The shelling technology commonly used in clients should be able to do this.
Find a packet capture tool, find the request, and then simulate the request header and device information, and you should be able to capture it. I don’t know if big companies like NetEase have implemented additional anti-crawling strategies.
If the volume is large, you can find another agent and use more IPs to crawl.
I happen to be working on crawlers recently. There are many free IP proxies on the Internet. You can search the official website of Speedy IP. I feel that this free IP is more popular.