本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL Injection、XSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。
最後更新:2026-03-06 17:34:13 📥 下載完整報告
| 時間 | 攻擊名稱 | 來源 IP (下載威脅IP清單) | 動作 |
|---|---|---|---|
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.211 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.187 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.211 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.187 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.211 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.187 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.211 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.187 | dropped |
| - | PHP.CGI.Argument.Injection | 34.19.127.182 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.211 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.206 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.206 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.206 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.206 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.206 | dropped |
| - | ThinkPHP.Controller.Parameter.Remote.Code.Execution | 34.19.116.54 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.61 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.61 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.61 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.61 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.61 | dropped |
| - | ThinkPHP.Controller.Parameter.Remote.Code.Execution | 34.19.116.62 | dropped |
| - | Apache.HTTP.Server.mod_proxy.SSRF | 34.19.127.177 | dropped |
| - | Apache.HTTP.Server.mod_proxy.SSRF | 34.19.127.200 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.186 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.52 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.186 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.52 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.186 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.52 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 34.19.127.182 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.186 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 34.19.127.178 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.52 | dropped |
| - | PHP.CGI.Argument.Injection | 34.19.127.182 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 34.19.127.182 | dropped |
| - | PHP.CGI.Argument.Injection | 34.19.127.187 | dropped |
| - | Web.Server.Password.File.Access | 34.19.116.56 | dropped |
| - | Apache.HTTP.Server.mod_proxy.SSRF | 34.19.127.199 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.127.186 | dropped |
| - | ThinkPHP.Controller.Parameter.Remote.Code.Execution | 34.19.116.52 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 34.19.127.178 | dropped |
| - | Web.Server.Password.File.Access | 34.19.127.181 | dropped |
| - | Mirai.Botnet | 45.128.118.160 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |