drmike
100% Tier-1 Gogent
Draining Sales from other Lowendtalk and Lowendbox Companies
Have you ever visited Servermania's website? Wondering why wherever you go online you keep seeing Servermania ads for dedicated servers of VPS packages? Seen such on Facebook, Youtube, random websites that run Google Ads?
Odds are you are a visitor to Lowendtalk.com or Lowendbox.com. You contracted the Servermania ad stalking plague via one of those sites.
When you go to Lowendtalk.com or Lowendbox.com you receive a cookie in your browser for AdRoll and their 'client' Servermania.
You can find the ad bug by going to either site and viewing the page source. Go to the very bottom of the page and you find:
<script type="text/javascript">
adroll_adv_id = "QJSDIDC4UFEMBMV27GEVT4";
adroll_pix_id = "GMBHGZ3CGRFJLERGSOGDO4";
(function () {
var oldonload = window.onload;
window.onload = function(){
__adroll_loaded=true;
var scr = document.createElement("script");
var host = (("https:" == document.location.protocol) ? "https://s.adroll.com" : "http://a.adroll.com");
scr.setAttribute('async', 'true');
scr.type = "text/javascript";
scr.src = host + "/j/roundtrip.js";
((document.getElementsByTagName('head') || [null])[0] ||
document.getElementsByTagName('script')[0].parentNode).appendChild(scr);
if(oldonload){oldonload()}};
}());
</script>
adroll_adv_id = the unique advertiser identifier
Plugging QJSDIDC4UFEMBMV27GEVT4 into Google:
https://www.google.com/?gws_rd=ssl#safe=off&q=QJSDIDC4UFEMBMV27GEVT4
Yields:
https://tools.digitalpoint.com/cookie-search?cookie_domain=.www.servermania.com
Therein:
servermania.com Aug 27, 2014 Name __ar_v4 Domain .www.servermania.com Expires Value |QJSDIDC4UFEMBMV27GEVT4:20140826:1|GMBHGZ3CGRFJLERGSOGDO4:20140826:1|T7TC7EIUQJDNVPRCMYQV3Z:20140826:1
Cross referencing this to Servermania:
view-source:https://web.archive.org/web/20140208055456/http://www.servermania.com/
Archive.org site grab of Servermania.com from February 8, 2014:
Lines 684-700:
<script type="text/javascript">
adroll_adv_id = "QJSDIDC4UFEMBMV27GEVT4";
adroll_pix_id = "GMBHGZ3CGRFJLERGSOGDO4";
(function () {
var oldonload = window.onload;
window.onload = function(){
__adroll_loaded=true;
var scr = document.createElement("script");
var host = (("https:" == document.location.protocol) ? "/web/20140208055456/https://s.adroll.com" : "/web/20140208055456/http://a.adroll.com");
scr.setAttribute('async', 'true');
scr.type = "text/javascript";
scr.src = host + "/j/roundtrip.js";
((document.getElementsByTagName('head') || [null])[0] ||
document.getElementsByTagName('script')[0].parentNode).appendChild(scr);
if(oldonload){oldonload()}};
}());
</script>
What is AdRoll?
A thread was started on vpsBoard about AdRoll as precursor to this:
AdRoll is off-site re-marketing. A visitors comes to your website. They do not buy. You feed them an AdRoll cookie. 20 minutes later when they are elsewhere online BLAMO! up comes an ad for your site, where they just were.
AdRoll significantly increases sales for most companies.
AdRoll isn't the only company doing this sort of thing. Google has similar cooked directly into their own ad offering. AdRoll opens the concept up to many more advertising networks including Facebook.
Smart conceptually AdRoll is when implemented on your own site.
Why This Sort of Re-Marketing is BAD
Re-marketing is iffy to start with. Many consumers consider this ad stalking and are weirded out by such.
Re-marketing is rife with ad click fraud. It is more infested with fraud than straight ad buys since the end delivery sites are often vague, and sometime 3rd party where the original “qualifying” cookie placement happened.
To consumers this is ad stalking and doing it via a third party website is just being a dirt bag.
To you, if you are a company that sells dedicated servers or sells VPS and does so through LET and LEB, ColoCrossing and Servermania are screwing you out of sales. They are absorbing customers through these sales via ads on other sites where they've targetted ALL LET AND LEB visitors as Servermania leads. In the process they've even tagged you the company owner and competitor as a lead.
Servermania is Colocrossing's largest customer and has a special investment relationship with Colocrossing.
This points to something larger and more sinister though.
How Long has LowendTalk and Lowendbox been Bugged by Servermania?
Lowendtalk June 28, 2013, Archive.org capture doesn't include the AdRoll code:
view-source:https://web.archive.org/web/20130628205642/http://www.lowendtalk.com/
Lowendtalk August 5, 2013, Archive.org capture DOES include Adroll code:
view-source:https://web.archive.org/web/20130805071054/http://lowendtalk.com/
Lowendbox July 9, 2013, Archive.org capture doesn't include the AdRoll code:
https://web.archive.org/web/20130709035639/http://www.lowendbox.com/
Lowendbox July 12, 2013, Archive.org capture DOES include the AdRoll code:
view-source:https://web.archive.org/web/20130712053326/http://www.lowendbox.com/
So both sites were likely bugged July 9-12, 2013, and have been ever since.
What should people do about this?
Advertisers on LET and LEB should reconsider their spending on BuySellAd campaigns.
Others should demand Servermania bugging via AdRoll be removed from LET and LEB.
Everyone should demand LET and LEB run in a more transparent and honest fashion free of these shell companies and investments they are so fond of hiding behind (ChicagoVPS, UGVPS, 123Systems, BlueVM, HVH, etc.)
Demand action addressing the never ending Servermania shilling on LEB (masses of offers under their own shell company garbage).
Have you ever visited Servermania's website? Wondering why wherever you go online you keep seeing Servermania ads for dedicated servers of VPS packages? Seen such on Facebook, Youtube, random websites that run Google Ads?
Odds are you are a visitor to Lowendtalk.com or Lowendbox.com. You contracted the Servermania ad stalking plague via one of those sites.
When you go to Lowendtalk.com or Lowendbox.com you receive a cookie in your browser for AdRoll and their 'client' Servermania.
You can find the ad bug by going to either site and viewing the page source. Go to the very bottom of the page and you find:
<script type="text/javascript">
adroll_adv_id = "QJSDIDC4UFEMBMV27GEVT4";
adroll_pix_id = "GMBHGZ3CGRFJLERGSOGDO4";
(function () {
var oldonload = window.onload;
window.onload = function(){
__adroll_loaded=true;
var scr = document.createElement("script");
var host = (("https:" == document.location.protocol) ? "https://s.adroll.com" : "http://a.adroll.com");
scr.setAttribute('async', 'true');
scr.type = "text/javascript";
scr.src = host + "/j/roundtrip.js";
((document.getElementsByTagName('head') || [null])[0] ||
document.getElementsByTagName('script')[0].parentNode).appendChild(scr);
if(oldonload){oldonload()}};
}());
</script>
adroll_adv_id = the unique advertiser identifier
Plugging QJSDIDC4UFEMBMV27GEVT4 into Google:
https://www.google.com/?gws_rd=ssl#safe=off&q=QJSDIDC4UFEMBMV27GEVT4
Yields:
https://tools.digitalpoint.com/cookie-search?cookie_domain=.www.servermania.com
Therein:
servermania.com Aug 27, 2014 Name __ar_v4 Domain .www.servermania.com Expires Value |QJSDIDC4UFEMBMV27GEVT4:20140826:1|GMBHGZ3CGRFJLERGSOGDO4:20140826:1|T7TC7EIUQJDNVPRCMYQV3Z:20140826:1
Cross referencing this to Servermania:
view-source:https://web.archive.org/web/20140208055456/http://www.servermania.com/
Archive.org site grab of Servermania.com from February 8, 2014:
Lines 684-700:
<script type="text/javascript">
adroll_adv_id = "QJSDIDC4UFEMBMV27GEVT4";
adroll_pix_id = "GMBHGZ3CGRFJLERGSOGDO4";
(function () {
var oldonload = window.onload;
window.onload = function(){
__adroll_loaded=true;
var scr = document.createElement("script");
var host = (("https:" == document.location.protocol) ? "/web/20140208055456/https://s.adroll.com" : "/web/20140208055456/http://a.adroll.com");
scr.setAttribute('async', 'true');
scr.type = "text/javascript";
scr.src = host + "/j/roundtrip.js";
((document.getElementsByTagName('head') || [null])[0] ||
document.getElementsByTagName('script')[0].parentNode).appendChild(scr);
if(oldonload){oldonload()}};
}());
</script>
What is AdRoll?
A thread was started on vpsBoard about AdRoll as precursor to this:
AdRoll is off-site re-marketing. A visitors comes to your website. They do not buy. You feed them an AdRoll cookie. 20 minutes later when they are elsewhere online BLAMO! up comes an ad for your site, where they just were.
AdRoll significantly increases sales for most companies.
AdRoll isn't the only company doing this sort of thing. Google has similar cooked directly into their own ad offering. AdRoll opens the concept up to many more advertising networks including Facebook.
Smart conceptually AdRoll is when implemented on your own site.
Why This Sort of Re-Marketing is BAD
Re-marketing is iffy to start with. Many consumers consider this ad stalking and are weirded out by such.
Re-marketing is rife with ad click fraud. It is more infested with fraud than straight ad buys since the end delivery sites are often vague, and sometime 3rd party where the original “qualifying” cookie placement happened.
To consumers this is ad stalking and doing it via a third party website is just being a dirt bag.
To you, if you are a company that sells dedicated servers or sells VPS and does so through LET and LEB, ColoCrossing and Servermania are screwing you out of sales. They are absorbing customers through these sales via ads on other sites where they've targetted ALL LET AND LEB visitors as Servermania leads. In the process they've even tagged you the company owner and competitor as a lead.
Servermania is Colocrossing's largest customer and has a special investment relationship with Colocrossing.
This points to something larger and more sinister though.
How Long has LowendTalk and Lowendbox been Bugged by Servermania?
Lowendtalk June 28, 2013, Archive.org capture doesn't include the AdRoll code:
view-source:https://web.archive.org/web/20130628205642/http://www.lowendtalk.com/
Lowendtalk August 5, 2013, Archive.org capture DOES include Adroll code:
view-source:https://web.archive.org/web/20130805071054/http://lowendtalk.com/
Lowendbox July 9, 2013, Archive.org capture doesn't include the AdRoll code:
https://web.archive.org/web/20130709035639/http://www.lowendbox.com/
Lowendbox July 12, 2013, Archive.org capture DOES include the AdRoll code:
view-source:https://web.archive.org/web/20130712053326/http://www.lowendbox.com/
So both sites were likely bugged July 9-12, 2013, and have been ever since.
What should people do about this?
Advertisers on LET and LEB should reconsider their spending on BuySellAd campaigns.
Others should demand Servermania bugging via AdRoll be removed from LET and LEB.
Everyone should demand LET and LEB run in a more transparent and honest fashion free of these shell companies and investments they are so fond of hiding behind (ChicagoVPS, UGVPS, 123Systems, BlueVM, HVH, etc.)
Demand action addressing the never ending Servermania shilling on LEB (masses of offers under their own shell company garbage).
Last edited by a moderator: