Share on other sites
Brutal 164 Posted February 2, 2017 Report Share Posted February 2, 2017 you might try using chrome 49 ... plus reset browser, plus open new browser ... this might get you cleared enough to proceed Quote Link to post Share on other sites
HelloInsomnia 1103 Posted February 3, 2017 Report Share Posted February 3, 2017 Do you need to use the browser? It may be easier to do what you want with sockets - depending of course what it is you're doing if you're just scraping then sockets may be the way to go. Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.