正在安全驗證中...
IPS 網路威脅即時報告與惡意 IP 監控 - 2ns.org

🔥 IPS 威脅報告與惡意 IP 監控

本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL InjectionXSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。

最後更新:2026-04-19 07:57:30   📥 下載完整報告

時間攻擊名稱來源 IP (下載威脅IP清單)動作
-ALFA.TEaM.Web.Shell20.63.32.193dropped
-ALFA.TEaM.Web.Shell20.63.32.193dropped
-ALFA.TEaM.Web.Shell172.202.75.66dropped
-HTTP.URI.SQL.Injection65.181.118.110dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection69.30.150.99dropped
-Web.Server.Password.File.Access181.177.89.129dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal109.105.210.88dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal109.105.210.87dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload109.105.210.89dropped
-ALFA.TEaM.Web.Shell20.63.32.193dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal221.120.34.164dropped
-ALFA.TEaM.Web.Shell172.202.75.66dropped
-HTTP.URI.SQL.Injection65.181.118.110dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal103.40.61.98dropped
-Web.Server.Password.File.Access208.84.102.203dropped
-Cross.Site.Scripting208.84.102.203detected
-Cross.Site.Scripting208.84.102.203detected
-Web.Server.Password.File.Access208.84.102.203dropped
-HTTP.URI.SQL.Injection65.181.118.110dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal158.173.159.116dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal185.203.216.248dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution14.205.104.200dropped
-Mirai.Botnet91.224.92.177dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution103.173.7.200dropped
-Apache.Struts.2.DefaultActionMapper.Remote.Command.Execution125.165.62.124dropped
-Apache.Struts.2.DefaultActionMapper.Remote.Command.Execution125.165.62.124dropped
-Apache.Struts.2.Jakarta.Multipart.Parser.Code.Execution125.165.62.124dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection176.65.139.60dropped
-Bladabindi.Botnet138.197.16.14dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal129.121.84.193dropped
-D-Link.Devices.HNAP.SOAPAction-Header.Command.Execution58.65.216.0dropped
-Mirai.Botnet91.224.92.177dropped
-HTTP.URI.SQL.Injection109.176.21.181dropped
-Malicious.HTTP.URI.Requests185.177.72.17dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection223.123.38.32dropped
-AndroxGh0st.Malware82.38.4.92dropped
-Mirai.Botnet91.224.92.177dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal46.191.157.159dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal147.93.157.83dropped
-ALFA.TEaM.Web.Shell20.220.15.7dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection159.89.84.111dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal222.89.169.98dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection142.248.80.31dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal36.132.36.134dropped
-HTTP.URI.SQL.Injection217.79.116.138dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal85.111.68.99dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Cross.Site.Scripting69.197.178.193detected
IPS 網路威脅即時報告與惡意 IP 監控 - 2ns.org

🔥 IPS 威脅報告與惡意 IP 監控

本報告彙整了 2ns.org 監測節點偵測到的即時攻擊行為。包含 SQL InjectionXSS 跨站腳本 以及非法檔案存取嘗試。提供管理者作為防火牆黑名單設定參考。

最後更新:2026-04-19 07:57:30   📥 下載完整報告

時間攻擊名稱來源 IP (下載威脅IP清單)動作
-ALFA.TEaM.Web.Shell20.63.32.193dropped
-ALFA.TEaM.Web.Shell20.63.32.193dropped
-ALFA.TEaM.Web.Shell172.202.75.66dropped
-HTTP.URI.SQL.Injection65.181.118.110dropped
-D-Link.DSL-2750B.CLI.OS.Command.Injection69.30.150.99dropped
-Web.Server.Password.File.Access181.177.89.129dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal109.105.210.88dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal109.105.210.87dropped
-Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload109.105.210.89dropped
-ALFA.TEaM.Web.Shell20.63.32.193dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal221.120.34.164dropped
-ALFA.TEaM.Web.Shell172.202.75.66dropped
-HTTP.URI.SQL.Injection65.181.118.110dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal103.40.61.98dropped
-Web.Server.Password.File.Access208.84.102.203dropped
-Cross.Site.Scripting208.84.102.203detected
-Cross.Site.Scripting208.84.102.203detected
-Web.Server.Password.File.Access208.84.102.203dropped
-HTTP.URI.SQL.Injection65.181.118.110dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal158.173.159.116dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal185.203.216.248dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution14.205.104.200dropped
-Mirai.Botnet91.224.92.177dropped
-NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution103.173.7.200dropped
-Apache.Struts.2.DefaultActionMapper.Remote.Command.Execution125.165.62.124dropped
-Apache.Struts.2.DefaultActionMapper.Remote.Command.Execution125.165.62.124dropped
-Apache.Struts.2.Jakarta.Multipart.Parser.Code.Execution125.165.62.124dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection176.65.139.60dropped
-Bladabindi.Botnet138.197.16.14dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal129.121.84.193dropped
-D-Link.Devices.HNAP.SOAPAction-Header.Command.Execution58.65.216.0dropped
-Mirai.Botnet91.224.92.177dropped
-HTTP.URI.SQL.Injection109.176.21.181dropped
-Malicious.HTTP.URI.Requests185.177.72.17dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection223.123.38.32dropped
-AndroxGh0st.Malware82.38.4.92dropped
-Mirai.Botnet91.224.92.177dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal46.191.157.159dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal147.93.157.83dropped
-ALFA.TEaM.Web.Shell20.220.15.7dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection159.89.84.111dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal222.89.169.98dropped
-Multiple.Routers.GPON.formLogin.Remote.Command.Injection142.248.80.31dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal36.132.36.134dropped
-HTTP.URI.SQL.Injection217.79.116.138dropped
-Apache.HTTP.Server.cgi-bin.Path.Traversal85.111.68.99dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Web.Server.Password.File.Access69.197.178.193dropped
-Cross.Site.Scripting69.197.178.193detected

✅ 處理完成