Warning: file_get_contents(/data/phpspider/zhask/data//catemap/8/logging/2.json): failed to open stream: No such file or directory in /data/phpspider/zhask/libs/function.php on line 167

Warning: Invalid argument supplied for foreach() in /data/phpspider/zhask/libs/tag.function.php on line 1116

Notice: Undefined index: in /data/phpspider/zhask/libs/function.php on line 180

Warning: array_chunk() expects parameter 1 to be array, null given in /data/phpspider/zhask/libs/function.php on line 181
Apache Httpd访问日志中充满了来自localhost的暴力攻击_Apache_Logging_Brute Force_Access Log - Fatal编程技术网

Apache Httpd访问日志中充满了来自localhost的暴力攻击

Apache Httpd访问日志中充满了来自localhost的暴力攻击,apache,logging,brute-force,access-log,Apache,Logging,Brute Force,Access Log,在过去的几周里,我收到的流量比发出的流量多,当我查看访问日志时,我每小时收到超过100000个这样的请求。由于ip地址来自本地主机,我不知道如何阻止此攻击 127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 571 127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 573 127.0.0.1

在过去的几周里,我收到的流量比发出的流量多,当我查看访问日志时,我每小时收到超过100000个这样的请求。由于ip地址来自本地主机,我不知道如何阻止此攻击

127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 571
127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 573
127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 577
127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 559
127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 571
127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 570
127.0.0.1 - - [26/Mar/2015:21:29:15 +0100] "POST /wp-login.php HTTP/1.0" 404 572

您是否尝试标识发送这些请求的进程名称?检查tcpdump以获取数据包的源端口号。然后运行sudonetstat-a-u-n-program。查找与源端口号匹配的PID/程序名。然后,您应该确定此计划是否合法,是否按照您期望的方式执行。

谢谢您的建议。我试过tcpdump,但我不明白所有的意思。但是问题已经解决了,我没有更多的攻击。由于wordpress站点现在已被删除,攻击者可能认为它没有任何用处。