Warning: file_get_contents(/data/phpspider/zhask/data//catemap/8/http/4.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Apache 来自服务器IP的多个HTTP请求,但没有脚本发出它们_Apache_Http_Get_Ddos_Server Side Attacks - Fatal编程技术网

Apache 来自服务器IP的多个HTTP请求,但没有脚本发出它们

Apache 来自服务器IP的多个HTTP请求,但没有脚本发出它们,apache,http,get,ddos,server-side-attacks,Apache,Http,Get,Ddos,Server Side Attacks,我的服务器每分钟都要面对数千个这样的请求: **.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 19606 "-" "-" 92 **.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 5872 "-" "-" 88 **.**.*

我的服务器每分钟都要面对数千个这样的请求:

**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 19606 "-" "-" 92
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 5872 "-" "-" 88
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 9866 "-" "-" 88
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 5796 "-" "-" 89
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 4867 "-" "-" 89
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 55357 "-" "-" 89
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 5254 "-" "-" 88
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 5888 "-" "-" 88
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 7973 "-" "-" 88
**.**.***.*** - - [24/Sep/2015:17:01:14 +0200] "GET /imagefolder/someimage.jpeg HTTP/1.0" 200 6401 "-" "-" 88
**.**.***.*** - - [24/Sep/2015:17:01:11 +0200] "GET /404 HTTP/1.0" 200 21704 "-" "-" 44
(XX.XX.XXX.XXX是服务器IP)

它们每次都指向不同的文件,但始终指向同一文件夹,并且始终指向服务器IP


我已经检查了服务器中的所有“cron”文件,没有一个可以执行这些类型的HTTP请求。有人知道吗?即使来自我的服务器的IP,也有某种攻击可以做到这一点。

Linux、Unix甚至mswindows都有编程
netstat
,它具有正确的选项和权限,可以告诉您什么编程与套接字的本地端相关