A simple detection based on black list
composer require coercive/botkicker
-
PERISHABLE PRESS ULTIMATE USER-AGENT BLACKLIST https://perishablepress.com/4g-ultimate-user-agent-blacklist/
-
PERISHABLE PRESS ULTIMATE REFERRER BLACKLIST https://perishablepress.com/4g-ultimate-referrer-blacklist/
-
CHONGQED REFERER BLACKLIST http://blacklist.chongqed.org/
-
MITCHELL KROG - BlackList file from apache set https://github.com/mitchellkrogza
Some terms where placed in ambiguous list because of too large detection. You can find this ambiguous file are in each list directory. (work in progress)
Basics
use Coercive\Security\BotKicker\UserAgentKicker;
# Get Instance
$kicker = new UserAgentKicker; // or othe kicker
# Load a default list
$kicker->loadCoerciveLists();
# or load custom list...
# Basic bot detection
if(!$kicker->detect()->getStatus()) {
echo 'a bot is detected';
}
else {
# True if in whitelist or not in blacklist
}
You can detect if UA need the robots.txt
if($kicker->isRobotsTxtRequested()) { /* do something */ }
# You can (dis)allow empty current detection
$kicker->allowEmpty( true | false );
You can detect host name from an ip list
# HostKicker only
$kicker = new HostKicker;
# Set your ip list
$kicker->setHostFromIp( [
'xxx.xx.xx.x',
'yy.yyy.y.y',
'...',
] );
You can use the auto IP detection from IpKicker
# Get auto Ip list detection
$list = (new IpKicker)->getCurrents();
# Set auto ip list
$kicker = new HostKicker;
$kicker->setHostFromIp($list);
IpKicker can now detect Facebookbot and Bingbot
# Get auto Ip list detection
$ipk = new IpKicker;
$list = $ipk->getFacebookList();
$list = $ipk->isBing('157.55.39.1', true | false); # Linux Host cmd (true) / NsLookUp (false)
# Example of custom datas
$datas = ['bot1', 'bot2', 'bot3'];
# Override auto detection
$kicker->setCurrents($datas);
# Show detection result
$status = $kicker->detect();
var_dump( $status->getList() );
You can set your own list (array format)
$kicker->setBlackList([
'bad',
'bad too'
]);
$kicker->setWhiteList([
'good',
'good too'
]);
Or from file (txt brut format)
$kicker->setBlackListFromFiles([
'/path/file1',
'/path/file2'
]);
$kicker->setWhiteListFromFiles([
'/path/file1',
'/path/file2'
]);
If some list are already loaded, you can add some items like that
$kicker->addToBlackList([
'bad',
'bad too'
]);
$kicker->addToWhiteList([
'good',
'good too'
]);
# Example of custom datas
$datas = ['bot1', 'bot2', 'bot3'];
# Override auto detection
$kicker->setCurrents($datas);
# Show detection result
$status = $kicker->detect();
var_dump( $status->getStatus() ); # bool if ok or not
var_dump( $status->getList() ); # array list of match elements
var_dump( $status->getCurrents() ); # array current datas
Get the domains list from IP
use Coercive\Security\BotKicker\HostLookUp;
use Coercive\Security\BotKicker\NsLookUp;
$look = new HostLookUp;
# OR
$look = new NsLookUp;
$array = $look->getDomains('111.22.33.4');
Get the ip list from domain
use Coercive\Security\BotKicker\HostLookUp;
use Coercive\Security\BotKicker\NsLookUp;
$look = new HostLookUp;
# OR
$look = new NsLookUp;
$array = $look->getIps('www.example.com.');
Match item
use Coercive\Security\BotKicker\HostLookUp;
use Coercive\Security\BotKicker\NsLookUp;
$look = new HostLookUp;
# OR
$look = new NsLookUp;
# Match ip > domain
$array = $look->match('111.22.33.4', 'www.example.com.');
# OR mactch with reverse (match ip > domain first and domain > ip after)
$array = $look->match('111.22.33.4', 'www.example.com.', true);