|
|
Posted on 11/2/2014 5:26:49 PM
|
|
|
|

Today, when I occasionally visit the Taobao homepage, I find that the homepage jumps to a certain merchant's store, and I don't know why.
By checking the source code of the web page, it was found that the iframe frame was embedded in the Taobao page, who did it?
It turned out that the culprit was the local broadband operator! I am Shenyang Unicom, the embedded advertising code, there is an IP URL, the IP segment is: 218.25.246.118 After querying, it is Liaoyang Unicom.
A simple search for this IP on the Internet has actually been announced a long time ago, as I guess, it is hijacked by the operator:
www1.js.vnet.cn Jiangxi Telecom hijacking notice.gwbnsh.net.cn Great Wall Broadband hijacking search.114.vnet.cn Search hijacking tencentunion.com AP Broadband hijacking 1.1.1.1 Fujian Telecom hijacking 221.204.249.107 Shanxi Unicom hijacking jxad.jx163.com Jiangxi hotline hijacking 221.231.148.253 Nanjing Telecom hijacking 119.84.84.56:8083 Chongqing Telecom hijacked welcome1.zj.vnet.cn Zhejiang Telecom hijacked ty.sx.cn Datong Unicom hijacked 61.131.89.155 Fuzhou Telecom hijacked 61.132.216.226 Hefei Telecom hijacked 61.132.255.222:8005 Hefei Telecom hijacked 58.17.163.138 Chongqing Unicom hijacked 219.153.29.245:8001 Chongqing Telecom hijacked 221.231.142.110:9003 Nanjing Telecom hijacked 220.249.160.187 Fuzhou Unicom hijacked jlonline.com Nanjing Telecom hijacked 58.17.163.134 Chongqing Unicom hijacked 125.39.80.116 Tianjin Unicom hijacked 114search.118114.cn Search hijacked bobopinso.com Harbin Unicom hijacked 61.132.255.232 Hefei Telecom hijacked 218.25.246.120Liaoyang Unicom hijacked 218.25.246.118Liaoyang Unicom hijacked 202.109.129.37 Nanchang Telecom hijacked 218.25.246.117 Liaoyang Unicom hijacked ntonline.cn Nantong Telecom hijacked 172.18.0.133 AP Broadband hijacked 61.132.255.212 Hefei Telecom hijacked
(The above list of operators who do evil comes from the Internet)
What's even more amazing is that I found a key URL (note the domain name)
http://b.17pps.com/taobao/260/lntb?u=http%3A%2F%2F218.25.246.118%2Fa%2Funpush%3Fadid%3D200495%26tcca%3DS0QwMTAwNzEyNjQw%26urip%3D1007707751%26area%3D146&c=http%3A%2F%2F218.25.246.118%2Fa%2Fadclick%3Fspid%3D2244908043%26adid%3D200495%26tcca%3DS0QwMTAwNzEyNjQw%26urip%3D1007707751
This station: 17pps.com have been doing evil for a long time. Operators use this as the core jump code of advertising, it seems too conspicuous, it's really brain-dead. You really make a lot of money by engaging in domain name hijacking.
In the past, this Shenyang Unicom had embedded, and at that time it was to display a small AD window in the lower right corner, but now it is even more presumptuous!
|
Previous:QQ acceleration up to 7.2 days methodNext:A penny to open a QQ green diamond, and Xiao Ma Ge is here to pit money again
|