473,898 Members | 2,470 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Referrer Logs - Strange Entries

Hello.

I had a strange entry in my referrer logs. The http-referrer reported
that the user came from another site. But the file it claimed to come
from a pdf file. I followed the link back and as a PDF file it clearly
doesn't have a link back to our side. Under what circumstances might
this happen?

Thanks in advance!
Jul 20 '05 #1
5 2339
fi**********@ho tmail.com (Ryann) wrote:
I had a strange entry in my referrer logs. The http-referrer reported
that the user came from another site. But the file it claimed to come
from a pdf file. I followed the link back and as a PDF file it clearly
doesn't have a link back to our side. Under what circumstances might
this happen?


Do you expect us to be able to know better than you do, _without_ the
referrer log entries and especially without the URLs of your page and the
purported referrer?

We can play guessing games of course. Maybe the PDF file has a link, you
just didn't notice it. Maybe someone was using a browser that had been
configured to send random Referer fields. Or maybe the PDF document was
changed recently, removing the link.

--
Yucca, http://www.cs.tut.fi/~jkorpela/
Pages about Web authoring: http://www.cs.tut.fi/~jkorpela/www.html

Jul 20 '05 #2
fi**********@ho tmail.com (Ryann) wrote:
I had a strange entry in my referrer logs. The http-referrer reported
that the user came from another site. But the file it claimed to come
from a pdf file. I followed the link back and as a PDF file it clearly
doesn't have a link back to our side. Under what circumstances might
this happen?


Do you expect us to be able to know better than you do, _without_ the
referrer log entries and especially without the URLs of your page and the
purported referrer?

We can play guessing games of course. Maybe the PDF file has a link, you
just didn't notice it. Maybe someone was using a browser that had been
configured to send random Referer fields. Or maybe the PDF document was
changed recently, removing the link.

--
Yucca, http://www.cs.tut.fi/~jkorpela/
Pages about Web authoring: http://www.cs.tut.fi/~jkorpela/www.html

Jul 20 '05 #3
fi**********@ho tmail.com (Ryann) wrote in
news:da******** *************** ***@posting.goo gle.com:
I had a strange entry in my referrer logs. The http-referrer
reported that the user came from another site. But the file it
claimed to come from a pdf file. I followed the link back and as
a PDF file it clearly doesn't have a link back to our side.
Under what circumstances might this happen?


Some browsers particularly Firebird 0.7 are known to send random
referrer fields based on the contents of one of the open tabs.

I know this because I get some entries like this and I once
successfully traced a few back to the origin (I knew the owner of
this particular IP so it was easy to figure out what was
happening).

On the other hand, you may wish to google for referrer spam
(http://www.google.com/search?q=referrer%20spam)
--
Kayode Okeyode
http://www.kayodeok.co.uk/weblog/
http://www.kayodeok.btinternet.co.uk.../webdesign.htm
Jul 20 '05 #4
fi**********@ho tmail.com (Ryann) wrote in
news:da******** *************** ***@posting.goo gle.com:
I had a strange entry in my referrer logs. The http-referrer
reported that the user came from another site. But the file it
claimed to come from a pdf file. I followed the link back and as
a PDF file it clearly doesn't have a link back to our side.
Under what circumstances might this happen?


Some browsers particularly Firebird 0.7 are known to send random
referrer fields based on the contents of one of the open tabs.

I know this because I get some entries like this and I once
successfully traced a few back to the origin (I knew the owner of
this particular IP so it was easy to figure out what was
happening).

On the other hand, you may wish to google for referrer spam
(http://www.google.com/search?q=referrer%20spam)
--
Kayode Okeyode
http://www.kayodeok.co.uk/weblog/
http://www.kayodeok.btinternet.co.uk.../webdesign.htm
Jul 20 '05 #5
No, I don't expect you to know better than I do. I thought maybe
someone might have had this experience before. The link came from an
competitors website, which is why it was suspect. It is HIGHLY
unlikely that the competitor would be linking to our site. Your second
suggestion "a browser that had been
configured to send random Referer fields" which was also suggested by
another poster is likely the cause. Thank you for you help.

"Jukka K. Korpela" <jk******@cs.tu t.fi> wrote in message news:<Xn******* *************** ******@193.229. 0.31>...
fi**********@ho tmail.com (Ryann) wrote:
I had a strange entry in my referrer logs. The http-referrer reported
that the user came from another site. But the file it claimed to come
from a pdf file. I followed the link back and as a PDF file it clearly
doesn't have a link back to our side. Under what circumstances might
this happen?


Do you expect us to be able to know better than you do, _without_ the
referrer log entries and especially without the URLs of your page and the
purported referrer?

We can play guessing games of course. Maybe the PDF file has a link, you
just didn't notice it. Maybe someone was using a browser that had been
configured to send random Referer fields. Or maybe the PDF document was
changed recently, removing the link.

Jul 20 '05 #6

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
1883
by: Bruce A. Julseth | last post by:
My MySQL.user table (user, host, password) looks like the following: +---------+-----------+---------------------+ | user | host | password | +---------+-----------+---------------------+ | root | localhost | | | root | % | | | | localhost | 3823a5ee1f831626 | | | % |...
0
4181
by: Jean Hagen | last post by:
I'm trying to write a script to weekly remove MySQL logs, the general, error and binary log files. Following the MySQL documentation, I've written a script that moves all current log files, then executes mysqladmin flush-logs. My question is this on the binary logs (bin.001, bin.002, etc.): once these are removed and flush logs is executed, the binary log files start over with bin.001.
1
1753
by: Robert Kattke | last post by:
How are websites implementing this ? It certainly doesn't help that IE doesn't seem to pass document.referrer or am I missing something ? Is it set up thru an add-on analysis package ? (referrer info from logs? ) TIA, References, Links welcome.
0
1485
by: marfi95 | last post by:
I'm automating a piece of my app to allow my customers to send me a copy of their event logs (for diagnostics) on demand just through the click of a button. I know I can use the EventLog/EventObjEntry objects and write the event entries to another flat file or xml or something like that, but I think that will take way too long to run based on just iterating through the entries and writing to a file. What I'd like to do is basically what...
9
3102
by: goks | last post by:
I'm using document.referrer method for tracking visits on my site. But it seems that, when someone finds my site with google, this method returns only: "google.com/search?q=xxxxx" (good) or "google.com/search?hl=en" (bad) or "google.com/search?sourceid=navclient" (bad) That meens, it returns only first parameter sent to google. "hl" defines
14
7599
by: RdR | last post by:
Would anyone know if DDL changes such as creating a table, altering a table, dropping the table, dropping a tablespace be in the DB2 logs? I am writing a log capture program so that I can replicate changes on my source DB2 by getting change data information , get this information, convert it to a SQL command, send it to another DB2 instance and run it there, in effect replicating the DDL change. I am already able to do this with DML....
1
1977
by: marfi95 | last post by:
I'm automating a piece of my app to allow my customers to send me a copy of their event logs (for diagnostics) on demand just through the click of a button. I know I can use the EventLog/EventObjEntry objects and write the event entries to another flat file or xml or something like that, but I think that will take way too long to run based on just iterating through the entries and writing to a file.
1
2773
by: Mike Dee | last post by:
Hi All - I'm having a strange problem I'm wondering if anyone can shed some light on. When I use ASP or ASP.NET code to get the referrer information from the server side, it comes back as null. However in these same cases document.referrer returns the valid referrer. What could cause this? In other words, with the following line: ref = Request.ServerVariables("HTTP_REFERER") (or its ASP.NET equivalent)
0
1173
by: =?Utf-8?B?SHVleQ==?= | last post by:
Can anyone give me a couple pointers on safely clearing the logs? We have an extremely active environment and I am worried that even after I dump all the entries a dozen or so new ones will be created before I can call the Clear method. If this happens I am guessing that I will throw away any entries that get created between the time my dump process finishes and the time I call Clear. How can I safely clear only those entries that I know...
0
10857
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10948
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10483
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9661
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
8035
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
7187
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5880
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
6076
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
4295
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.