| User Agent | | Date Added |
| Twiceler |  | 25/07/2005 1:47:04 |
fell for bad bot trap multiple times!
|
| U2Bot |  | 17/11/2014 9:51:17 |
| Same as DownloadBot and DBot... |
| U5 |  | 14/10/2014 12:34:37 |
| Same as DBot and DownloadBot |
| UATEST |  | 14/07/2017 10:13:26 |
|
| undefined GoogleToolbarBB |  | 22/12/2012 11:04:51 |
|
| unknown |  | 7/12/2009 23:36:41 |
|
| URL Encoded CRLF |  | 30/09/2015 22:49:54 |
|
| URL Encoded NULL |  | 1/10/2015 20:08:28 |
|
| URL Encoded Unicode ASCII |  | 1/10/2015 20:09:02 |
|
| URL Encoded Unicode NULL |  | 1/10/2015 20:09:09 |
|
| URL Encoded User Agent |  | 30/08/2010 12:16:13 |
|
| URLSS[] |  | 25/09/2015 10:44:12 |
|
| user |  | 1/10/2015 21:48:18 |
|
| User Agent Replace Error |  | 30/07/2010 17:44:15 |
| Some scripts use a defined user agent, where some variables are filled in later. They use the ${VARIABLE} notation. If it is not properly filled in, this stays in the user agent. |
| USER_AGENT |  | 24/06/2011 16:34:37 |
|
| User-Agent |  | 7/12/2009 23:08:32 |
|
| User-Agent FingerBrowser |  | 4/06/2018 9:26:38 |
|
| User-Agent,Mozilla |  | 3/09/2020 11:52:15 |
|
| UserAgent: |  | 10/09/2015 23:46:48 |
| This hacker can not even type the User-Agent header correctly! |
| User-Agent: |  | 10/09/2015 23:40:37 |
Fake User-Agent. HTTP Request contains: User-Agent: User-Agent: |
| User-Agent: Mozilla |  | 25/07/2005 2:44:08 |
fake user agent, http request contains: User-Agent: User-Agent: Mozilla/... |
| User-Agent:Mozilla |  | 28/01/2007 22:52:17 |
fake user agent: http request contains: User Agent: User Agent:Mozilla/... |
| UserAgentString |  | 16/10/2015 10:43:02 |
|
| USERNAME |  | 28/07/2011 12:09:09 |
|
| Vacuum |  | 11/09/2006 22:46:07 |
|
| VadixBot |  | 10/06/2007 13:50:28 |
|
| VB Project |  | 20/12/2012 16:08:55 |
| Visual Basic sample project |
| versus crawler |  | 8/08/2005 10:54:49 |
| research bot by phd student. Does fetch robots.txt but no url with information to block it |
| Virusdie crawler |  | 22/02/2017 8:37:56 |
|
| VoidEYE |  | 11/09/2006 22:50:43 |
| VoidEye CGI scanner |
| VSE Crawler |  | 12/02/2004 23:44:17 |
|
| WareNet |  | 27/12/2005 11:57:24 |
| fell for bad bot trap. Notice the last ';', shouldn't be there! |
| WebAlta Crawler |  | 17/07/2008 0:25:55 |
| fell for bad bot trap + url is not working + e-mail harvesting ip addresses |
| Webbot |  | 23/12/2006 2:15:43 |
| fell for bad bot trap + converts query string to lower case + bot page above is a feedback form??? |
| webbot.com |  | 30/06/2007 0:34:34 |
| fake |
| WebDataCentreBot |  | 11/07/2008 16:29:48 |
| fell for bad bot trap + aggressive (2 requests/second) |
| WebFuck |  | 30/12/2015 17:30:16 |
|
| WebGo IS |  | 11/09/2006 23:05:45 |
|
| WebmasterWorldForumBot |  | 11/09/2006 23:09:34 |
|
| WebRobot |  | 8/01/2017 14:35:41 |
| Performs SQL injection |
| Website Quester |  | 2/05/2006 1:30:36 |
Referer: http://FindExe.com/search.htm This is website extractor. Aggressive bot.
|
| WebTraq |  | 25/10/2006 23:49:47 |
| uses fake user agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
| WebVulnCrawl |  | 17/02/2006 10:12:48 |
|
| WebVulnScan |  | 10/12/2005 23:20:03 |
Fell for all bad bot traps: - requested link in web page to stuff forbidden by robots.txt - requested link to forbidden stuff in robots.txt only |
| WeCrawlForThePeace |  | 27/04/2016 8:06:52 |
| fell for bad bot trap |
| Wget(linux) |  | 8/01/2017 19:53:35 |
Exploits
/command.php /cgi/common.cgi /stssys.htm |
| Widow |  | 11/09/2006 23:21:38 |
|
| Win 9x4.90 |  | 24/11/2005 0:11:24 |
fell for bad bot trap + very aggressive bot (up to 9 requests per second!) does not even request robots.txt came from 62.75.218.82 - elbe016.server4you.de |
| win32con |  | 23/12/2012 11:45:25 |
|
| Window NT |  | 2/07/2015 6:46:26 |
|