最近在做dns tunnel检测,发现了一堆类似这样的域名:c-6rtwjumjzx7877x24uwjkjwjshjx78x2eywzx78yjx2ehtr.g00.medicinenet.com
都是以g00为子域名,前面一堆随机字符!专门查了下:
从 https://www.reddit.com/r/pihole/comments/6s2zjw/can_i_block_anything_that_comes_from_g00websitecom/ 可以看到:
the problem is this: those g00 pages are ad-tech from a company called Instart Logic. the general idea is that it sees that you have an adblocker and re-writes the page/ads to be served from the domain you are at.
My company uses it and i mesed with my adblocker to block all g00 sites, but it actually messes with the UX of the whole website.
you could accomplish the same thing by disabling javascript also
也就是说,他专门用类似域名来防止广告拦截。我专门查了下 instart logic这个公司:
Instart Logic随后将把这样的分析应用于上述产品,从而使网站或移动应用的访问速度更快,优化搜索引擎排名,帮助发行商规避广告拦截工具。
该公司表示,其电商客户通常会看到营收增长5%到8%,而由广告支撑的发行商会看到营收增长3%到15%。该公司的客户包括Neiman Marcus、Kate Spade、亚洲航空、大西洋传媒、Ziff Davis、Telstra(也是该公司投资方)和纳斯达克。
chrome里安装ublock,访问medicinenet.com,可以看到其block的记录:
https://c-5uwzmx78pmca09x24quiomax2eumlqkqvmvmbx2ekwu.g00.medicinenet.com/g00/3_c-5eee.umlqkqvmvmb.kwu_/c-5UWZMXPMCA09x24pbbx78ax3ax2fx2fquioma.umlqkqvmvmb.kwux2fquiomax2fatqlmapwex2fbpcuj-atqlmapwex2fbpcuj-x78awzqiaqa-umvc.rx78ox3fq98k.uizsx3dquiom_$/$/$/$/$ =》是一张图片
https://c-5uwzmx78pmca09x24ix78qax2eowwotmx2ekwu.g00.medicinenet.com/g00/3_c-5eee.umlqkqvmvmb.kwu_/c-5UWZMXPMCA09x24pbbx78ax3ax2fx2fix78qa.owwotm.kwux2frax2fx78tcawvm.rax3fq98k.uizsx3dakzqx78b_$/$/$ =》是js脚本
https://c-5uwzmx78pmca09x24quiomax2eumlqkqvmvmbx2ekwu.g00.medicinenet.com/g00/3_c-5eee.umlqkqvmvmb.kwu_/c-5UWZMXPMCA09x24pbbx78ax3ax2fx2fquioma.umlqkqvmvmb.kwux2fkaax2fumlqkqvmvmbx2fzmlmaqovx2fdmvlwzx2fidozcvl.kaax3fq98k.uizsx3dtqvs_$/$/$/$/$/$?i10c.ua=1 =》 css
从 https://community.webroot.com/t5/Webroot-SecureAnywhere-Internet/g00-adware-insertion/td-p/279885 也可以看到: