🔥 IPS 威脅報告與惡意 IP 監控

本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL InjectionXSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。

最後更新:2026-04-23 14:53:21   📥 下載完整報告

時間攻擊名稱來源 IP (下載威脅IP清單)動作
-HTTP.URI.SQL.Injection95.179.167.233dropped
-PHP.CGI.Argument.Injection34.19.116.61dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload45.156.128.102dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal45.156.128.104dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal45.156.128.104dropped
-Mirai.Botnet91.224.92.177dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal178.104.245.171dropped
-Malicious.HTTP.URI.Requests185.177.72.66dropped
-Malicious.HTTP.URI.Requests185.177.72.66dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal115.191.32.57dropped
-Mirai.Botnet8.141.19.33dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal87.106.91.226dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow44.196.118.6dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution36.70.69.81dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection178.81.200.82dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow44.213.202.136dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow34.227.156.153dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow18.213.240.226dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow34.203.111.15dropped
-Mirai.Botnet192.109.200.204dropped
-HTTP.URI.SQL.Injection18.88.32.116dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow107.22.208.39dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal83.168.89.181dropped
-Mirai.Botnet91.224.92.177dropped
-Web.Server.Password.File.Access37.60.247.234dropped
-Cross.Site.Scripting37.60.247.234detected
-WordPress.REST.API.Username.Enumeration.Information.Disclosure103.79.178.1dropped
-WordPress.REST.API.Username.Enumeration.Information.Disclosure103.79.178.1dropped
-Mirai.Botnet47.238.236.74dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution192.252.178.239dropped
-AndroxGh0st.Malware20.172.36.113dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-PHP.CGI.Argument.Injection34.19.116.58dropped
-PHP.CGI.Argument.Injection34.19.116.55dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal34.19.116.50dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution34.19.116.56dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal34.19.116.50dropped
-SystemBC.Botnet68.69.177.112dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow107.20.181.148dropped
-Oracle.Java.Applet.CMM.Code.Execution18.232.36.1dropped
-Web.Server.Password.File.Access80.94.95.169dropped
-Cross.Site.Scripting144.31.151.136detected
-Web.Server.Password.File.Access144.31.151.136dropped
-Mirai.Botnet91.224.92.177dropped
-WordPress.WooCommerce.Authentication.Bypass139.59.220.152dropped
-WordPress.WooCommerce.Authentication.Bypass139.59.220.152dropped
IPS 網路威脅即時報告與惡意 IP 監控 - 2ns.org

🔥 IPS 威脅報告與惡意 IP 監控

本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL InjectionXSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。

最後更新:2026-04-23 14:53:21   📥 下載完整報告

時間攻擊名稱來源 IP (下載威脅IP清單)動作
-HTTP.URI.SQL.Injection95.179.167.233dropped
-PHP.CGI.Argument.Injection34.19.116.61dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload45.156.128.102dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal45.156.128.104dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal45.156.128.104dropped
-Mirai.Botnet91.224.92.177dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal178.104.245.171dropped
-Malicious.HTTP.URI.Requests185.177.72.66dropped
-Malicious.HTTP.URI.Requests185.177.72.66dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal115.191.32.57dropped
-Mirai.Botnet8.141.19.33dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal87.106.91.226dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow44.196.118.6dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution36.70.69.81dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection178.81.200.82dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow44.213.202.136dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow34.227.156.153dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow18.213.240.226dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow34.203.111.15dropped
-Mirai.Botnet192.109.200.204dropped
-HTTP.URI.SQL.Injection18.88.32.116dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow107.22.208.39dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal83.168.89.181dropped
-Mirai.Botnet91.224.92.177dropped
-Web.Server.Password.File.Access37.60.247.234dropped
-Cross.Site.Scripting37.60.247.234detected
-WordPress.REST.API.Username.Enumeration.Information.Disclosure103.79.178.1dropped
-WordPress.REST.API.Username.Enumeration.Information.Disclosure103.79.178.1dropped
-Mirai.Botnet47.238.236.74dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution192.252.178.239dropped
-AndroxGh0st.Malware20.172.36.113dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution45.207.163.41dropped
-PHP.CGI.Argument.Injection34.19.116.58dropped
-PHP.CGI.Argument.Injection34.19.116.55dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal34.19.116.50dropped
-ThinkPHP.Controller.Parameter.Remote.Code.Execution34.19.116.56dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal34.19.116.50dropped
-SystemBC.Botnet68.69.177.112dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow107.20.181.148dropped
-Oracle.Java.Applet.CMM.Code.Execution18.232.36.1dropped
-Web.Server.Password.File.Access80.94.95.169dropped
-Cross.Site.Scripting144.31.151.136detected
-Web.Server.Password.File.Access144.31.151.136dropped
-Mirai.Botnet91.224.92.177dropped
-WordPress.WooCommerce.Authentication.Bypass139.59.220.152dropped
-WordPress.WooCommerce.Authentication.Bypass139.59.220.152dropped