June 17, 2006
Google Index Flooded With Spam
Google doesn't show the number of pages in the index on its homepage, but a good way to find it is to search for "* *". The resulting number is 25,270,000,000. Google says their index is more than 3 times larger than any other search engine. But what kind of pages are included in this huge index? Let's see:
Search for [site:t1ps2see.com]: 2,460,000,000 results and every page is a search result from a spam site.
Search for [site:eiqz2q.org]: 5,100,000,000 results that redirect to the same t1ps2see.com spam site.
Here's Alexa traffic:
And the list of spam sites is really long. So that means Google has upgraded its index with spam sites.
Note: Yahoo and MSN have very few pages from the sites mentioned (MSN: 59 results, Yahoo: 11,800 results for [site:eiqz2q.org]).
Also read:
Examples of queries for which these sites rank well
Search Google searches (where you can see how Google indexes search results from Blog Search, Google Maps or Google Books).
Subscribe to:
Post Comments (Atom)
Nice find.
ReplyDeleteHere's the WHOIS for eiqz2q.org:
ReplyDeleteDomain ID:D123528369-LROR
Domain Name:EIQZ2Q.ORG
Created On:31-May-2006 13:46:53 UTC
Registrant Name:Frederico Juan Carlos Arano
Registrant Organization:N/A
Registrant Street1:Calle 5 de Septiembre 1442
Registrant Street2:
Registrant Street3:
Registrant City:Buenos Aires
Registrant State/Province:Buenos Aires
Registrant Postal Code:C.P. 1426
Registrant Country:AR
Registrant Phone:+005.4114578318
Registrant Phone Ext.:
Registrant FAX:
Registrant FAX Ext.:
Registrant Email:webmaster@starnet.md
WHOIS for T1PS2SEE.COM:
ReplyDeleteDomain Name: T1PS2SEE.COM
Registrar: DIRECT INFORMATION PVT LTD D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Name Server: NS.T1PS2SEE.COM
Name Server: NS2.T1PS2SEE.COM
Status: ACTIVE
Updated Date: 25-may-2006
Creation Date: 25-may-2006
Expiration Date: 25-may-2007
here is step by step how he did it:
ReplyDeletehttp://anaaman.blogspot.com/2006/06/moldavian-blackhat.html