1
Livid MOD |
3
Kirkcong OP nginx的logs显示:
218.81.175.61 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 116.4.8.245 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)" 116.4.8.245 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 125.37.180.148 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; SV1)" 125.37.180.148 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 61.235.79.184 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; SV1)" 61.235.79.184 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 122.70.11.228 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)" 122.70.11.228 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 119.116.172.209 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; SV1)" 119.116.172.209 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 182.37.207.216 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1)" 182.37.207.216 - - [18/Oct/2010:15:15:33 +0800] "\x00" 400 173 "-" "-" 183.10.210.21 - - [18/Oct/2010:15:15:33 +0800] "GET /uc_server/admin.php?m=user&a=login&iframe=&sid= HTTP/1.1" 502 533 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; SV1)" |
5
fanzeyi 2010-10-18 15:43:48 +08:00
表示 不明白 但是看了下百科的解释= = 貌似加个放刷新 然后如果一个人一直激活防刷新后就自动转到 带GFW敏感词的 网址 自动阻断他对你网站访问3分钟 貌似亚洲自由电台的网址就行? 这个方法仅限国外服务器= =
|
6
Kirkcong OP @fanzeyi 我是国外的服务器。就是,我现在有什么办法在php或者nginx上添加规则,来过滤对方的访问,防止刷新?
|
7
gonbo 2010-10-18 16:28:28 +08:00
@Kirkcong 可以使用一下 www.haifang.in 海外的ddos cc防御
|
8
donwa 2010-10-18 17:02:57 +08:00
discuz!的采用了内置的cc防御?就可以防御住了? 那说明用脚本还是可以解决的嘛。写个过来脚本咯
|
9
napoleonu 2010-10-18 17:10:33 +08:00
移出 website root
|
10
Kirkcong OP @donwa 我不知道discuz的内置cc防御的脚本,怎么写。。。也不知道怎么用discuz!内置的cc防御来部署?
|
14
donwa 2010-10-18 18:08:51 +08:00
|
15
aligo 2010-10-18 18:15:45 +08:00
最简单的是:
把每次错误登录的ip存起来,如果次数太多直接交给iptable屏蔽掉? |
16
ninjai 2010-10-18 18:22:15 +08:00
apf + deflate
|
17
fanzeyi 2010-10-18 20:21:37 +08:00
mark 学习了~
|