@
Totato5749 非常感谢这位同学的办法,我照着你的办法也试了一下,乍一看以为是 tampermonkey,但是仔细看看,
t=5572 [st= 11] CHROME_EXTENSION_REDIRECTED_REQUEST
--> extension_id = "abidndjnodakeaicodfpgcnlkpppapah"
按这个 id 去自己扩展里面找了一下,结果是 Allow Copy,然后去 chrome 扩展商店看了一下,同样也是早就下架了的,符合你说的下架了的比较可疑的猜测
下面是完整日志
75104: URL_REQUEST
https://www.jd.com/Start Time: 2018-11-22 10:05:45.623
t=5561 [st= 0] +REQUEST_ALIVE [dt=989]
--> priority = "HIGHEST"
--> url = "
https://www.jd.com/"
t=5562 [st= 1] +NETWORK_DELEGATE_BEFORE_URL_REQUEST [dt=10]
t=5562 [st= 1] DELEGATE_INFO [dt=3]
--> delegate_blocked_by = "扩展程序“ Tampermonkey ”"
t=5565 [st= 4] DELEGATE_INFO [dt=1]
--> delegate_blocked_by = "扩展程序“ Tampermonkey ”"
t=5566 [st= 5] DELEGATE_INFO [dt=6]
--> delegate_blocked_by = "扩展程序“ Tampermonkey ”"
t=5572 [st= 11] CHROME_EXTENSION_REDIRECTED_REQUEST
--> extension_id = "abidndjnodakeaicodfpgcnlkpppapah"
t=5572 [st= 11] -NETWORK_DELEGATE_BEFORE_URL_REQUEST
t=5572 [st= 11] +URL_REQUEST_START_JOB [dt=2]
--> load_flags = 18432 (MAIN_FRAME_DEPRECATED | MAYBE_USER_GESTURE)
--> method = "GET"
--> url = "
https://www.jd.com/"
t=5572 [st= 11] URL_REQUEST_REDIRECT_JOB
--> reason = "Delegate"
t=5572 [st= 11] URL_REQUEST_FAKE_RESPONSE_HEADERS_CREATED
--> HTTP/1.1 307 Internal Redirect
Location:
http://rtbs24.com/?target=https%3A%2F%2Fytthn.com%2Fclick-IQL4686A-HFDQCIIE%3Fbt%3D25%26tl%3D1__%26url%3Dhttps%3A%2F%2Fwww.jd.com%2F Non-Authoritative-Reason: Delegate
t=5572 [st= 11] +URL_REQUEST_DELEGATE_RECEIVED_REDIRECT [dt=1]
t=5573 [st= 12] DELEGATE_INFO [dt=0]
--> delegate_blocked_by = "MojoAsyncResourceHandler"
t=5573 [st= 12] -URL_REQUEST_DELEGATE_RECEIVED_REDIRECT
t=5574 [st= 13] URL_REQUEST_REDIRECTED
--> location = "
http://rtbs24.com/?target=https%3A%2F%2Fytthn.com%2Fclick-IQL4686A-HFDQCIIE%3Fbt%3D25%26tl%3D1__%26url%3Dhttps%3A%2F%2Fwww.jd.com%2F"
t=5574 [st= 13] -URL_REQUEST_START_JOB
t=5574 [st= 13] +NETWORK_DELEGATE_BEFORE_URL_REQUEST [dt=3]
t=5574 [st= 13] DELEGATE_INFO [dt=1]
--> delegate_blocked_by = "扩展程序“ Tampermonkey ”"
t=5575 [st= 14] DELEGATE_INFO [dt=0]
--> delegate_blocked_by = "扩展程序“ Tampermonkey ”"
t=5575 [st= 14] DELEGATE_INFO [dt=2]
--> delegate_blocked_by = "扩展程序“ Allow Copy ”"
t=5577 [st= 16] -NETWORK_DELEGATE_BEFORE_URL_REQUEST
t=5577 [st= 16] +URL_REQUEST_START_JOB [dt=960]
--> load_flags = 18432 (MAIN_FRAME_DEPRECATED | MAYBE_USER_GESTURE)
--> method = "GET"
--> url = "
http://rtbs24.com/?target=https%3A%2F%2Fytthn.com%2Fclick-IQL4686A-HFDQCIIE%3Fbt%3D25%26tl%3D1__%26url%3Dhttps%3A%2F%2Fwww.jd.com%2F"
t=5577 [st= 16] NETWORK_DELEGATE_BEFORE_START_TRANSACTION [dt=0]
t=5577 [st= 16] HTTP_CACHE_GET_BACKEND [dt=0]
t=5577 [st= 16] HTTP_CACHE_OPEN_ENTRY [dt=0]
--> net_error = -2 (ERR_FAILED)
t=5577 [st= 16] HTTP_CACHE_CREATE_ENTRY [dt=0]
t=5577 [st= 16] HTTP_CACHE_ADD_TO_ENTRY [dt=0]
t=5577 [st= 16] +HTTP_STREAM_REQUEST [dt=2]
t=5577 [st= 16] HTTP_STREAM_JOB_CONTROLLER_BOUND
--> source_dependency = 75107 (HTTP_STREAM_JOB_CONTROLLER)
t=5579 [st= 18] HTTP_STREAM_REQUEST_BOUND_TO_JOB
--> source_dependency = 75108 (HTTP_STREAM_JOB)
t=5579 [st= 18] -HTTP_STREAM_REQUEST
t=5580 [st= 19] +HTTP_TRANSACTION_SEND_REQUEST [dt=0]
t=5580 [st= 19] HTTP_TRANSACTION_SEND_REQUEST_HEADERS
--> GET
http://rtbs24.com/?target=https%3A%2F%2Fytthn.com%2Fclick-IQL4686A-HFDQCIIE%3Fbt%3D25%26tl%3D1__%26url%3Dhttps%3A%2F%2Fwww.jd.com%2F HTTP/1.1
Host:
rtbs24.com Proxy-Connection: keep-alive
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,zh-TW;q=0.7
t=5580 [st= 19] -HTTP_TRANSACTION_SEND_REQUEST
t=5580 [st= 19] +HTTP_TRANSACTION_READ_HEADERS [dt=954]
t=5580 [st= 19] HTTP_STREAM_PARSER_READ_HEADERS [dt=953]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6533 [st=972] HTTP_STREAM_PARSER_READ_HEADERS [dt=1]
t=6534 [st=973] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6534 [st=973] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6534 [st=973] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6534 [st=973] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6534 [st=973] HTTP_STREAM_PARSER_READ_HEADERS [dt=0]
t=6534 [st=973] HTTP_TRANSACTION_READ_RESPONSE_HEADERS
--> HTTP/1.1 200 OK
Transfer-Encoding: chunked
Content-Encoding: gzip
Content-Type: text/html
Date: Wed, 21 Nov 2018 02:05:53 GMT
Keep-Alive: timeout=38
Server: nginx
Vary: Accept-Encoding
X-Powered-By: PHP/5.6.37
t=6534 [st=973] -HTTP_TRANSACTION_READ_HEADERS
t=6534 [st=973] HTTP_CACHE_WRITE_INFO [dt=0]
t=6534 [st=973] HTTP_CACHE_WRITE_DATA [dt=0]
t=6534 [st=973] HTTP_CACHE_WRITE_INFO [dt=0]
t=6534 [st=973] +NETWORK_DELEGATE_HEADERS_RECEIVED [dt=3]
t=6534 [st=973] DELEGATE_INFO [dt=2]
--> delegate_blocked_by = "扩展程序“ Tampermonkey ”"
t=6536 [st=975] DELEGATE_INFO [dt=1]
--> delegate_blocked_by = "扩展程序“ AdBlock ”"
t=6537 [st=976] -NETWORK_DELEGATE_HEADERS_RECEIVED
t=6537 [st=976] URL_REQUEST_FILTERS_SET
--> filters = "GZIP"
t=6537 [st=976] -URL_REQUEST_START_JOB
t=6537 [st=976] +URL_REQUEST_DELEGATE_RESPONSE_STARTED [dt=11]
t=6537 [st=976] DELEGATE_INFO [dt=11]
--> delegate_blocked_by = "MojoAsyncResourceHandler"
t=6548 [st=987] -URL_REQUEST_DELEGATE_RESPONSE_STARTED
t=6548 [st=987] HTTP_TRANSACTION_READ_BODY [dt=0]
t=6549 [st=988] URL_REQUEST_JOB_BYTES_READ
--> byte_count = 216
t=6549 [st=988] URL_REQUEST_JOB_FILTERED_BYTES_READ
--> byte_count = 509
t=6549 [st=988] HTTP_TRANSACTION_READ_BODY [dt=0]
t=6550 [st=989] -REQUEST_ALIVE