Discover what's causing search queries on our Magento 2 site
- or -
Post a project like this1394
£160(approx. $201)
- Posted:
- Proposals: 9
- Remote
- #2888552
- OPPORTUNITY
- Awarded
Top Web, Mobile Developer for B2B | B2C | Online Learning | MarketPlace | Travel
Solihull
Top rated PHP Web Development | WordPress | Magento | Drupal | OpenCart | PrestaShop | Joomla
Leicester
♛ No. 1 ♛ UK's Professional Web Development , Web Designing, Magento , Shopify, WordPress , API Integration, Full-Stack Ruby on Rails Developer,Senior Front-End Developer (AngularJS / Node.js)
Chandigarh
Web Developer I Graphic Designer I Video Editor & Animation I Data Analytics|article writing
Islamabad
75033130928500685105075411700051979336281503728411513817740
Description
Experience Level: Expert
We need someone who can find the cause of non-human search queries on our Magento 2 website.
We are using the Doofinder search engine and regularly exceed our monthly query limit.
The Doofinder log shows our top search terms are
api v2_soap
qrcode adminhtml_qrcode index
downloader
%23
We need to find the cause whether it's a 3rd party module or an external bot and ban the IP it originates from.
The query "qrcode adminhtml_qrcode index" relates to one of our modules which we disabled and the search term stopped being searched. We don't want to leave this disabled and need to find the cause.
We've emailed the doofinder support team and here is their response to the issue
"If the IP which has made those searches is your own, it's because the internal searches are performed server to server from your server to ours. In this case you need to double check doofinder logs with your server access logs in order to find out the origin IP and ban it in your server.
If the problem are bots, they're attacks are not performed to doofinder, are performed to your search, no matter what the search engine is. You can explore, try other alternatives, but the search spamming will continue unless you tame security measures server side, like Cloudfare. Doofinder secures the layer to avoid bots, but we can't secure our customers internal search, it must be done in their servers."
The full doofinder search logs are available.
If you require any further information please contact us.
We are using the Doofinder search engine and regularly exceed our monthly query limit.
The Doofinder log shows our top search terms are
api v2_soap
qrcode adminhtml_qrcode index
downloader
%23
We need to find the cause whether it's a 3rd party module or an external bot and ban the IP it originates from.
The query "qrcode adminhtml_qrcode index" relates to one of our modules which we disabled and the search term stopped being searched. We don't want to leave this disabled and need to find the cause.
We've emailed the doofinder support team and here is their response to the issue
"If the IP which has made those searches is your own, it's because the internal searches are performed server to server from your server to ours. In this case you need to double check doofinder logs with your server access logs in order to find out the origin IP and ban it in your server.
If the problem are bots, they're attacks are not performed to doofinder, are performed to your search, no matter what the search engine is. You can explore, try other alternatives, but the search spamming will continue unless you tame security measures server side, like Cloudfare. Doofinder secures the layer to avoid bots, but we can't secure our customers internal search, it must be done in their servers."
The full doofinder search logs are available.
If you require any further information please contact us.
John R.
100% (38)Projects Completed
35
Freelancers worked with
9
Projects awarded
22%
Last project
3 May 2024
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies