This is indeed a bit perverted, but you can simulate mobile phone access (change user agent). You can get comment data, which is static html. http://m.ctrip.com/html5/hotel/HotelDetail/dianping/1943326.html Look at the request carefully, there is a compressed js that is calculating parameters, it gives me a headache.
It looks like it may be base64 encoded or encrypted. Related to other parameters, it is suspected that it is a signature parameter to prevent grabbing.
This is indeed a bit perverted, but you can simulate mobile phone access (change user agent). You can get comment data, which is static html.

http://m.ctrip.com/html5/hotel/HotelDetail/dianping/1943326.html
Look at the request carefully, there is a compressed js that is calculating parameters, it gives me a headache.
Don’t worry about how it is generated, be more violent, bring all the headers, and all the parameters are the same, it must be OK
It looks like it may be base64 encoded or encrypted. Related to other parameters, it is suspected that it is a signature parameter to prevent grabbing.
is generated by the following code, which I can’t understand:
,_getElevenValue:function(e){
}