本帖最后由 wjcharles 于 2012-12-6 13:30 编辑
firefox3 发表于 2012-12-6 12:48
你可以进毒网试一下很爽的
记得携带Fan{过}{滤}Qiang工具,jre-7u5-windows-i586.exe哦
运 ...
ips无压力,看清楚了,不是ip拉黑哦
类别: 入侵防护
日期和时间,风险,活动,状态,推荐的操作,IPS 警报名称,默认操作,采取的操作,攻击电脑,攻击者网址,目标地址,源地址,通信说明,类别
2012/12/6 13:21:23,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49324)",interest.fightyourbills.net/r/media/java.php,"interest.fightyourbills.net (5.187.1.151, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49324",
2012/12/6 13:21:21,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49322)",interest.fightyourbills.net/r/media/java.php,"interest.fightyourbills.net (5.187.1.151, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49322",
2012/12/6 13:21:19,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49319)",interest.fightyourbills.net/r/media/java.php,"interest.fightyourbills.net (5.187.1.151, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49319",
2012/12/6 13:21:18,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49317)",interest.fightyourbills.net/r/media/java.php,"interest.fightyourbills.net (5.187.1.151, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49317",
2012/12/6 13:20:58,高,阻止了 interest.fightyourbills.net 的入侵企图,已阻止,不需要操作,Attack: Microsoft Windows True Type Font CVE-2011-3402,不需要操作,不需要操作,"interest.fightyourbills.net (5.187.1.151, 80)",interest.fightyourbills.net/r/64size_font.eot,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49313)",5.187.1.151 (5.187.1.151),"TCP, www-http",
第一个网址,一样的东西
类别: 入侵防护
日期和时间,风险,活动,状态,推荐的操作,IPS 警报名称,默认操作,采取的操作,攻击电脑,攻击者网址,目标地址,源地址,通信说明,类别
2012/12/6 13:26:55,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49377)",hour.learningfundamental.org/r/media/java.php,"hour.learningfundamental.org (78.47.2.21, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49377",
2012/12/6 13:26:53,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49375)",hour.learningfundamental.org/r/media/java.php,"hour.learningfundamental.org (78.47.2.21, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49375",
2012/12/6 13:26:51,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49373)",hour.learningfundamental.org/r/media/java.php,"hour.learningfundamental.org (78.47.2.21, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49373",
2012/12/6 13:26:47,高,阻止了 WIN-MUD6U7NNTD1.localdomain 的入侵企图,已阻止,不需要操作,Web Attack: JRE Concurrency CVE-2012-0507 6,不需要操作,不需要操作,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49371)",hour.learningfundamental.org/r/media/java.php,"hour.learningfundamental.org (78.47.2.21, 80)",192.168.58.128 (192.168.58.128),"TCP, 端口 49371",
2012/12/6 13:26:30,高,阻止了 hour.learningfundamental.org 的入侵企图,已阻止,不需要操作,Attack: Microsoft Windows True Type Font CVE-2011-3402,不需要操作,不需要操作,"hour.learningfundamental.org (78.47.2.21, 80)",hour.learningfundamental.org/r/64size_font.eot,"WIN-MUD6U7NNTD1.localdomain (192.168.58.128, 49367)",78.47.2.21 (78.47.2.21),"TCP, www-http", |