All plays are genuine: Music Pool uses authenticated broadcast systems and verified station feeds—no bots and no fabricated metrics.
We ignore the following and they are not counted in any statistics cycle or campaign
Common stream rippers and automated recorders
- Streamripper
- ffmpeg
- wget
- curl
- youtube-dl
- yt-dlp
- streamlink
- aria2
- mpv
- Headless/http-based ripping clients and libraries
- axios / node-fetch / request-based scripts (custom rippers)
- python-requests / urllib scripts
- Go-based HTTP clients used in custom rippers
- Java-based clients (e.g., Apache HttpClient) used by scraper bots
Directory crawlers, agreggators and radio indexers (can open streams or playlists)
- TuneIn crawler/aggregator bots
- RadioBrowser pulls
- SHOUTcast directory fetchers
- directory scraping bots (custom scrapers that poll playlist/stream URLs)
Monitoring and synthetic check services (may open stream or playlist URLs)
- UptimeRobot
- Pingdom
- StatusCake
- Datadog Synthetic Checks
- New Relic / AppDynamics synthetic probes
- Custom uptime scripts using curl/ffmpeg
Web crawlers and search engine bots (may hit status or playlist endpoints)
- Googlebot
- Bingbot
- DuckDuckBot
- Baiduspider
- YandexBot
- Sogou Spider
Generic downloader/tool UAs often seen in logs (commonly used by rippers)
- Streamripper/1.x
- ffmpeg/ (ffmpeg)
- Wget/
- curl/
- python-requests/
- node-fetch/axios/
- aria2/
- libcurl/
- Java/ (generic Java clients)
Proxy, VPN and scraper farms (identify by ASN rather than single UA)
- Google Cloud / GCE IP ranges (used by custom rippers)
- Amazon AWS / EC2 IP ranges
- Microsoft Azure IP ranges
- DigitalOcean / Linode / Hetzner pools (often host scraper bots)
Malicious/test bots and known nuisance names seen in community reports
- “ripbot”, “streamrip”, “recordbot” (generic custom bot names)
- “auto-recorder”, “recorder”, “listenerbot”
- “bot”, “streambot”, “listener-bot” (various custom UAs)
- “axios/0.xx” (identifies Node.js scripts)
- “python-urllib/” (identifies simple Python scraping scripts)