日期和时间,严重性,活动,状态,推荐的操作,风险名称,攻击计算机,攻击者网址,目标地址,源地址,通信说明,类别
2009-9-6 20:19,高,已阻止 js.users.51.la 的入侵尝试。应用程序路径 <path>\DEVICE\HARDDISKVOLUME16\PROGRAM FILES\MAXTHON2\MAXTHON.EXE</path>,已阻止,不需要操作,HTTP Suspicious Domain Request SQL Injection,"js.users.51.la (202.104.236.224, 80)",js.users.51.la/408041.js,"CITY-HAN (192.168.1.103, 2912)",202.104.236.224 (202.104.236.224),"TCP, www-http",
2009-9-6 20:17,高,已阻止 js.users.51.la 的入侵尝试。应用程序路径 <path>\DEVICE\HARDDISKVOLUME16\PROGRAM FILES\MAXTHON2\MAXTHON.EXE</path>,已阻止,不需要操作,HTTP Suspicious Domain Request SQL Injection,"js.users.51.la (202.104.236.224, 80)",js.users.51.la/408041.js,"CITY-HAN (192.168.1.103, 2859)",202.104.236.224 (202.104.236.224),"TCP, www-http",
2009-9-6 20:17,高,已阻止 js.users.51.la 的入侵尝试。应用程序路径 <path>\DEVICE\HARDDISKVOLUME16\PROGRAM FILES\MAXTHON2\MAXTHON.EXE</path>,已阻止,不需要操作,HTTP Suspicious Domain Request SQL Injection,"js.users.51.la (202.104.236.224, 80)",js.users.51.la/408041.js,"CITY-HAN (192.168.1.103, 2851)",202.104.236.224 (202.104.236.224),"TCP, www-http",
2009-9-6 20:17,高,已阻止 js.users.51.la 的入侵尝试。应用程序路径 <path>\DEVICE\HARDDISKVOLUME16\PROGRAM FILES\MAXTHON2\MAXTHON.EXE</path>,已阻止,不需要操作,HTTP Suspicious Domain Request SQL Injection,"js.users.51.la (202.104.236.224, 80)",js.users.51.la/408041.js,"CITY-HAN (192.168.1.103, 2831)",202.104.236.224 (202.104.236.224),"TCP, www-http",
2009-9-6 20:16,高,已阻止 js.users.51.la 的入侵尝试。应用程序路径 <path>\DEVICE\HARDDISKVOLUME16\PROGRAM FILES\MAXTHON2\MAXTHON.EXE</path>,已阻止,不需要操作,HTTP Suspicious Domain Request SQL Injection,"js.users.51.la (202.104.236.224, 80)",js.users.51.la/408041.js,"CITY-HAN (192.168.1.103, 2710)",202.104.236.224 (202.104.236.224),"TCP, www-http",
2009-9-6 20:15,高,已阻止 js.users.51.la 的入侵尝试。应用程序路径 <path>\DEVICE\HARDDISKVOLUME16\PROGRAM FILES\MAXTHON2\MAXTHON.EXE</path>,已阻止,不需要操作,HTTP Suspicious Domain Request SQL Injection,"js.users.51.la (202.104.236.224, 80)",js.users.51.la/408041.js,"CITY-HAN (192.168.1.103, 2670)",202.104.236.224 (202.104.236.224),"TCP, www-http", |