@jwildeboer@social.wildeboer.net at 4/18/2025, 12:30:43 PM

The web is broken, IMHO

So there is a (IMHO) shady market out there that gives app developers on iOS, Android, MacOS and Windows money for including a library that sells users network bandwidth. Infatica [1] is just one example, there are many more.

I am 99% sure that these companies cause what effectively are DDoS attacks that many webmasters have to deal with since months. This business model should simply not exist. Apple, Microsoft and Google should act.

1/8

[1] infatica.io/sdk-monetization/

How does the monetization work?

We connect your users’ IP addresses to the Infatica peer-to-business network, which allows companies to access web data to build price aggregation platforms, perform search engine optimization, create brand protection and marketing strategies, conduct academic research, produce uptime and performance services, ensure corporate data protection, and more.

What these companies then sell to *their* customers is network access through the devices/PCs that have an app with this SDK installed. They are proud to tell you how you can funnel your (AI) web scraping etc through millions of rotating, residential and mobile IP addresses. Exactly the pattern we see hitting our servers.

infatica.io/pricing/

2/8

The offer to customers: residential IPs, Static IPs, mobile IPs etc.

"We’re offering a set of pricing plans with varying parameters including available traffic, IP address count, and other features – or you can use our flexible pricing option to fine-tune the parameters yourself. "
Global Portfolio of Residential IPs Residential IP addresses make web scraping and similar activities much easier: buy proxy IPs from residential zones, your connection is safer and more anonymous. 

United States 226090 IPs
Russia 792251 IPs
Ukraine 367600 IPs
Germany 116173 IPs
India 274277 IPs
Poland 305109 IPs
China 670301 IPs
Turkey 374577 IPs
Brazil 1123823 IPs
Indonesia 367978 IPs
Vietnam 579580 IPs
Saudi Arabia 64697 IPs

Now, again, this company is just one of many selling similar services. And they all promise that they carefully check what commands their customers send to the (IMHO) infected apps on your phone and PC. Yeah, I am sure they "do no evil". And when they do, they can claim it's not their problem because they are merely the proxy. Again, IMHO, a shady business model.

3/8

But this explains the explosion of bot traffic that really cripples a lot of smaller services (like my forgejo instance, that I had to make non-public).

So if you include such an SDK in your app to make some money — you are part of the problem and I think you should be punished for that. You are delivering malware to your users, making them botnet members.

Unfortunately it is next to impossible for normal users to detect the inclusion of such shady SDKs and the network traffic they cause.

4/8

I already blogged about this at jan.wildeboer.net/2025/02/Bloc

I might rewrite that blog post to make the problem clearer. And to explain why I am now of the opinion that *every* form of web-scraping should be considered abusive. If you think your web-scraping is acceptable behaviour, you can thank these shady companies and the "AI" hype for moving you to the bad corner.

TL;DR certain companies recruit app developers to create botnets. Botnets are malware. Period.

The web is broken, IMHO.

5/8

Addendum: Trend Micro did some research on these companies back in 2023 and it confirms my suspicions. And I guess with AI scraping this kind of business is booming. For the paranoid:

„There are malicious actors who repacked freeware and shareware written by other people to conduct drive-by downloads of the Infatica peer-to-business (P2B) service“

trendmicro.com/vinfo/ae/securi

6/8

During our one month of observation, we have seen the following suspicious or malicious behaviors that Infatica proxy customers are doing via the service:

Bruteforcing of Simperium, a cross-site data synchronization service
Bruteforcing of Bitwarden
Scraping of house prices
Scraping of Lazada and Walmart prices
Creating accounts on Live.com, Instagram, and Mail.RU
After paying for a trial plan, we received a VAT invoice that states that Infatica is registered as a company in Singapore.The address appears to be associated to a Russian-owned organization and a Russian-Asian Sports Academy. Based on our investigation, Infatica’s bank account is with the Community Federal Savings Bank, which is located in the US. It’s also possible that their banking service is proxied by TransferWise.

Addendum 2: If you want to feel really dirty, go to proxyway.com/reviews?e-filter- for a collection of reviews on these services. It's a huge market and I am 100% convinced that "AI" web scraping is currently the biggest "growth" driver for these companies.

And when I see that quite some of them rely on injecting SDKs into 3rd party apps to "extend" their "Reach", I would call these "residential proxy providers" malware/botnets. But that's just my personal opinion. I am sure they are all legit.

7/8

Page 2 of 3 of review on "proxy providers", listing IPRoyal, LunaProxy, DataImpulse, Live Proxies, PIA SS Proxy, PacketStream, Shifter, Strom Proxies, Astro, GeoSurf, MPP Group, Iced Out Proxies
Page 1 of 3 of review of "residential proxy providers", listing smart proxy, Oxylabs, brightdata, netnut, soax, webshare, Nimble, Infatica, Evomi, Massive, Proxyseller, Ayobyte
Page 3 of 3 of reviews of "residential proxy providers", listing Brazy Kicks and ASocks

If you've made it to this final post of this thread — thank you for your time and interest! I hope it helps you understand why web crawlers have become a real problem and how this is more and more an attack on the foundation of the Web as it was intended to be. This "residential proxy" business is just one part of this. And we webmasters/admins can only try to block. It is getting more and more difficult to keep up with these waves. Thanks "AI"!

I will convert this thread to a blog post.

8/8

Just as an example. In the past 24 hours I had "visitors" from 47 countries, almost all via residential IP addresses, so most likely botnet infected devices, trying to brute force their way into my mail server. This is normal, nowadays.

Part of the list of IP addresses trying to break into my mail server by trying random username/password combinations. Sorted by country code and ASN. You can see just a few of the hundreds of unique IP addresses doing this every day. I already have som 30000 IP addresses blocked and every day I add some 200-500 new ones.