<?xml version="1.0" encoding="UTF-8"?> 
<rss version="2.0"
        xmlns:content="http://purl.org/rss/1.0/modules/content/"
        xmlns:wfw="http://wellformedweb.org/CommentAPI/"
        xmlns:dc="http://purl.org/dc/elements/1.1/"
        xmlns:atom="http://www.w3.org/2005/Atom"
        xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
        xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
        >
<channel>
  <title>asgaard</title>
  <description></description>
  <link>https://blog.asgaard.co.uk/2012/10/12/what-is-indy-library</link>
  <lastBuildDate>Wed, 15 Apr 26 23:47:30 +0000</lastBuildDate>
  <language>en</language>
  <count>1</count>
  <offset>0</offset>
      <item>
    <title>What is Indy Library?</title>
    <link>https://blog.asgaard.co.uk/2012/10/12/what-is-indy-library</link>
    <pubDate>Fri, 12 Oct 12 16:43:21 +0000</pubDate>
    <guid>https://blog.asgaard.co.uk/2012/10/12/what-is-indy-library</guid>
    <description><![CDATA[
<p>
Browsing my logs, I see a bot with the user agent &quot;Mozilla/3.0 (compatible; Indy Library)&quot; doing some pretty interesting things. 
<p>
It appears to be a distributed bot which dictionary attacks login forms. That is to say, it attempts to hack your site. It&#039;s (incorrectly) identified mine as Wordpress, but maybe it attacks other CMSs too.
<p>
I have a honeypot set up to make this site look like Wordpress which logs login attempts. You can <a href='/logins.txt' target='_blank' rel='nofollow'>see the results of this here</a>, the Indy Library bot is the first to take the bait and is currently filling up the data quite quickly (although not excessively).
<p>
It&#039;s using a whole bunch of different IPs:
<p>
217.128.175.91
<br>
80.35.16.63
<br>
188.13.39.226
<br>
64.61.155.42
<br>
90.182.73.81
<br>
71.224.57.62
<br>
212.183.165.15
<br>
80.59.98.59
<br>
2.112.195.83
<p>
But instead of using the IPs, as it identifies itself via user agent, you can block it easily with an .htaccess rule
<p>
<pre>RewriteCond %{HTTP_USER_AGENT} Indy\ Library [NC]
RewriteRule .* - [F]</pre>[...]]]></description>
    <content:encoded><![CDATA[
<p>
Browsing my logs, I see a bot with the user agent &quot;Mozilla/3.0 (compatible; Indy Library)&quot; doing some pretty interesting things. 
<p>
It appears to be a distributed bot which dictionary attacks login forms. That is to say, it attempts to hack your site. It&#039;s (incorrectly) identified mine as Wordpress, but maybe it attacks other CMSs too.
<p>
I have a honeypot set up to make this site look like Wordpress which logs login attempts. You can <a href='/logins.txt' target='_blank' rel='nofollow'>see the results of this here</a>, the Indy Library bot is the first to take the bait and is currently filling up the data quite quickly (although not excessively).
<p>
It&#039;s using a whole bunch of different IPs:
<p>
217.128.175.91
<br>
80.35.16.63
<br>
188.13.39.226
<br>
64.61.155.42
<br>
90.182.73.81
<br>
71.224.57.62
<br>
212.183.165.15
<br>
80.59.98.59
<br>
2.112.195.83
<p>
But instead of using the IPs, as it identifies itself via user agent, you can block it easily with an .htaccess rule
<p>
<pre>RewriteCond %{HTTP_USER_AGENT} Indy\ Library [NC]
RewriteRule .* - [F]</pre>]]></content:encoded>
  </item>
  </channel>
</rss>