有时候你会发现,你在搜索引擎输入网站名称的时候,出来的网站信息是你们的,但是域名却是一个陌生的,这种情况可以基本确定网站被镜像了,那么究竟什么叫网站被镜像?
%20
恶意镜像,也叫恶意克隆,恶意解析,是指有人通过域名%20A%20记录直接解析别人%20IP%20地址,从而得到一个在访问者眼中完全相同网站的过程。其工作原理基本上是这样子的:有用户访问镜像站点时,程序就会来正版的站点查询数据,并修改相关链接然后呈献给用户,实质上还是在读取原站的数据。严谨一点的解释:通过复制整个网站或部分网页内容并分配以不同域名和服务器,以此欺骗搜索引擎对同一站点或同一页面进行多次索引的行为%20。
%20
网站被镜像的危害
%20
通俗的讲,恶意镜像者意图利用自己有一定权重的域名进行威压,通过某些手段复制了你的站点,除了域名不一样之外,其他内容一模一样,用户或许根本无法分辨。甚至对于一些新的站点,搜索引擎都会迷惑到底哪个是真的站点,那么就有可能正牌的网站被删除收录,而盗版的却被搜索引擎青睐。
%20
虽然目前我们还不知道恶意镜像我们的网站到底有什么意图,但肯定对我们没什么好处,如果他这个域名有点什么不健康的信息,那么我们被镜像的站点有可能被污染掉,所以还是要警惕这个现象。
%20
如何知道自己的网站是否被镜像
%20
复制自己网站的完整标题(PS:查看自己站点首页源码,其中%20<title>龙笑天下%20-%20分享悲伤;共享快乐</title>),然后在谷歌和百度等搜索引擎里搜索,如搜索:intitle%20龙笑天下%20-%20分享悲伤;共享快乐,如果有其他网站的网站标题、描述及网站内容跟你的一样,只有域名不一样,那就是被镜像了。
%20
如何处理网站被镜像
%20
这类镜像看似一个完整的站点,其实上是每次用户访问镜像站点,程序就会来正版的站点查询数据,并修改相关链接然后呈献给用户。实质上还是在读取原站的数据。以下龙笑天下就列举几种解决方法,大家自行取舍使用!
%20
方法%201:查清镜像网站的主机%20Ip,通过禁止%20Ip%20来解决
%20
本教程基于%20WordPress%20程序,其他系统请自测!
%20
1、获取镜像服务器%20ip。注:这个%20IP%20可能不是%20ping%20到他域名的%20IP
%20
复制如下代码,新建一个%20php%20文件,并命名为“ip.php”上传到你的网站根目录。
%20%20
<?php $file%20=%20"ip.txt";%20//保存的文件名 $ip%20=%20$_SERVER['REMOTE_ADDR']; $handle%20=%20fopen($file,%20'a'); fwrite($handle,%20"IP%20Address:"); fwrite($handle,%20"$ip"); fwrite($handle,%20"\n"); fclose($handele); ?> <?php $file%20=%20"ip.txt";%20//保存的文件名 $ip%20=%20$_SERVER['REMOTE_ADDR']; $handle%20=%20fopen($file,%20'a'); fwrite($handle,%20"IP%20Address:"); fwrite($handle,%20"$ip"); fwrite($handle,%20"\n"); fclose($handele); ?>
%20%20
2、然后访问你网站的镜像站点,在地址后面加.../ip.php,然后你就会在网站根目录找到%20ip.txt%20文件了,打开复制里面的%20ip%20地址。
%20
3、然后打开你的.htaccess%20文件,在后面加上如下代码(自行修改为刚刚获得的%20ip)
%20%20
#添加IP黑名单 Order%20Deny,Allow Deny%20from%20162.158.72.179 #添加IP黑名单 Order%20Deny,Allow Deny%20from%20162.158.72.179
%20%20
当然,如果你使用%20CDN,可以直接在%20CDN%20后台添加%20ip%20黑名单
%20
这个时候你再刷新一下镜像站点,是不是已经%20403%20报错了呢?这个时候已经解决了这个镜像站点,然后就等待蜘蛛将其解决掉吧。
%20
此方法的缺点就是如果镜像网站更换了%20ip,那我们的屏蔽就失败了
%20
方法%202:JS%20来防护
%20
在头部标签:取自%20@boke112%20导航
%20
<head></head>
%20
<head></head>
%20
里加上下面的%20JS%20代码:
%20%20
<script%20type="text/javascript"> if%20(document.location.host%20!=%20"www.ilxtx.com")%20{ location.href%20=%20location.href.replace(document.location.host,'www.ilxtx.com'); } </script> <script%20type="text/javascript"> if%20(document.location.host%20!=%20"www.ilxtx.com")%20{ location.href%20=%20location.href.replace(document.location.host,'www.ilxtx.com'); } </script>
%20%20
或加上以下的%20JS%20代码:
%20%20
<script%20type="text/javascript"> rthost%20=%20window.location.host; if%20(rthost%20!=%20"www.ilxtx.com")%20{ top.location.href%20=%20"https://www.ilxtx.com"; } </script> <script%20type="text/javascript"> rthost%20=%20window.location.host; if%20(rthost%20!=%20"www.ilxtx.com")%20{ top.location.href%20=%20"https://www.ilxtx.com"; } </script>
%20%20
注意:将上面代码中的www.ilxtx.com改为你网站的首页主地址,如果我上面填写的不是我网站的主地址%20www.ilxtx.com,而是%20ilxtx.com%20的话,就会导致网站一直刷新!
%20
注:经过本站测试,如果镜像站屏蔽了%20JS,则该方法失效。所以,最好把方法%202%20和方法%203%20结合使用!
%20
方法%203:Js%20被屏蔽后防止镜像的方法
%20
将以下代码加到网站的%20header.php%20中:代码取自%20@boke112
%20%20
<div%20style="display:none;"> <script>proxy2016%20=%20false;</script> <img%20src=""%20onerror='setTimeout(function(){if(typeof(proxy2016)=="undefined"){window.location.host="www.ilxtx.com";}},3000);'> </div> <div%20style="display:none;"> <script>proxy2016%20=%20false;</script> <img%20src=""%20onerror='setTimeout(function(){if(typeof(proxy2016)=="undefined"){window.location.host="www.ilxtx.com";}},3000);'> </div>
%20%20
有些网站会屏蔽掉%20JS%20代码(如下面的代码)%20:
%20%20
<script>...</script> <script>...</script>
%20
%20%20
所以%20<script>proxy2016%20=%20false;</script>%20
代码将被过滤掉,img%20的%20onerror%20设置超时时间%203000%20毫秒,将运行函数部分,检测是否还存在%20proxy2016%20字符,如果没有找到就会将主机的%20URL%20改为%20www.ilxtx.com;为了安全起见,将%20js%20部分可以使用%20js%20代码混淆(本站“JS%20代码混淆”%20工具%20或%20站长之家%20JS%20混淆工具)。
%20本站的混淆结果如下:
%20%20
<div%20style="display:none;"> <script>proxy2016%20=%20false;</script> <img%20src="%20"%20onerror='setTimeout(function(){if(typeof(proxy2016)=="undefined"){window["\x6c\x6f\x63\x61\x74\x69\x6f\x6e"]["\x68\x6f\x73\x74"]="\x77\x77\x77\x2e\x69\x6c\x78\x74\x78\x2e\x63\x6f\x6d";}},3000);'> </div> <div%20style="display:none;"> <script>proxy2016%20=%20false;</script> <img%20src="%20"%20onerror='setTimeout(function(){if(typeof(proxy2016)=="undefined"){window["\x6c\x6f\x63\x61\x74\x69\x6f\x6e"]["\x68\x6f\x73\x74"]="\x77\x77\x77\x2e\x69\x6c\x78\x74\x78\x2e\x63\x6f\x6d";}},3000);'> </div>
%20%20
经过我的测试,此代码在%20Chrome、IE11%20和%20360%20极速浏览器上均有效,会跳转到源站的原文章页!在%20Firefox%20上则无效果,镜像的文章页并不会跳转到原站......%20将代码中%20img%20标签的%20src%20引用地址改为空格或无效的图片地址后,在%20Firefox%20上也起作用了!
%20
方法%204:借助%20Img%20的%20Onerror%20事件
%20
20161119%20更新(增加搜狗快照支持):此方法使用了后,会导致百度快照、谷歌快照、必应快照和搜狗快照等跳到%20404%20页面(360%20搜索快照则不会~),奈何不知怎么弄,2016-11-10%20再次经过张戈的指导,将原代码中的:if(%20str1!=str3%20)%20
改为%20:if(%20str1!=str3%20&&%20str3!="cache.baiducontent.com"%20&&%20str3!="webcache.googleusercontent.com"%20&&%20str3!="c.360webcache.com"%20&&%20str3!="cncc.bingj.com"%20&&%20str3!="snapshot.sogoucdn.com"%20)%20
。估计要等快照更新时才能知道效果了!
%20
20161127:经过验证,上述更新已经起作用了!具体效果,请点我~
%20
20171022%20更新:从张戈那看到,这段代码会因为%20onerror%20死循环造成浏览网页的电脑高负载(CPU%20飙升),因此在代码%20onerror%20触发事件中加入%20onerror%20清空机制,即加入this.onerror=null。【博客网页导致电脑%20CPU%20飙升的问题解决记录】
%20
通过拆分域名链接与镜像站比对,然后用%20img%20标签%20src%20空值触发%20onerror%20来执行%20js%20比对,比对失败则跳转回源站。
%20
①、WordPress%20专用版
%20
经过%20@张戈%20童学的不断改进(IE%20不支持%20window.stop()%20函数,所以“20160909%20版本”失效...),已经完美的适配%20Firefox、Chrome、IE11%20和%20360%20极速浏览器,而且可以跳转至源站的相应文章页,在此衷表感谢!下面%203%20段任选一个即可。效果请看这里:http://www.ilxtx.com.3s3s.org/the-shawshank-redemption-1994.html
%20
代码如下:(复制粘贴到主题的%20functions.php%20最后一个?>之前)
%20%20
/** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html *%20最后更新时间:20171022%20%20发布时间:20160912 *%20出自:zhangge.net */ add_action('wp_footer','lxtx_deny_mirrored_websites'); function%20lxtx_deny_mirrored_websites(){ %20%20$currentDomain%20=%20'www"%20+%20".ilxtx."%20+%20"com'; %20%20//%20$currentDomain%20=%20'"zhangge."%20+%20"net"'; %20%20echo%20'<img%20style="display:none"%20src="%20"%20onerror=\'this.onerror=null;var%20str1="'.$currentDomain.'";str2="docu"+"ment.loca"+"tion.host";str3=eval(str2);if(%20str1!=str3%20&&%20str3!="cache.baiducontent.com"%20&&%20str3!="webcache.googleusercontent.com"%20&&%20str3!="c.360webcache.com"%20&&%20str3!="cncc.bingj.com"%20&&%20str3!="snapshot.sogoucdn.com"%20){%20do_action%20=%20"loca"%20+%20"tion."%20+%20"href%20=%20loca"%20+%20"tion.href"%20+%20".rep"%20+%20"lace(docu"%20+"ment"+".loca"+"tion.ho"+"st,"%20+%20"\"'%20.%20$currentDomain%20.'\""%20+%20")";eval(do_action)%20}\'%20/>'; } /** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html *%20最后更新时间:20171022%20%20发布时间:20160912 *%20出自:zhangge.net */ add_action('wp_footer','lxtx_deny_mirrored_websites'); function%20lxtx_deny_mirrored_websites(){ %20%20$currentDomain%20=%20'www"%20+%20".ilxtx."%20+%20"com'; %20%20//%20$currentDomain%20=%20'"zhangge."%20+%20"net"'; %20%20echo%20'<img%20style="display:none"%20src="%20"%20onerror=\'this.onerror=null;var%20str1="'.$currentDomain.'";str2="docu"+"ment.loca"+"tion.host";str3=eval(str2);if(%20str1!=str3%20&&%20str3!="cache.baiducontent.com"%20&&%20str3!="webcache.googleusercontent.com"%20&&%20str3!="c.360webcache.com"%20&&%20str3!="cncc.bingj.com"%20&&%20str3!="snapshot.sogoucdn.com"%20){%20do_action%20=%20"loca"%20+%20"tion."%20+%20"href%20=%20loca"%20+%20"tion.href"%20+%20".rep"%20+%20"lace(docu"%20+"ment"+".loca"+"tion.ho"+"st,"%20+%20"\"'%20.%20$currentDomain%20.'\""%20+%20")";eval(do_action)%20}\'%20/>'; }
%20%20
Ps:如果是丢到%20wp_head,经过测试发现图片放到%20head,浏览器会自动进行错误调整,导致一些本来在%20head%20的元素被丢到了%20body%20当中,比如%20style.css,估计网页标准中%20head%20里面就不应该放置图片,所以移到了%20footer%20当中。
%20%20
/** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html *%20出自:zhangge.net */ add_action('wp_footer','lxtx_deny_mirrored_websites'); function%20lxtx_deny_mirrored_websites(){ %20$currentDomain%20=%20"www'%20+%20'.ilxtx.'%20+%20'com"; %20//%20$currentDomain%20=%20"zhangge'%20+%20'.'%20+%20'net"; %20echo%20'<img%20style="display:none"%20src="nothing"%20onerror="this.onerror=null;var%20str1=\''.$currentDomain.'\';str2=\'docu\'+\'ment.loca\'+\'tion.host\';str3=eval(str2);if(%20str1!=str3%20){%20do_action%20=%20\'loca\'%20+%20\'tion.\'%20+%20\'href%20=%20loca\'%20+%20\'tion.href\'%20+%20\'.rep\'%20+%20\'lace(docu\'%20+\'ment\'+\'.loca\'+\'tion.ho\'+\'st,\'%20+%20\'\\\''%20.%20$currentDomain%20.'\\\'\'%20+%20\')\';eval(do_action)%20}"%20/>'; }
%20%20%20
/** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html *%20zhangge.net修改 */ add_action('wp_footer','lxtx_kimsom_reverse_proxy_defense',%2099); function%20lxtx_kimsom_reverse_proxy_defense(){ %20$currentDomain%20=%20'"www."%20+%20"ilxtx"%20+%20".com"'; %20echo%20'<img%20style="display:none"%20id="inlojv-rpd"%20src="nothing"%20data-url="'.home_url().'"%20onerror=\'this.onerror=null;var%20str0=document.getElementById("inlojv-rpd").attributes.getNamedItem("data-url").nodeValue;var%20ishttps="https:"==document.location.protocol?true:false;if(ishttps){var%20str1="https"+"://";}else{var%20str1="http"+"://";}var%20str2='.$currentDomain.';var%20str3=str1+str2;if(%20str0!=str3%20){location.href%20=%20location.href.replace(document.location.host,'.%20$currentDomain%20.');}\'/>'; }
%20%20
Tips:如果想像“20160909%20版本”一样有个提示语,可将上面这段代码改为此
%20
%20%20
add_action('wp_footer','lxtx_kimsom_reverse_proxy_defense',%2099); function%20lxtx_kimsom_reverse_proxy_defense(){ %20$currentDomain%20=%20'"www."%20+%20"ilxtx"%20+%20".com"'; %20echo%20'<img%20style="display:none"%20id="inlojv-rpd"%20src="nothing"%20data-url="'.home_url().'"%20onerror=\'this.onerror=null;var%20str0=document.getElementById("inlojv-rpd").attributes.getNamedItem("data-url").nodeValue;var%20ishttps="https:"==document.location.protocol?true:false;if(ishttps){var%20str1="https"+"://";}else{var%20str1="http"+"://";}var%20str2='.$currentDomain.';var%20str3=str1+str2;if(%20str0!=str3%20){alert("\u8b66\u544a\uff01\u68c0\u6d4b\u5230\u8be5\u7f51\u7ad9\u4e3a\u6076\u610f\u955c\u50cf\u7ad9\u70b9\uff0c\u5c06\u7acb\u5373\u4e3a\u60a8\u8df3\u8f6c\u5230\u5b98\u65b9\u7ad9\u70b9\uff01");location.href%20=%20location.href.replace(document.location.host,'.%20$currentDomain%20.');}\'/>'; }
%20%20%20
摘自%20@曾劲松博客 /** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html */ add_action('wp_footer','lxtx_kimsom_reverse_proxy_defense'); function%20lxtx_kimsom_reverse_proxy_defense(){ $domain_arr%20=%20explode('//',home_url()); $domain%20=%20$domain_arr[1]; %20echo%20'<img%20style="display:none"%20id="inlojv-rpd"%20src="nothing"%20data-url="'.home_url().'"%20onerror="this.onerror=null;var%20str0=document.getElementById(\'inlojv-rpd\').attributes.getNamedItem(\'data-url\').nodeValue;var%20ishttps=\'https:\'==document.location.protocol?true:false;if(ishttps){var%20str1=\'https\'+\'://\';}else{var%20str1=\'http\'+\'://\';}var%20str2=\''.$domain.'\';var%20str3=str1+str2;if(%20str0!=str3%20){alert(\'\u8b66\u544a\uff01\u68c0\u6d4b\u5230\u8be5\u7f51\u7ad9\u4e3a\u6076\u610f\u955c\u50cf\u7ad9\u70b9\uff0c\u5c06\u7acb\u5373\u4e3a\u60a8\u8df3\u8f6c\u5230\u5b98\u65b9\u7ad9\u70b9\uff01\');if%20(!!(window.attachEvent%20&&%20!window.opera)){document.execCommand(\'stop\');}else{%20window.stop();}var%20str4=\'wind\'+\'ow.loca\'+\'tion.rep\'+\'lace(str3)\';eval(str4);}">'; } /** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html */ add_action('wp_footer','lxtx_kimsom_reverse_proxy_defense'); function%20lxtx_kimsom_reverse_proxy_defense(){ $domain_arr%20=%20explode('//',home_url()); $domain%20=%20$domain_arr[1]; %20echo%20'<img%20style="display:none"%20id="inlojv-rpd"%20src="nothing"%20data-url="'.home_url().'"%20onerror="this.onerror=null;var%20str0=document.getElementById(\'inlojv-rpd\').attributes.getNamedItem(\'data-url\').nodeValue;var%20ishttps=\'https:\'==document.location.protocol?true:false;if(ishttps){var%20str1=\'https\'+\'://\';}else{var%20str1=\'http\'+\'://\';}var%20str2=\''.$domain.'\';var%20str3=str1+str2;if(%20str0!=str3%20){alert(\'\u8b66\u544a\uff01\u68c0\u6d4b\u5230\u8be5\u7f51\u7ad9\u4e3a\u6076\u610f\u955c\u50cf\u7ad9\u70b9\uff0c\u5c06\u7acb\u5373\u4e3a\u60a8\u8df3\u8f6c\u5230\u5b98\u65b9\u7ad9\u70b9\uff01\');if%20(!!(window.attachEvent%20&&%20!window.opera)){document.execCommand(\'stop\');}else{%20window.stop();}var%20str4=\'wind\'+\'ow.loca\'+\'tion.rep\'+\'lace(str3)\';eval(str4);}">'; }
%20%20
添加以上代码之后,再打开镜像站就会弹出提示:“警告!检测到该网站为恶意镜像站点,将立即为您跳转到官方站点!”,并在关闭或确定此提示后直接跳转到被镜像的网站。经过本站测试,本方法防止网站被镜像目前有效。
%20
效果请看这里:
%20
https://www.ilxtx.com.dijicat.com/the-shawshank-redemption-1994.html
%20
%20
%20此方法在%20IE11%20上,会弹出提示框,但点击“确定”按钮后,网页并不会跳转。。。Firefox、Chrome%20和%20360%20极速浏览器上则没此问题!
%20
%20
②、HTML%20通用版
%20
既然是利用%20js%20代码,那么就能用到如何%20html%20页面当中了。要不是为了可以放到%20wp%20的%20functions.php,都没必要写成%20php%20的模式,直接用%20html%20代码即可:
%20%20
<img%20style="display:none"%20src="%20"%20onerror='this.onerror=null;var%20currentDomain="www."%20+%20"ilxtx"%20+%20".com";%20var%20str1=currentDomain;%20str2="docu"+"ment.loca"+"tion.host";%20str3=eval(str2)%20;if(%20str1!=str3%20&&%20str3!="cache.baiducontent.com"%20&&%20str3!="webcache.googleusercontent.com"%20&&%20str3!="c.360webcache.com"%20&&%20str3!="cncc.bingj.com"%20&&%20str3!="snapshot.sogoucdn.com"%20){%20do_action%20=%20"loca"%20+%20"tion."%20+%20"href%20=%20loca"%20+%20"tion.href"%20+%20".rep"%20+%20"lace(docu"%20+"ment"+".loca"+"tion.ho"+"st,"%20+%20"currentDomain"%20+%20")";eval(do_action)%20}'%20/> <img%20style="display:none"%20src="%20"%20onerror='this.onerror=null;var%20currentDomain="www."%20+%20"ilxtx"%20+%20".com";%20var%20str1=currentDomain;%20str2="docu"+"ment.loca"+"tion.host";%20str3=eval(str2)%20;if(%20str1!=str3%20&&%20str3!="cache.baiducontent.com"%20&&%20str3!="webcache.googleusercontent.com"%20&&%20str3!="c.360webcache.com"%20&&%20str3!="cncc.bingj.com"%20&&%20str3!="snapshot.sogoucdn.com"%20){%20do_action%20=%20"loca"%20+%20"tion."%20+%20"href%20=%20loca"%20+%20"tion.href"%20+%20".rep"%20+%20"lace(docu"%20+"ment"+".loca"+"tion.ho"+"st,"%20+%20"currentDomain"%20+%20")";eval(do_action)%20}'%20/>
%20%20
将以上代码中的:%20var%20currentDomain="www."%20+%20"ilxtx"%20+%20".com";%20
自行拆分成自己的域名,避免被镜像代码替换掉,比如:%20var%20currentDomain="zhangge."%20+%20"net";
%20
然后将代码添加到网站的%20<body>%20之后即可(不建议放置到%20<head>%20里面,具体原因上文已说明),这个版本适合任何网页。
%20
方法%205:通过禁止某些%20User%20Agent%20特征来防
%20
%20
%20服务器反爬虫攻略:Apache/Nginx/PHP%20禁止某些%20User%20Agent%20抓取网站
%20我们都知道网络上的爬虫非常多,有对网站收录有益的,比如百度蜘蛛(Baiduspider),也有不但不遵守%20robots%20规则对服务器造成压力,还不能为网站带来流量的无用爬虫,比如%20YY%20蜘蛛(Yis...%20
%20
参考上面这篇文章来禁止%20UA%20为%20PHP%20的抓取网页,从而达到防镜像的目的!
%20
①、PHP%20通用版:
%20
将下面的代码贴到网站入口文件%20index.php%20中的第一个%20<?php之后即可:
%20%20
//防止恶意HTTP_USER_AGENT采集 $ua%20=%20$_SERVER['HTTP_USER_AGENT']; $now_ua%20=%20array('FeedDemon%20','BOT/0.1%20(BOT%20for%20JCE)','CrawlDaddy%20','Java','Feedly','UniversalFeedParser','ApacheBench','Swiftbot','ZmEu','Indy%20Library','oBot','jaunty','YandexBot','AhrefsBot','MJ12bot','WinHttp','EasouSpider','HttpClient','Microsoft%20URL%20Control','YYSpider','jaunty','Python-urllib','lightDeckReports%20Bot','PHP');%20 if(!$ua)%20{ header("Content-type:%20text/html;%20charset=utf-8"); %20%20die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); }else{ %20%20foreach($now_ua%20as%20$value%20) %20%20if(eregi($value,$ua))%20{ %20%20header("Content-type:%20text/html;%20charset=utf-8"); %20%20die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); %20%20} } //防止恶意HTTP_USER_AGENT采集 $ua%20=%20$_SERVER['HTTP_USER_AGENT']; $now_ua%20=%20array('FeedDemon%20','BOT/0.1%20(BOT%20for%20JCE)','CrawlDaddy%20','Java','Feedly','UniversalFeedParser','ApacheBench','Swiftbot','ZmEu','Indy%20Library','oBot','jaunty','YandexBot','AhrefsBot','MJ12bot','WinHttp','EasouSpider','HttpClient','Microsoft%20URL%20Control','YYSpider','jaunty','Python-urllib','lightDeckReports%20Bot','PHP');%20 if(!$ua)%20{ header("Content-type:%20text/html;%20charset=utf-8"); %20%20die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); }else{ %20%20foreach($now_ua%20as%20$value%20) %20%20if(eregi($value,$ua))%20{ %20%20header("Content-type:%20text/html;%20charset=utf-8"); %20%20die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); %20%20} }
%20%20
②、Wordpress%20适用版
%20
如果使用上面的%20php%20版本,WordPress%20每次更新就会需要操作%20index.php,比较麻烦,因此弄个专版。
%20
将下面的代码贴到%20functions.php%20中的最后一个%20?>之前即可:
%20%20
/** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html *%20出自:zhange.net */ //防止恶意HTTP_USER_AGENT采集 add_action('wp_head',%20'lxtx_deny_mirrored_request',%200); function%20lxtx_deny_mirrored_request() { $ua%20=%20$_SERVER['HTTP_USER_AGENT']; $now_ua%20=%20array('FeedDemon%20','BOT/0.1%20(BOT%20for%20JCE)','CrawlDaddy%20','Java','Feedly','UniversalFeedParser','ApacheBench','Swiftbot','ZmEu','Indy%20Library','oBot','jaunty','YandexBot','AhrefsBot','MJ12bot','WinHttp','EasouSpider','HttpClient','Microsoft%20URL%20Control','YYSpider','jaunty','Python-urllib','lightDeckReports%20Bot','PHP');%20 if(!$ua)%20{ header("Content-type:%20text/html;%20charset=utf-8"); wp_die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); }else{ %20%20foreach($now_ua%20as%20$value%20) %20%20if(eregi($value,$ua))%20{ %20%20header("Content-type:%20text/html;%20charset=utf-8"); %20%20wp_die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); %20%20} } } /** *%20网站被恶意镜像怎么办%20一段代码轻松搞定(全面版)%20-%20龙笑天下 *%20https://www.ilxtx.com/mirrored-website.html *%20出自:zhange.net */ //防止恶意HTTP_USER_AGENT采集 add_action('wp_head',%20'lxtx_deny_mirrored_request',%200); function%20lxtx_deny_mirrored_request() { $ua%20=%20$_SERVER['HTTP_USER_AGENT']; $now_ua%20=%20array('FeedDemon%20','BOT/0.1%20(BOT%20for%20JCE)','CrawlDaddy%20','Java','Feedly','UniversalFeedParser','ApacheBench','Swiftbot','ZmEu','Indy%20Library','oBot','jaunty','YandexBot','AhrefsBot','MJ12bot','WinHttp','EasouSpider','HttpClient','Microsoft%20URL%20Control','YYSpider','jaunty','Python-urllib','lightDeckReports%20Bot','PHP');%20 if(!$ua)%20{ header("Content-type:%20text/html;%20charset=utf-8"); wp_die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); }else{ %20%20foreach($now_ua%20as%20$value%20) %20%20if(eregi($value,$ua))%20{ %20%20header("Content-type:%20text/html;%20charset=utf-8"); %20%20wp_die('请勿采集本站,采集者木有小JJ!请正常访问,并认准【龙笑天下网】官方网址!'); %20%20} } }
%20%20
经过测试,在%20functions.php%20中加入此代码后,打开镜像站后显示“Internal%20Server%20Error”,强制刷新后显示我们设置好的提示文字“请勿采集本站,采集者木有小%20JJ!请正常访问,并认准【龙笑天下网】官方网址!”。
%20
本站目前发现的恶意镜像域名
%20
%20
%20dijicat.com
%20lapaleo.com
%20iaroex.com
%20disauvi.com
%203s3s.org
%20ytlqpo.com
%20s3.gvirabi.com
%20hdtmail.com
%20dimyapi.com%20
%20
更多镜像网站等你提供~
%20
在这些域名前面加上你们自己的的域名,看看有没有被恶意镜像。
%20
友情提示:建议方法%202%20和方法%203%20一起使用!方法%204%20包含方法%202%20和方法%203~
%20%20
您可能感兴趣的文章:%20
- %20
- 使用wget递归镜像网站
- 网站被等恶意镜像的解决、反制措施详细教程
- 如何阻止网站被恶意反向代理访问(防网站镜像)
- 线路分流自动智能跳转代码,自动选择最快镜像网站(js)
- 用rsync对网站进行镜像备份步骤
- rsync中文手册之使用rsync实现网站镜像和备份linux
- 一步一步教你网站同步镜像(转载)
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
%20
本文由 华域联盟 原创撰写:华域联盟 » 网站被恶意镜像怎么办 php一段代码轻松搞定(全面版)
转载请保留出处和原文链接:https://www.cnhackhy.com/50860.htm