[Battle Flash Report!] Good morning, good afternoon, and good evening, everyone. Since the day before yesterday, we’ve been under sustained malicious attacks from multiple scripts. This morning hit a small peak—over 200k malicious requests in just a few hours, burning through nearly 10 GB of traffic. The following IP ranges have now been blacklisted:
182.34.4.0/24
180.119.118.0/23
140.75.192.0/24
121.233.200.0/24
61.147.92.0/24
120.238.245.0/24
58.222.45.0/24
218.90.199.0/24
Since these requests basically burn about 100 MB every five minutes, they didn’t trigger the CDN’s 5-minute 200 MB cap. Coupled with the fact that I was sound asleep on a weekend morning, more than half of this month’s free CDN quota has already been consumed.
If the attacks continue and the free quota is exhausted, all mainland traffic will be routed to the overseas line for a while. Expect much longer load times, possible inaccessibility in some regions, and other issues—your understanding is appreciated.
Finally, dear script masters, please show mercy.

There’s nothing left to squeeze
Follow-up
Since the malicious attacks are still sporadically continuing, I’ve now written and enabled an automatic script to detect and update the CDN blacklist on the fly. This time I should finally get a good night’s sleep.



