确定哪些广告作出/eyeblaster/addineyev2.html的请求(Determine w

2019-08-02 23:46发布

I have a large website that is using two large online advertisement "Remnant" providers. These providers are such that they start and stop ad campaigns on a regular basis that run on our website.

One of the ads coming from one of the providers is incorrectly making a request to:

/eyeblaster/addineyev2.html

I have determined that the file being requested is used by some websites when the ads on the website are served via iframes. This file in theory would circumvent the cross domain restrictions so that the ad provider could resize the iframe using javascript within the iframe.

I determined this use of the file by stumbling upon this support document:

http://support.google.com/dfp_premium/bin/answer.py?hl=en&answer=1085693

My problem is that our websites do not use iframes to deliver advertisements, so the requests going to the "/eyeblaster/addineyev2.html" URI results in a 404 error, and is unnecessary. Because the error is coming from a large vendor-provided CMS the error renders with our Google Analytics tracking code on it. This has the result of inflating our apparent pageviews.

The pageview inflation can be very severe, because the 404 error page also contains ads. That 404 page could also load the faulty ad, resulting in a recursive loop of ads loading the exact same "/eyeblaster/addineyev2.html" 404 page.

I have thus far been unable to witness an ad making a direct request to this url via Firebug or similar developer tools. Yet, the traffic to this non-existent page is gigantic so the offending ad is certainly still in the mix. The problem is that I cannot figure out which ad is broken, so I can't tell our remnant providers to remove it. Both vendors are feigning ignorance of the issue.

I cannot remove the Google tracking code on the 404 error page, but I can add additional JavaScript to the page.

Is there any way that I could identify the ad causing a request to "/eyeblaster/addineyev2.html" by adding some javascript to the 404 error that results when trying to request that page inside an iframe?

Essentially almost a "frame buster" script that instead of busting the frame, gives information on the HTML nodes nearby the iframe element? I think it's mildly possible, but I'm not seeing a clear path at the moment.

Thanks!

Answer 1:

为了避免不需要的跟踪,你应该放在一个虚拟的空文件/eyeblaster/addineyev2.html ,或者,如果你使用nginx做这样的事情

server {
  ...

  location = /eyeblaster/addineyeV2.html { echo ""; }
}

或更好

server {
  ...

  location = /eyeblaster/addineyeV2.html { return 404 "404 - page not found";}
}

如果你不有静态主机和无法配置代理服务器,你可以把一个条件,通过JavaScript您的404页追踪

if (document.URL.indexOf('/eyeblaster/addineyeV2.html') == -1) {
   doAnalyticsTracking();
}


Answer 2:

我发现我自己的答案,我会在这里分享它的罕见事件的另一个Web开发人员正在努力白费精确定位的广告做同样的事情给他们。

违规的数字广告是未来在与该指出向着“/eyeblaster/addineyev2.html”我用这个知识的iframe,并编码以下JavaScript收集包含的iframe页面(即信息与广告页面它)。

if(top != self) {
    $.post("/ad_diagnose/log.php", {
        a: $('#ad-div-one', top.document).html(),
        b: $('#ad-div-two', top.document).html(),
        c: $('#ad-div-three', top.document).html(),
        d: $('#ad-div-four', top.document).html(),
        e: $('#ad-div-five', top.document).html(),
    });
}

此JavaScript用了jQuery(其中我们的CMS提供商包括在每一页上是这样)。 它检查是否在iframe中存在的错误页面(顶部!=自我),然后将其抓住应该包含广告父页面上的每个HTML元素的原始HTML。

这些数据被包装成一个对象,并张贴到一个简单的PHP脚本,将写日志发布到到一个文件中的每个值。

最后,我收到一个日志文件具有高的可能性,违规广告代码为内。 我能够做的文件快速grep和发现了一个iframe向着“/eyeblaster/addineyev2.html”指着广告

我希望这可以帮助别人那里!



Answer 3:

它看起来像有有这个问题更多的出版商。 我也做。 继TALS说明我是能够指向一个iframe对目的的404页时,日志信息,但不能因为它出现随机赶上这个问题,我无法检查为什么脚本不抓住它。

如何从这个文件中添加/eyeblaster/addineyev2.html和日志?

我能确定脚本做一个简单的网络搜索的所有者。 它是来自http://www.mediamind.com/但在谷歌的AdSense禁用“mediamind”不会做的伎俩,所以我问他们的支持给我的文件。

我要测试的脚本,如果404电话也越来越低。 也许我还会使用脚本来检查正在加载的内容,并确定exect广告网址将其关闭。



Answer 4:

只是想我要分享,这是我们的Ozzu网站发生过为好。 我第一次意识到,当我们的一些会员的抱怨问题的,但我没有看太深,我开始还以为是一个孤立的例子。

在过去的一个月我也注意到,在服务器上我的错误日志文件已经高于正常推/ usr分区,以约82%的使用率。 我并没有把两者结合直到今天,我终于开始翻翻错误,看来这不是一个孤立的实例与此Eyeblaster广告类型的广告。 有数以千计的用户来到我们的网站,然后被重定向到一个404页面上我们的网站,因为这一点。 这是在我们的日志文件中的错误的一个样本,看来,许多网络使用从媒体介意Eyeblaster广告软件:

[Thu Dec 13 16:36:51 2012] [error] [client 123.123.123.123] File does not exist: /public_html/eyeblaster, referer: http://lax1.ib.adnxs.com/if?enc=AAAAAAAAAAAAAAAAAAAAAAAAAGC4Hvs_AAAAAAAAAAAAAAAAAAAAAMqchzp-qp9L_vlliXOoLV2gdMpQAAAAAEMUDABGAQAAQAEAAAIAAADXo0AA-FcCAAAAAQBVU0QAVVNEAKAAWAIAeAAAYk4AAgMCAQUAAIIA5BXJnQAAAAA.&cnd=%21QxtEWwidpzIQ18eCAhgAIPivCTAEOIDwBUABSMACUMOoMFgAYL4FaABwKngAgAH6AYgBAJABAZgBAaABAqgBALABALkBAAAAAAAAAADBAQAAAAAAAAAAyQEgEFk1j_LCP9kBAAAAAAAA8D_gAQA.&udj=uf%28%27a%27%2C+15986%2C+1355445408%29%3Buf%28%27c%27%2C+824221%2C+1355445408%29%3Buf%28%27r%27%2C+4236247%2C+1355445408%29%3B&ccd=%21mgWjMAidpzIQ18eCAhj4rwkgAQ..&vpid=18&referrer=http%3A%2F%2Fwww.ozzu.com%2F&dlo=1
[Thu Dec 13 16:36:56 2012] [error] [client 123.123.123.123] File does not exist: /public_html/eyeblaster

我刚才联系了媒体心灵的公司以及看看他们是否有进一步的投入。 在我们的日志中的错误,至少从一些广告服务器,如来:

lax1.ib.adnxs.com
showads.pubmatic.com
ad.yieldmanager.com

所以这是我的印象是,许多媒体公司都采用这种眼冲击波软件。 我看着更成什么眼霜据说冲击波那样,它是某种技术,页面上同步众多的广告,如果他们是一个很大的广告。 例如动画会在一个广告开始,在另一端。 反正一定是流行的众多广告公司似乎使用它,因此我可能会到广告商的残疾人很多。

我认为解决这个问题将是有媒体心灵解决这个问题的最好办法,但我不知道。

反正只是想分享我的经验,这个问题似乎会影响许多网站。



文章来源: Determine which advertisement made a request to /eyeblaster/addineyev2.html