🛡️ 2NS 資安防護中心 (Security Hub)
整合 IP 管理、子網計算、威脅情資與設備轉換的一站式門戶。
🔥 IPS 威脅報告與惡意 IP 監控
本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL Injection、XSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。
最後更新:2026-03-06 11:28:01 📥 下載完整報告
| 時間 | 攻擊名稱 | 來源 IP (下載威脅IP清單) | 動作 |
|---|---|---|---|
| - | Mirai.Botnet | 45.128.118.160 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | HTTP.URI.SQL.Injection | 186.6.183.67 | dropped |
| - | Web.Server.Password.File.Access | 72.14.142.137 | dropped |
| - | Cross.Site.Scripting | 72.14.142.137 | detected |
| - | Cross.Site.Scripting | 184.174.21.241 | detected |
| - | Web.Server.Password.File.Access | 65.110.41.180 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 144.79.133.252 | dropped |
| - | HTTP.URI.SQL.Injection | 103.249.117.202 | dropped |
| - | HTTP.URI.SQL.Injection | 103.249.117.202 | dropped |
| - | AndroxGh0st.Malware | 80.94.92.123 | dropped |
| - | Cross.Site.Scripting | 140.99.7.121 | detected |
| - | Web.Server.Password.File.Access | 140.99.7.121 | dropped |
| - | Cross.Site.Scripting | 72.14.142.137 | detected |
| - | Web.Server.Password.File.Access | 184.174.21.241 | dropped |
| - | HTTP.URI.SQL.Injection | 103.249.117.202 | dropped |
| - | HTTP.URI.SQL.Injection | 103.249.117.202 | dropped |
| - | Web.Server.Password.File.Access | 204.76.203.215 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 101.36.104.242 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 144.91.93.174 | dropped |
| - | PHP.CGI.Argument.Injection | 176.123.1.163 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 114.220.75.156 | dropped |
| - | WordPress.REST.API.Username.Enumeration.Information.Disclosure | 185.177.72.22 | dropped |
| - | HTTP.URI.SQL.Injection | 188.240.71.254 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | Apache.HTTP.Server.cgi-bin.Path.Traversal | 106.13.183.26 | dropped |
| - | AndroxGh0st.Malware | 103.23.206.247 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |
| - | PHPUnit.Eval-stdin.PHP.Remote.Code.Execution | 89.248.168.239 | dropped |