我们先分析下 https://www.ip138.com/ 这个网站,它可以获取到我们的IP及所在区域:
分析可知,其嵌套一个iframe,将 2020.ip138.com 的内容嵌入。
我们的目的是伪造一个headers,骗过此网站,让其解析伪造的IP。
开始编码
首先我们编写一个正常的爬虫,返回我们当前的IP:
# -*- coding: utf-8 -*-
import scrapy
class Ip138Spider(scrapy.Spider):
name = 'ip138'
allowed_domains = ['ip138.com']
start_urls = ['http://2020.ip138.com']
def parse(self, response):
print("=" * 40)
print(response.css('p::text').extract_first())
print("=" * 40)
在未伪造headers的时候,启动爬虫程序,会正常返回我的ip及所在地区
伪造IP
首先我们创建一个工具类,提供要给方法,用于伪造headers信息:
#! /usr/bin/env python3
# -*- coding:utf-8 -*-
import random
from ip138_fake_headers.settings import USER_AGENT_LIST
class Utils(object):
@staticmethod
def get_header(host, ip=None):
if ip is None:
ip = str(
'%s.%s.%s.%s' % (
random.choice(list(range(255))),
random.choice(list(range(255))),
random.choice(list(range(255))),
random.choice(list(range(255)))
)
)
return {
'Host': host,
'User-Agent': random.choice(USER_AGENT_LIST),
'server-addr': '',
'remote_user': '',
'X-Client-IP': ip,
'X-Remote-IP': ip,
'X-Remote-Addr': ip,
'X-Originating-IP': ip,
'x-forwarded-for': ip,
'Origin': 'http://' + host,
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
"Accept-Language": "zh-CN,zh;q=0.9,en-US;q=0.5,en;q=0.3",
"Accept-Encoding": "gzip, deflate",
"Referer": "http://" + host + "/",
'Content-Length': '0',
"Connection": "keep-alive"
}
这里引入了配置文件,我们需要在settings.py
中配置USER_AGENT_LIST:
USER_AGENT_LIST=[
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/22.0.1207.1 Safari/537.1",
"Mozilla/5.0 (X11; CrOS i686 2268.111.0) AppleWebKit/536.11 (KHTML, like Gecko) Chrome/20.0.1132.57 Safari/536.11",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.6 (KHTML, like Gecko) Chrome/20.0.1092.0 Safari/536.6",
"Mozilla/5.0 (Windows NT 6.2) AppleWebKit/536.6 (KHTML, like Gecko) Chrome/20.0.1090.0 Safari/536.6",
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.1 (KHTML, like Gecko) Chrome/19.77.34.5 Safari/537.1",
"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.9 Safari/536.5",
"Mozilla/5.0 (Windows NT 6.0) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.36 Safari/536.5",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3",
"Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1063.0 Safari/536.3",
"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; SE 2.X MetaSr 1.0; SE 2.X MetaSr 1.0; .NET CLR 2.0.50727; SE 2.X MetaSr 1.0)",
"Mozilla/5.0 (Windows NT 6.2) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1062.0 Safari/536.3",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1062.0 Safari/536.3",
"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; 360SE)",
"Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1061.1 Safari/536.3",
"Mozilla/5.0 (Windows NT 6.1) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1061.1 Safari/536.3",
"Mozilla/5.0 (Windows NT 6.2) AppleWebKit/536.3 (KHTML, like Gecko) Chrome/19.0.1061.0 Safari/536.3",
"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/535.24 (KHTML, like Gecko) Chrome/19.0.1055.1 Safari/535.24",
"Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/535.24 (KHTML, like Gecko) Chrome/19.0.1055.1 Safari/535.24"
]
然后配置中间件:
# -*- coding: utf-8 -*-
from ip138_fake_headers.libs.utils import Utils
from scrapy.http.headers import Headers
class Ip138FakeHeadersDownloaderMiddleware(object):
def process_request(self, request, spider):
request.headers = Headers(Utils.get_header('2020.ip138.com'))
在配置文件中启用中间件:
ROBOTSTXT_OBEY = False
DOWNLOADER_MIDDLEWARES = {
'ip138_fake_headers.middlewares.Ip138FakeHeadersDownloaderMiddleware': 1,
}
启动爬虫程序,可以看到,伪造IP成功: