Comment by Aurornis

Comment by Aurornis 12 hours ago

15 replies

Yes, but the point is that big company crawlers aren’t paying for questionably sourced residential proxies.

If this person is seeing a lot of traffic from residential IPs then I would be shocked if it’s really Amazon. I think someone else is doing something sketchy and they put “AmazonBot” in the user agent to make victims think it’s Amazon.

You can set the user agent string to anything you want, as we all know.

guardiangod 7 hours ago

I used to work for malware detection for a security company, and we looked at residential IP proxy services.

They are very, very, very expensive for the amount of data you get. You are paying for per bit of data. Even with Amazon's money, the number quickly become untenable.

It was literally cheaper for us to subscribe to business ADSL/cable/fiber optic services to our corp office buildings and thrunk them together.

voakbasda 12 hours ago

I wonder if anyone has checked whether Alexa devices serve as a private proxy network for AmazonBot’s use.

  • tepidsaucer 3 hours ago

    Yes, people have probably analyzed Alexa traffic once or twice over the years.

    • photonthug 2 hours ago

      You joke, but do people analyze it continuously forever also? Because if we’re being paranoid, that’s something you’d need to do in order to account for random updates that are probably happening all the time.

[removed] 9 hours ago
[deleted]
ninkendo 12 hours ago

They could be using echo devices to proxy their traffic…

Although I’m not necessarily gonna make that accusation, because it would be pretty serious misconduct if it were true.

  • ninkendo 10 hours ago

    To add: it’s also kinda silly on the surface of it for Amazon to use consumer devices to hide their crawling traffic, but still leave “Amazonbot” in their UA string… it’s pretty safe to assume they’re not doing this.

dafelst 12 hours ago

I worked for Microsoft doing malware detection back 10+ years ago, and questionably sourced proxies were well and truly on the table

  • WarOnPrivacy 12 hours ago

    >> but the point is that big company crawlers aren’t paying for questionably sourced residential proxies.

    > I worked for Microsoft doing malware detection back 10+ years ago, and questionably sourced proxies were well and truly on the table

    Big Company Crawlers using questionably sourced proxies - this seems striking. What can you share about it?

    • crote 9 hours ago

      They worked on malware detection. The most likely reason is very obvious: if you only allow traffic from residential addresses to your Command & Control server, you make anti-malware research (which is most likely coming from either a datacenter or an office building) an awful lot harder - especially when you give non-residential IPs a different and harmless response instead of straight-up blocking them.

    • to11mtm 11 hours ago

      they probably can't because some of the proxies were used by TLAs is my guess...

baobun 12 hours ago

> Yes, but the point is that big company crawlers aren’t paying for questionably sourced residential proxies

You'd be surprised...

  • WarOnPrivacy 12 hours ago

    >> Yes, but the point is that big company crawlers aren’t paying for questionably sourced residential proxies

    > You'd be surprised...

    Surprised by what? What do you know?

  • [removed] 9 hours ago
    [deleted]
skywhopper 12 hours ago

It’s not residential proxies. It’s Amazon using IPs they sublease from residential ISPs.