New headless Chrome has been released and has a near-perfect browser fingerprint

This post presents the new headless Chrome version and shows the main browser fingerprint differences that exist compare to the old headless Chrome.

Using Python3-nmap to fingerprint and cluster proxies

How to leverage the Python3-nmap library to fingerprint proxies and group proxy IPs using their fingerprint. As an example, we use the list of open ports as a simple fingerprint.

Exploring the Avastel all infected IPs 7d blocklist using Git-python and Matplotlib

How to automatically explore a bot/proxy IP blocklist and extract statistics using Git-python and Matplotlib.

NodeJS/JavaScript: execute at most N tasks at the same time without external dependencies

Short NodeJS/JavaScript example that showcases how you can execute at most N concurrent asynchronous tasks at the same time without using any external dependencies.

NodeJS: how to route HTTPS requests through an HTTP proxy without any external dependencies (optimized version)

Short but optimized NodeJS example that showcases how you can make HTTPS requests routed through HTTP proxies without using any external dependencies.

NodeJS: how to route HTTPS requests through an HTTP proxy without any external dependencies

Short NodeJS example that showcases how you can make HTTPS requests routed through HTTP proxies without using any external dependencies.

Yet another bot IPs blocklist: longtime bot IPs

Presentation of a new bot IPs blocklist. This list contains IPs (and IP ranges) that have been flagged as bots for a long time.

Bot IPs blocklists

Presentation of the bot IPs blocklists, 4 blocklists that can be used to easily block malicious bot traffic (mostly data center IPs).

Bots IPs API: documentation

Documentation of the bots IPs API as well as explanation about the data returned by the API.

New feature to malicious IPs API: check an IP

Presentation of the new feature added to the malicious IPs API.