🔥 IPS 威脅報告

最後更新:2026-03-03 10:32:38 開啟完整內容

時間攻擊名稱來源 IP (完整威脅IP清單)動作
-Remote.CMD.Shell42.96.61.68dropped
-Remote.CMD.Shell42.96.61.68dropped
-Web.Server.Password.File.Access203.159.90.108dropped
-Web.Server.Password.File.Access203.159.90.108dropped
-Web.Server.Password.File.Access203.159.90.108dropped
-Remote.CMD.Shell42.96.61.68dropped
-Remote.CMD.Shell42.96.61.68dropped
-PHP.CGI.Argument.Injection91.208.197.157dropped
-Dasan.GPON.Remote.Code.Execution94.243.15.90dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload24.83.200.235dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Web.Server.Password.File.Access38.134.148.65dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal12.55.16.182dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal115.191.9.67dropped
-Mirai.Botnet130.12.180.151dropped
-Dasan.GPON.Remote.Code.Execution103.99.196.1dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal14.103.213.9dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal164.68.113.99dropped
-Web.Server.Password.File.Access61.61.55.102dropped
-Web.Server.Password.File.Access106.107.254.248dropped
-Dasan.GPON.Remote.Code.Execution45.88.110.44dropped
-Asus.Apply.CGI.SystemCmd.Command.Injection152.42.217.251dropped
-PHP.CGI.Argument.Injection91.208.197.157dropped
-Dasan.GPON.Remote.Code.Execution91.218.66.161dropped
-Dasan.GPON.Remote.Code.Execution91.218.66.161dropped
-HTTP.URI.SQL.Injection160.202.133.158dropped
-AndroxGh0st.Malware167.88.165.9dropped
-HTTP.URI.SQL.Injection124.217.89.131dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal103.40.61.98dropped
-HTTP.URI.SQL.Injection113.19.141.232dropped
-PHP.CGI.Argument.Injection91.208.197.157dropped
-HTTP.URI.SQL.Injection102.222.4.116dropped
-HTTP.URI.SQL.Injection49.36.144.250dropped
-HTTP.URI.SQL.Injection72.27.177.84dropped