จะ block bot baidu ให้อยู่หมดทำอย่างไรดีครับ

ขนาดกำหนดให้ block ยก class แล้วก็ยังไม่ได้

iptables -A INPUT -s 180.76.5.0/24 -j DROP
iptables -A INPUT -s 180.76.4.0/24 -j DROP

[root@ns15 domains]# tail -f xxxx.com.log |grep baidu
180.76.6.37 - - [21/Oct/2013:11:18:35 +0700] “GET /club_distributor.php?sa=U&ei=Na2zUJyyNeKriAemgIGAAw&ved=0CFEQFjAR&usg=AFQjCNFtA4SPmB2iXgcO-anMMH1DpvWUlQ&keyword=&page=56 HTTP/1.1” 200 12457 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
180.76.5.171 - - [21/Oct/2013:11:18:53 +0700] “GET /club_distributor.php?sa=U&ei=Qwy8UKKiIobPrQfc_YCQAg&ved=0CLkBEBYwLA&usg=AFQjCNEXFR9J6jCS6pqywHGj1xR3Z8lYOg&keyword=&page=41 HTTP/1.1” 200 12262 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
180.76.5.177 - - [21/Oct/2013:11:19:13 +0700] “GET /club_distributor.php?sa=U&ei=Qwy8UKKiIobPrQfc_YCQAg&ved=0CLkBEBYwLA&usg=AFQjCNEXFR9J6jCS6pqywHGj1xR3Z8lYOg&keyword=&page=21 HTTP/1.1” 200 12293 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
180.76.5.60 - - [21/Oct/2013:11:19:31 +0700] “GET /club_distributor.php?sa=U&ei=Qwy8UKKiIobPrQfc_YCQAg&ved=0CLkBEBYwLA&usg=AFQjCNEXFR9J6jCS6pqywHGj1xR3Z8lYOg&keyword=&page=22 HTTP/1.1” 200 12475 “-” “Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)”

block 180.76.0.0/16 ไปเลยครับ จบ

iptables -A INPUT -s 180.76.0.0/16 -j DROP

[root@ns15 ~]# service iptables status |grep 180.76
36 DROP all – 180.76.4.0/24 0.0.0.0/0
37 DROP all – 180.76.5.0/24 0.0.0.0/0
38 DROP all – 180.76.0.0/16 0.0.0.0/0

ลองแล้วนะครับ ยังเข้ามาได้เลย

ping ไปไม่ได้แล้ว แต่ยังมี bot เข้ามาอยู่

ขอ service iptables status เต็มๆ ครับ

Table: mangle
Chain PREROUTING (policy ACCEPT)
num target prot opt source destination

Chain INPUT (policy ACCEPT)
num target prot opt source destination

Chain FORWARD (policy ACCEPT)
num target prot opt source destination

Chain OUTPUT (policy ACCEPT)
num target prot opt source destination

Chain POSTROUTING (policy ACCEPT)
num target prot opt source destination

Table: nat
Chain PREROUTING (policy ACCEPT)
num target prot opt source destination

Chain POSTROUTING (policy ACCEPT)
num target prot opt source destination

Chain OUTPUT (policy ACCEPT)
num target prot opt source destination

Table: filter
Chain INPUT (policy DROP)
num target prot opt source destination
1 ACCEPT tcp – 202.57.160.129 0.0.0.0/0 tcp dpt:53
2 ACCEPT udp – 202.57.160.129 0.0.0.0/0 udp dpt:53
3 ACCEPT tcp – 202.57.160.129 0.0.0.0/0 tcp spt:53
4 ACCEPT udp – 202.57.160.129 0.0.0.0/0 udp spt:53
5 LOCALINPUT all – 0.0.0.0/0 0.0.0.0/0
6 ACCEPT all – 0.0.0.0/0 0.0.0.0/0
7 INVALID tcp – 0.0.0.0/0 0.0.0.0/0
8 ACCEPT all – 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
9 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:20
10 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21
11 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
12 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25
13 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:43
14 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53
15 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
16 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:110
17 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:143
18 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443
19 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:465
20 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:587
21 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:993
22 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:995
23 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2222
24 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:1022
25 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:3306
26 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:20001
27 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:20
28 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:21
29 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53
30 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:20001
31 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 8 limit: avg 1/sec burst 5
32 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 0 limit: avg 1/sec burst 5
33 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 11
34 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 3
35 LOGDROPIN all – 0.0.0.0/0 0.0.0.0/0
36 DROP all – 180.76.4.0/24 0.0.0.0/0
37 DROP all – 180.76.5.0/24 0.0.0.0/0
38 DROP all – 180.76.0.0/16 0.0.0.0/0

Chain FORWARD (policy DROP)
num target prot opt source destination
1 DROP tcp – 0.0.0.0/0 202.142.223.165 tcp dpt:80 STRING match “baidu” ALGO name bm TO 65535

Chain OUTPUT (policy DROP)
num target prot opt source destination
1 ACCEPT tcp – 0.0.0.0/0 202.57.160.129 tcp dpt:53
2 ACCEPT udp – 0.0.0.0/0 202.57.160.129 udp dpt:53
3 ACCEPT tcp – 0.0.0.0/0 202.57.160.129 tcp spt:53
4 ACCEPT udp – 0.0.0.0/0 202.57.160.129 udp spt:53
5 LOCALOUTPUT all – 0.0.0.0/0 0.0.0.0/0
6 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:53
7 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:53
8 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 tcp spt:53
9 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 udp spt:53
10 ACCEPT all – 0.0.0.0/0 0.0.0.0/0
11 INVALID tcp – 0.0.0.0/0 0.0.0.0/0
12 ACCEPT all – 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
13 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:20
14 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21
15 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
16 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25
17 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:43
18 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53
19 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
20 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:110
21 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:113
22 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443
23 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2222
24 ACCEPT tcp – 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:20001
25 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:20
26 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:21
27 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53
28 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:113
29 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:123
30 ACCEPT udp – 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:20001
31 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 0
32 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 8
33 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 11
34 ACCEPT icmp – 0.0.0.0/0 0.0.0.0/0 icmp type 3
35 LOGDROPOUT all – 0.0.0.0/0 0.0.0.0/0

Chain ALLOWIN (1 references)
num target prot opt source destination
1 ACCEPT all – 202.142.223.164 0.0.0.0/0
2 ACCEPT all – 202.176.91.230 0.0.0.0/0
3 ACCEPT all – 58.64.81.153 0.0.0.0/0

Chain ALLOWOUT (1 references)
num target prot opt source destination
1 ACCEPT all – 0.0.0.0/0 202.142.223.164
2 ACCEPT all – 0.0.0.0/0 202.176.91.230
3 ACCEPT all – 0.0.0.0/0 58.64.81.153

Chain DENYIN (1 references)
num target prot opt source destination
1 DROP all – 218.203.55.49 0.0.0.0/0
2 DROP all – 202.142.223.229 0.0.0.0/0
3 DROP all – 199.114.242.70 0.0.0.0/0
4 DROP all – 202.97.223.8 0.0.0.0/0
5 DROP all – 188.254.39.227 0.0.0.0/0
6 DROP all – 112.165.123.155 0.0.0.0/0
7 DROP all – 210.51.54.132 0.0.0.0/0
8 DROP all – 115.249.63.58 0.0.0.0/0

Chain DENYOUT (1 references)
num target prot opt source destination
1 DROP all – 0.0.0.0/0 218.203.55.49
2 DROP all – 0.0.0.0/0 202.142.223.229
3 DROP all – 0.0.0.0/0 199.114.242.70
4 DROP all – 0.0.0.0/0 202.97.223.8
5 DROP all – 0.0.0.0/0 188.254.39.227
6 DROP all – 0.0.0.0/0 112.165.123.155
7 DROP all – 0.0.0.0/0 210.51.54.132
8 DROP all – 0.0.0.0/0 115.249.63.58
9 DROP all – 0.0.0.0/0 211.91.223.15
10 DROP all – 0.0.0.0/0 162.218.115.174
11 DROP all – 0.0.0.0/0 117.41.187.220

Chain INVALID (2 references)
num target prot opt source destination
1 INVDROP all – 0.0.0.0/0 0.0.0.0/0 state INVALID
2 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x00
3 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x3F/0x3F
4 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x03/0x03
5 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x06
6 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x05/0x05
7 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x11/0x01
8 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x18/0x08
9 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x30/0x20
10 INVDROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:!0x17/0x02 state NEW

Chain INVDROP (10 references)
num target prot opt source destination
1 DROP all – 0.0.0.0/0 0.0.0.0/0

Chain LOCALINPUT (1 references)
num target prot opt source destination
1 ALLOWIN all – 0.0.0.0/0 0.0.0.0/0
2 DENYIN all – 0.0.0.0/0 0.0.0.0/0

Chain LOCALOUTPUT (1 references)
num target prot opt source destination
1 DROP all – 0.0.0.0/0 0.0.0.0/0

Chain LOCALINPUT (1 references)
num target prot opt source destination
1 ALLOWIN all – 0.0.0.0/0 0.0.0.0/0
2 DENYIN all – 0.0.0.0/0 0.0.0.0/0

Chain LOCALOUTPUT (1 references)
num target prot opt source destination
1 ALLOWOUT all – 0.0.0.0/0 0.0.0.0/0
2 DENYOUT all – 0.0.0.0/0 0.0.0.0/0

Chain LOGDROPIN (1 references)
num target prot opt source destination
1 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:67
2 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:67
3 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:68
4 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:68
5 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:111
6 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:111
7 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:113
8 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:113
9 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpts:135:139
10 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpts:135:139
11 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
12 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:445
13 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:500
14 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:500
15 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:513
16 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:513
17 DROP tcp – 0.0.0.0/0 0.0.0.0/0 tcp dpt:520
18 DROP udp – 0.0.0.0/0 0.0.0.0/0 udp dpt:520
19 LOG tcp – 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix Firewall: *TCP_IN Blocked* ' 20 LOG udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefixFirewall: UDP_IN Blocked '
21 LOG icmp – 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 0 level 4 prefix `Firewall: ICMP_IN Blocked '
22 DROP all – 0.0.0.0/0 0.0.0.0/0

Chain LOGDROPOUT (1 references)
num target prot opt source destination
1 LOG tcp – 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix Firewall: *TCP_OUT Blocked* ' 2 LOG udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefixFirewall: UDP_OUT Blocked '
3 LOG icmp – 0.0.0.0/0 0.0.0.0/0 limit: avg 30/min burst 5 LOG flags 8 level 4 prefix `Firewall: ICMP_OUT Blocked

[COLOR=#333333]36 DROP all – 180.76.4.0/24 0.0.0.0/0 [/COLOR]
[COLOR=#333333]37 DROP all – 180.76.5.0/24 0.0.0.0/0 [/COLOR]
[COLOR=#333333]38 DROP all – 180.76.0.0/16 0.0.0.0/0

เอาไปอยู่บรรทัดบนสุดครับ

จะ Blcok อะไร มันทำเรียงลำดับ ดังนั้นให้อยู่บนสุด
[/COLOR]

ผมลองลบออกก็ยังไม่ได้เลยนะครับ

[root@ns15 ~]# service iptables status |grep 180.76
36 DROP all – 180.76.0.0/16 0.0.0.0/0

อันนี้คือหลังลบก็ยังเข้ามานะครับ

180.76.5.159 - - [21/Oct/2013:12:44:53 +0700] “GET /%E0%B8%A7%E0%B8%B5%E0%B8%94%E0%B8%B5%E0%B9%20%E0%B8%AD/tag/Mitsubishi%20I-MiEV HTTP/1.1” 404 3907 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
180.76.5.197 - - [21/Oct/2013:12:45:08 +0700] “GET /%E0%B8%AD%E0%B8%B1%E0%B8%A5%E0%B8%20%E0%B8%B1%E0%B9%20%E0%B8%A1%E0%B8%A3%E0%B8%B9%E0%B8%20/tag/EV HTTP/1.1” 404 3907 “-” “Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)”

ก็คุณ accept port 80 ด้านบนแล้ว ด้านล่างมันก็ไม่ทำงานสิครับ

รบกวนหน่อยนะครับ เราจะย้ายคำสั่งขึ้นไปด้านบนยังไงเหรอครับ :875328cc:

iptables -I INPUT -s 180.76.0.0/16 -j DROP

ได้ละครับ ขอบคุณมากครับ :875328cc:

เจอเปลี่ยน ip ยกวงด้วย baidu ไม่ธรรมดาจริงๆครับ :9bbc76d5:

180.76.5.21 - - [21/Oct/2013:13:43:16 +0700] “GET /club_auto.php?tag=%20%D1%BA%20%20%20%E1%BE%A1%20%20%20age=3&page=12 HTTP/1.1” 200 13049 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
180.76.5.101 - - [21/Oct/2013:13:43:35 +0700] “GET /club_auto.php?tag=%20%D1%B9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20page=19&page=1 HTTP/1.1” 200 12566 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
180.76.5.191 - - [21/Oct/2013:13:43:57 +0700] “GET /club_auto.php?tag=%20%D1%B9%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20page=25&page=28 HTTP/1.1” 200 12401 “-” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
119.63.196.31 - - [21/Oct/2013:13:53:41 +0700] “GET /img_auto/mitsubishi_mirage_-_07.jpg HTTP/1.1” 200 144940 “-” "Baiduspider-image+(+http://www.baidu.com/search/spider.htm)"
119.63.196.93 - - [21/Oct/2013:13:55:33 +0700] “GET /img_process.php?func=crop&w=150&h=112&img=img_auto/toyota_venza_2014.jpg HTTP/1.1” 200 8711 “-” "Baiduspider-image+(+http://www.baidu.com/search/spider.htm)"
119.63.196.123 - - [21/Oct/2013:14:35:46 +0700] “GET /img_process.php?func=crop&w=150&h=112&img=img_auto/nissan_x-trail_2013.jpg HTTP/1.1” 200 10195 “-” "Baiduspider-image+(+http://www.baidu.com/search/spider.htm)"
119.63.196.95 - - [21/Oct/2013:15:05:24 +0700] “GET /images/menutop_09.gif HTTP/1.1” 200 788 “-” "Baiduspider-image+(+http://www.baidu.com/search/spider.htm)"
119.63.196.58 - - [21/Oct/2013:15:19:49 +0700] “GET /images/menutop_07.gif HTTP/1.1” 200 694 “-” "Baiduspider-image+(+http://www.baidu.com/search/spider.htm)"
119.63.196.95 - - [21/Oct/2013:15:25:46 +0700] “GET /img_cms/image/Mitsubishi%20Mirage%20-%2009.jpg HTTP/1.1” 200 78878 “-” "Baiduspider-image+(+http://www.baidu.com/search/spider.htm)"
183.60.244.24 - - [21/Oct/2013:15:36:50 +0700] “GET / HTTP/1.1” 301 524 “http://www.baidu.com/search/spider.htm” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
183.60.244.24 - - [21/Oct/2013:15:36:51 +0700] “GET / HTTP/1.1” 200 10160 “http://www.baidu.com/search/spider.htm” "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"
119.63.196.124 - - [21/Oct/2013:15:47:52 +0700] “GET /img_cms/image/2013%20Ford%20Ranger%20-%2006.jpg HTTP/1.1” 200 65975 “-” “Baiduspider-image+(+http://www.baidu.com/search/spider.htm)”

มาเยอะเอา htaccess ดักไว้ก่อนครับ อีกชั้นครับ

RewriteEngine On
RewriteCond %{HTTP_USER_AGENT} ^Baiduspider [NC]
RewriteRule .* - [F]

มันมีหลายเว็บนะสิครับ และเป็นเว็บลูกค้าด้วย ไม่อยากไปยุ่ง .htaccess ของเค้า

จัดไปครับ

iptables -I INPUT -p tcp --dport 80 -m string --string ‘[COLOR=#333333][FONT=Verdana]baidu[/FONT][/COLOR]’ --algo bm -j DROP

ผมใช้คำสั่งนี้มานานแล้ว Block ได้ดีมาก แต่ไม่แน่ใจว่าจะใช้ได้ ทุก OS หรือเปล่า ลองดูละกันครับ

ลองบล๊อคไอพีเพิ่มครับ

123.125.0.0/16
202.108.0.0/16
119.63.0.0/16

203.125.234.0/24
220.181.7.0/24
123.125.71.0/24
180.76.5.0/24
61.135.146.0/24

มัน ดุ สมชื่อจริงๆ

ผมลง CSF แล้วบล๊อกจีนทั้งประเทศเลย Baidu หายไป 99% แหนะครับหุหุ แต่ว่า มันรอดมาอยู่ส่วนนึงคือ Server US ของ Baidu