Hundreds of machines that look just like this, with the same "Make sure to update your proxy address, proxy username and port." message. Most have a few entries in different abuse IPDBs. Maybe it's a podunk VPN provider... probably cheaper to spin up cloud machines and eventually burn their IPs and move on, scorched earth.
```
PORT STATE SERVICE
80/tcp open http
1080/tcp open socks
1085/tcp open webobjects
3128/tcp open squid-http
```
I am seeing some oddly consistent, patterned traffic to my Searx instance. Traffic looks benign, but the pattern is incredibly robotic.
Looking closer, there are entire /24's FULL of machines sourcing the traffic, and they all look EXACTLY the same. Across all geos, mostly OVH/LeaseWeb but a mix all over.
Hitting any of them on port 80 returns "Not authenticated or invalid authentication credentials. Make sure to update your proxy address, proxy username and port."
Botnet? VPN provider?
This should help randomize filter bubbles / geo-blocking, and potentially help prevent the originating engines from getting cranky about excessive requests, lol
As an alternative to watching the news, here's a livestream of some kittens.
TARGET:
CLASS: Involuntary human technoshaman
SPECIALIZATIONS: Technology, our increasing immersion in nth-order cybernetics, artisanal shitposting.
QUOTE: I'd pour my life out to you here, but then I'd be dead.
ADDITIONAL PROFILE INFORMATION:
________________________________________
#nobot ᔆᴼᶜⁱᴬᴸ ᴰⁱᔆᵀᴬᴺᶜᴱᴰ ᶠᴿᴼᴹ ᴮⁱᴿᵀᴴ