omgilibot is the legacy web crawler from Omgili (now Webz.io) that specializes in collecting content from discussion boards, forums, and user-generated content platforms. The bot focuses on capturing conversations, opinions, and discussions across the web. The collected data is used for sentiment analysis, market research, and trend monitoring. The bot respects robots.txt directives.
User Agent String
omgili/0.5 +http://omgili.com
How to Control omgilibot
Block Completely
To prevent omgilibot from accessing your entire website, add this to your robots.txt file:
Multiple ways to detect omgilibot in your application:
Basic Pattern
/omgilibot/i
Strict Pattern
/^omgili/0\.5 \+http\://omgili\.com$/
Flexible Pattern
/omgilibot[\s\/]?[\d\.]*?/i
Vendor Match
/.*Webz\.io.*omgilibot/i
Implementation Examples
// PHP Detection for omgilibot
function detect_omgilibot() {
$user_agent = $_SERVER['HTTP_USER_AGENT'] ?? '';
$pattern = '/omgilibot/i';
if (preg_match($pattern, $user_agent)) {
// Log the detection
error_log('omgilibot detected from IP: ' . $_SERVER['REMOTE_ADDR']);
// Set cache headers
header('Cache-Control: public, max-age=3600');
header('X-Robots-Tag: noarchive');
// Optional: Serve cached version
if (file_exists('cache/' . md5($_SERVER['REQUEST_URI']) . '.html')) {
readfile('cache/' . md5($_SERVER['REQUEST_URI']) . '.html');
exit;
}
return true;
}
return false;
}
# Python/Flask Detection for omgilibot
import re
from flask import request, make_responsedef detect_omgilibot():
user_agent = request.headers.get('User-Agent', '')
pattern = r'omgilibot'
if re.search(pattern, user_agent, re.IGNORECASE):
# Create response with caching
response = make_response()
response.headers['Cache-Control'] = 'public, max-age=3600'
response.headers['X-Robots-Tag'] = 'noarchive'
return True
return False# Django Middleware
class omgilibotMiddleware:
def __init__(self, get_response):
self.get_response = get_response
def __call__(self, request):
if self.detect_bot(request):
# Handle bot traffic
pass
return self.get_response(request)
// JavaScript/Node.js Detection for omgilibot
const express = require('express');
const app = express();// Middleware to detect omgilibot
function detectomgilibot(req, res, next) {
const userAgent = req.headers['user-agent'] || '';
const pattern = /omgilibot/i;
if (pattern.test(userAgent)) {
// Log bot detection
console.log('omgilibot detected from IP:', req.ip);
// Set cache headers
res.set({
'Cache-Control': 'public, max-age=3600',
'X-Robots-Tag': 'noarchive'
});
// Mark request as bot
req.isBot = true;
req.botName = 'omgilibot';
}
next();
}app.use(detectomgilibot);
# Apache .htaccess rules for omgilibot# Block completely
RewriteEngine On
RewriteCond %{HTTP_USER_AGENT} omgilibot [NC]
RewriteRule .* - [F,L]# Or redirect to a static version
RewriteCond %{HTTP_USER_AGENT} omgilibot [NC]
RewriteCond %{REQUEST_URI} !^/static/
RewriteRule ^(.*)$ /static/$1 [L]# Or set environment variable for PHP
SetEnvIfNoCase User-Agent "omgilibot" is_bot=1# Add cache headers for this bot
<If "%{HTTP_USER_AGENT} =~ /omgilibot/i">
Header set Cache-Control "public, max-age=3600"
Header set X-Robots-Tag "noarchive"
</If>
# Nginx configuration for omgilibot# Map user agent to variable
map $http_user_agent $is_omgilibot {
default 0;
~*omgilibot 1;
}server {
# Block the bot completely
if ($is_omgilibot) {
return 403;
}
# Or serve cached content
location / {
if ($is_omgilibot) {
root /var/www/cached;
try_files $uri $uri.html $uri/index.html @backend;
}
try_files $uri @backend;
}
# Add headers for bot requests
location @backend {
if ($is_omgilibot) {
add_header Cache-Control "public, max-age=3600";
add_header X-Robots-Tag "noarchive";
}
proxy_pass http://backend;
}
}
Should You Block This Bot?
Recommendations based on your website type:
Site Type
Recommendation
Reasoning
E-commerce
Optional
Evaluate based on bandwidth usage vs. benefits
Blog/News
Allow
Increases content reach and discoverability
SaaS Application
Block
No benefit for application interfaces; preserve resources
Documentation
Selective
Allow for public docs, block for internal docs
Corporate Site
Limit
Allow for public pages, block sensitive areas like intranets