网站访问统计见到过这两个异常 IP 段吗 - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
holinhot
V2EX    信息安全

网站访问统计见到过这两个异常 IP 段吗

  •  
  •   holinhot 2019-11-17 22:53:28 +08:00 4525 次点击
    这是一个创建于 2229 天前的主题,其中的信息可能已经有所发展或是发生改变。
    和这个样,
    amp/t/540682

    一个支付回调接口,按理是没有公开暴露的,但是有来至 180.163.220.4 的访问。而且 UA 一看就不是什么好东西。

    HTTP_USER_AGENT => Mozilla/5.0 (Linux; U; Android 8.1.0; zh-CN; EML-AL00 Build/HUAWEIEML-AL00) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/57.0.2987.108 baidu.sogo.uc.UCBrowser/11.9.4.974 UWS/2.13.1.48 Mobile Safari/537.36 AliApp(DingTalk/4.5.11) com.alibaba.android.rimet/10487439 Channel/227200 language/zh-CN


    REQUEST_DATA =>
    SERVER_DATA =>
    CONTEXT_DOCUMENT_ROOT => /home
    CONTEXT_PREFIX =>
    DOCUMENT_ROOT => /home/
    GATEWAY_INTERFACE => CGI/1.1
    H2PUSH => on
    H2_PUSH => on
    H2_PUSHED =>
    H2_PUSHED_ON =>
    H2_STREAM_ID => 1
    H2_STREAM_TAG => 88-1
    HTTP2 => on
    HTTPS => on
    HTTP_ACCEPT => text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
    HTTP_ACCEPT_ENCODING => gzip, deflate
    HTTP_CACHE_COnTROL=> no-cache
    HTTP_HOST => store.
    HTTP_PRAGMA => no-cache
    HTTP_REFERER => http://baidu.com/
    HTTP_UPGRADE_INSECURE_REQUESTS => 1
    HTTP_USER_AGENT => Mozilla/5.0 (Linux; U; Android 8.1.0; zh-CN; EML-AL00 Build/HUAWEIEML-AL00) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/57.0.2987.108 baidu.sogo.uc.UCBrowser/11.9.4.974 UWS/2.13.1.48 Mobile Safari/537.36 AliApp(DingTalk/4.5.11) com.alibaba.android.rimet/10487439 Channel/227200 language/zh-CN
    HTTP_X_HTTPS => 1
    PATH => /bin:/usr/bin
    PHP_INI_SCAN_DIR => /opt/cpanel/ea-php72/root/etc:/opt/cpanel/ea-php72/root/etc/php.d:.
    QUERY_STRING =>
    REDIRECT_STATUS => 200
    REMOTE_ADDR => 180.163.220.4
    REMOTE_PORT => 62746
    REQUEST_METHOD => GET
    REQUEST_SCHEME => https
    REQUEST_URI => /return.php
    SCRIPT_FILENAME => /home/_return.php
    SCRIPT_NAME => return.php
    SCRIPT_URI => return.php
    SCRIPT_URL => return.php
    SERVER_ADDR => 1.1.1.1
    SERVER_ADMIN => webmaster@
    SERVER_NAME => store.
    SERVER_PORT => 443
    SERVER_PROTOCOL => HTTP/2.0
    SERVER_SIGNATURE =>
    SERVER_SOFTWARE => Apache
    SSL_TLS_SNI => store.
    TZ => Etc/GMT
    UNIQUE_ID => XcvtVa3jGRPKDQsSIU6Ytgdf3fd
    PHP_SELF => return.php
    REQUEST_TIME_FLOAT => 1573645653.3753
    REQUEST_TIME => 1573645653
    argv =>
    argc => 0

    分析发现在 11/13/2019 11:46 有人付款发生了回调,在 11/13/2019 11:47 有来至 180.163.220.4 的访问,为什么有用户付款后此 IP 就马上来抓取。
    5 条回复    2019-11-17 23:25:21 +08:00
    holinhot
        1
    holinhot  
    OP
       2019-11-17 22:56:45 +08:00
    我分析可能和用户使用的浏览器、或杀毒软件(如周红衣家的)有关,或插件。不然不可能 URL 地址会暴露。
    holinhot
        2
    holinhot  
    OP
       2019-11-17 23:00:03 +08:00
    我看了用户付款的 UA:HTTP_USER_AGENT => Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
    系统是 macos,但浏览器看不出来是啥,到底是 Chrome 还是 Safari,还是 360 浏览器伪装的 UA, 因为听说现在 360 浏览器已经不显示自己的 UA 了,至于为什么大家都懂吧
    holinhot
        3
    holinhot  
    OP
       2019-11-17 23:01:26 +08:00
    @holinhot 刚找到这一篇文章,https://www.360zhijia.com/ask/461446.html
    由此来看来 180.163.220.4 90%是 360 那 j2 在搞怪
    holinhot
        4
    holinhot  
    OP
       2019-11-17 23:06:02 +08:00
    holinhot
        5
    holinhot  
    OP
       2019-11-17 23:25:21 +08:00
    已全部拉黑这个 b 玩意儿。
    https://prnt.sc/py59xi
    简单粗暴直接 ban 了 CT GROUP 这个 IDC 段 180.160.0.0/13
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     1646 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 27ms UTC 16:19 PVG 00:19 LAX 08:19 JFK 11:19
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86