最後更新:2026-03-03 10:32:38 開啟完整內容
| 時間 | 攻擊名稱 | 來源 IP (完整威脅IP清單) | 動作 |
|---|---|---|---|
| - | Remote.CMD.Shell | 42.96.61.68 | dropped |
| - | Remote.CMD.Shell | 42.96.61.68 | dropped |
| - | Web.Server.Password.File.Access | 203.159.90.108 | dropped |
| - | Web.Server.Password.File.Access | 203.159.90.108 | dropped |
| - | Web.Server.Password.File.Access | 203.159.90.108 | dropped |
| - | Remote.CMD.Shell | 42.96.61.68 | dropped |
| - | Remote.CMD.Shell | 42.96.61.68 | dropped |
| - | PHP.CGI.Argument.Injection | 91.208.197.157 | dropped |
| - | Dasan.GPON.Remote.Code.Execution | 94.243.15.90 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload | 24.83.200.235 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Web.Server.Password.File.Access | 38.134.148.65 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 12.55.16.182 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 115.191.9.67 | dropped |
| - | Mirai.Botnet | 130.12.180.151 | dropped |
| - | Dasan.GPON.Remote.Code.Execution | 103.99.196.1 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 14.103.213.9 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 164.68.113.99 | dropped |
| - | Web.Server.Password.File.Access | 61.61.55.102 | dropped |
| - | Web.Server.Password.File.Access | 106.107.254.248 | dropped |
| - | Dasan.GPON.Remote.Code.Execution | 45.88.110.44 | dropped |
| - | Asus.Apply.CGI.SystemCmd.Command.Injection | 152.42.217.251 | dropped |
| - | PHP.CGI.Argument.Injection | 91.208.197.157 | dropped |
| - | Dasan.GPON.Remote.Code.Execution | 91.218.66.161 | dropped |
| - | Dasan.GPON.Remote.Code.Execution | 91.218.66.161 | dropped |
| - | HTTP.URI.SQL.Injection | 160.202.133.158 | dropped |
| - | AndroxGh0st.Malware | 167.88.165.9 | dropped |
| - | HTTP.URI.SQL.Injection | 124.217.89.131 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 103.40.61.98 | dropped |
| - | HTTP.URI.SQL.Injection | 113.19.141.232 | dropped |
| - | PHP.CGI.Argument.Injection | 91.208.197.157 | dropped |
| - | HTTP.URI.SQL.Injection | 102.222.4.116 | dropped |
| - | HTTP.URI.SQL.Injection | 49.36.144.250 | dropped |
| - | HTTP.URI.SQL.Injection | 72.27.177.84 | dropped |