🔥 IPS 威脅報告與惡意 IP 監控

本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL InjectionXSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。

最後更新:2026-04-15 14:48:36   📥 下載完整報告

時間攻擊名稱來源 IP (下載威脅IP清單)動作
-HTTP.URI.SQL.Injection144.126.129.119dropped
-HTTP.URI.SQL.Injection144.126.129.119dropped
-HTTP.URI.SQL.Injection144.126.129.119dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal107.173.241.234dropped
-Web.Server.Password.File.Access5.187.35.26dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection46.101.46.29dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow50.19.221.48dropped
-Mirai.Botnet71.207.128.92dropped
-Cross.Site.Scripting37.211.2.68detected
-Cross.Site.Scripting37.211.2.68detected
-Mirai.Botnet91.224.92.177dropped
-ALFA.TEaM.Web.Shell4.205.44.31dropped
-AndroxGh0st.Malware45.154.98.50dropped
-Mirai.Botnet176.65.149.39dropped
-ALFA.TEaM.Web.Shell4.205.60.171dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow3.209.174.110dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow54.209.100.30dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection170.150.185.35dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow23.21.228.180dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection34.21.187.77dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection142.248.80.31dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow34.199.252.22dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Cross.Site.Scripting69.197.178.193detected
-Cross.Site.Scripting69.197.178.193detected
-Web.Server.Password.File.Access69.197.178.193dropped
-Cross.Site.Scripting69.197.178.193detected
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Mirai.Botnet91.224.92.177dropped
-Mirai.Botnet91.224.92.177dropped
-ALFA.TEaM.Web.Shell139.59.96.36dropped
-Cross.Site.Scripting66.249.89.37detected
-Cross.Site.Scripting103.213.239.72detected
-HTTP.URI.SQL.Injection192.109.200.134dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal185.211.94.76dropped
-Mirai.Botnet91.224.92.177dropped
-ALFA.TEaM.Web.Shell20.63.103.29dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection129.222.2.10dropped
-HTTP.URI.SQL.Injection18.88.32.232dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection101.109.154.166dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution222.134.163.89dropped
-Linux.Kernel.TCP.SACK.Panic.DoS131.159.24.205dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution61.3.24.132dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal36.132.36.134dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
IPS 網路威脅即時報告與惡意 IP 監控 - 2ns.org

🔥 IPS 威脅報告與惡意 IP 監控

本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL InjectionXSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。

最後更新:2026-04-15 14:48:36   📥 下載完整報告

時間攻擊名稱來源 IP (下載威脅IP清單)動作
-HTTP.URI.SQL.Injection144.126.129.119dropped
-HTTP.URI.SQL.Injection144.126.129.119dropped
-HTTP.URI.SQL.Injection144.126.129.119dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal107.173.241.234dropped
-Web.Server.Password.File.Access5.187.35.26dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection46.101.46.29dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow50.19.221.48dropped
-Mirai.Botnet71.207.128.92dropped
-Cross.Site.Scripting37.211.2.68detected
-Cross.Site.Scripting37.211.2.68detected
-Mirai.Botnet91.224.92.177dropped
-ALFA.TEaM.Web.Shell4.205.44.31dropped
-AndroxGh0st.Malware45.154.98.50dropped
-Mirai.Botnet176.65.149.39dropped
-ALFA.TEaM.Web.Shell4.205.60.171dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow3.209.174.110dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow54.209.100.30dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection170.150.185.35dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow23.21.228.180dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection34.21.187.77dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection142.248.80.31dropped
-zlib.Library.inflateGetHeader.Handling.Buffer.Overflow34.199.252.22dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Cross.Site.Scripting69.197.178.193detected
-Cross.Site.Scripting69.197.178.193detected
-Web.Server.Password.File.Access69.197.178.193dropped
-Cross.Site.Scripting69.197.178.193detected
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Mirai.Botnet91.224.92.177dropped
-Mirai.Botnet91.224.92.177dropped
-ALFA.TEaM.Web.Shell139.59.96.36dropped
-Cross.Site.Scripting66.249.89.37detected
-Cross.Site.Scripting103.213.239.72detected
-HTTP.URI.SQL.Injection192.109.200.134dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal185.211.94.76dropped
-Mirai.Botnet91.224.92.177dropped
-ALFA.TEaM.Web.Shell20.63.103.29dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection129.222.2.10dropped
-HTTP.URI.SQL.Injection18.88.32.232dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection101.109.154.166dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution222.134.163.89dropped
-Linux.Kernel.TCP.SACK.Panic.DoS131.159.24.205dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution61.3.24.132dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal36.132.36.134dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped
-Apache.Log4j.Error.Log.Remote.Code.Execution34.19.116.56dropped