本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL Injection、XSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。
最後更新:2026-04-15 14:48:36 📥 下載完整報告
| 時間 | 攻擊名稱 | 來源 IP (下載威脅IP清單) | 動作 |
|---|---|---|---|
| - | HTTP.URI.SQL.Injection | 144.126.129.119 | dropped |
| - | HTTP.URI.SQL.Injection | 144.126.129.119 | dropped |
| - | HTTP.URI.SQL.Injection | 144.126.129.119 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 107.173.241.234 | dropped |
| - | Web.Server.Password.File.Access | 5.187.35.26 | dropped |
| - | Multiple.Routers.GPON.formLogin.Remote.Command.Injection | 46.101.46.29 | dropped |
| - | zlib.Library.inflateGetHeader.Handling.Buffer.Overflow | 50.19.221.48 | dropped |
| - | Mirai.Botnet | 71.207.128.92 | dropped |
| - | Cross.Site.Scripting | 37.211.2.68 | detected |
| - | Cross.Site.Scripting | 37.211.2.68 | detected |
| - | Mirai.Botnet | 91.224.92.177 | dropped |
| - | ALFA.TEaM.Web.Shell | 4.205.44.31 | dropped |
| - | AndroxGh0st.Malware | 45.154.98.50 | dropped |
| - | Mirai.Botnet | 176.65.149.39 | dropped |
| - | ALFA.TEaM.Web.Shell | 4.205.60.171 | dropped |
| - | zlib.Library.inflateGetHeader.Handling.Buffer.Overflow | 3.209.174.110 | dropped |
| - | zlib.Library.inflateGetHeader.Handling.Buffer.Overflow | 54.209.100.30 | dropped |
| - | D-Link.DSL-2750B.CLI.OS.Command.Injection | 170.150.185.35 | dropped |
| - | zlib.Library.inflateGetHeader.Handling.Buffer.Overflow | 23.21.228.180 | dropped |
| - | Multiple.Routers.GPON.formLogin.Remote.Command.Injection | 34.21.187.77 | dropped |
| - | Multiple.Routers.GPON.formLogin.Remote.Command.Injection | 142.248.80.31 | dropped |
| - | zlib.Library.inflateGetHeader.Handling.Buffer.Overflow | 34.199.252.22 | dropped |
| - | Web.Server.Password.File.Access | 69.197.178.193 | dropped |
| - | Web.Server.Password.File.Access | 69.197.178.193 | dropped |
| - | Cross.Site.Scripting | 69.197.178.193 | detected |
| - | Cross.Site.Scripting | 69.197.178.193 | detected |
| - | Web.Server.Password.File.Access | 69.197.178.193 | dropped |
| - | Cross.Site.Scripting | 69.197.178.193 | detected |
| - | Web.Server.Password.File.Access | 69.197.178.193 | dropped |
| - | Web.Server.Password.File.Access | 69.197.178.193 | dropped |
| - | Mirai.Botnet | 91.224.92.177 | dropped |
| - | Mirai.Botnet | 91.224.92.177 | dropped |
| - | ALFA.TEaM.Web.Shell | 139.59.96.36 | dropped |
| - | Cross.Site.Scripting | 66.249.89.37 | detected |
| - | Cross.Site.Scripting | 103.213.239.72 | detected |
| - | HTTP.URI.SQL.Injection | 192.109.200.134 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 185.211.94.76 | dropped |
| - | Mirai.Botnet | 91.224.92.177 | dropped |
| - | ALFA.TEaM.Web.Shell | 20.63.103.29 | dropped |
| - | D-Link.DSL-2750B.CLI.OS.Command.Injection | 129.222.2.10 | dropped |
| - | HTTP.URI.SQL.Injection | 18.88.32.232 | dropped |
| - | D-Link.DSL-2750B.CLI.OS.Command.Injection | 101.109.154.166 | dropped |
| - | NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution | 222.134.163.89 | dropped |
| - | Linux.Kernel.TCP.SACK.Panic.DoS | 131.159.24.205 | dropped |
| - | NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution | 61.3.24.132 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 36.132.36.134 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.56 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.56 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.56 | dropped |
| - | Apache.Log4j.Error.Log.Remote.Code.Execution | 34.19.116.56 | dropped |