There is a steady stream of blogs and 'news' about these lists
https://encrypted.google.com/search?client=ubuntu&channel=fs&q=%22S…
How does a researcher go about obtaining access logs with useragents
in order to answer some of these questions?
--
John Vandenberg