![]() | 1 Livid MOD PRO |
![]() | 3 Kirkcong OP nginx的logs显示: 218.81.175.61 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 116.4.8.245 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)" 116.4.8.245 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 125.37.180.148 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; SV1)" 125.37.180.148 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 61.235.79.184 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; SV1)" 61.235.79.184 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 122.70.11.228 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)" 122.70.11.228 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 119.116.172.209 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; SV1)" 119.116.172.209 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 182.37.207.216 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)" 182.37.207.216 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 183.10.210.21 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; SV1)" |
![]() | 5 fanzeyi 2010-10-1815:43:48 +08:00 表示 不明白 但是看了下百科的解释= = 貌似加个放刷新 然后如果一个人一直激活防刷新后就自动转到 带GFW敏感词的 网址 自动阻断他对你网站访问3分钟 貌似亚洲自由电台的网址就行? 这个方法仅限国外服务器= = |
![]() | 6 Kirkcong OP @fanzeyi 我是国外的服务器。就是,我现在有什么办法在php或者nginx上添加规则,来过滤对方的访问,防止刷新? |
![]() | 7 gonbo 2010-10-18 16:28:28 +08:00 @Kirkcong 可以使用一下 www.haifang.in 海外的ddos cc防御 |
![]() | 8 donwa 2010-10-18 17:02:57 +08:00 discuz!的采用了内置的cc防御?就可以防御住了? 那说明用脚本还是可以解决的嘛。写个过来脚本咯 |
![]() | 9 napoleonu 2010-10-18 17:10:33 +08:00 移出 website root |
![]() | 10 Kirkcong OP @donwa 我不知道discuz的内置cc防御的脚本,怎么写。。。也不知道怎么用discuz!内置的cc防御来部署? |
![]() | 14 donwa 2010-10-18 18:08:51 +08:00 |
![]() | 15 aligo 2010-10-18 18:15:45 +08:00 最简单的是: 把每次错误登录的ip存起来,如果次数太多直接交给iptable屏蔽掉? |
![]() | 16 ninjai 2010-10-18 18:22:15 +08:00 apf + deflate |
![]() | 17 fanzeyi 2010-10-18 20:21:37 +08:00 mark 学习了~ |