Comment by g947o
> attackers can mask their malicious activity by hijacking these IP addresses.
Sounds like "malicious activity" == "scraping activities that don't come from Google"
> attackers can mask their malicious activity by hijacking these IP addresses.
Sounds like "malicious activity" == "scraping activities that don't come from Google"