服务器受攻击,请求帮助防范~~
服务器第三次受这样的攻击了,几乎占满了全部的宽带,WEB根本没办法访问,请问有什么办法可以这样的攻击失效吗?多谢~
tcp 211 0 219.150.160.251:80 202.103.207.201:2384 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:2641 CLOSE_WAIT
tcp 223 0 219.150.160.251:80 202.103.207.201:3153 CLOSE_WAIT
tcp 211 0 219.150.160.251:80 202.103.207.201:2387 CLOSE_WAIT
tcp 224 0 219.150.160.251:80 202.103.207.201:3155 CLOSE_WAIT
tcp 223 0 219.150.160.251:80 202.103.207.201:3157 CLOSE_WAIT
tcp 213 0 219.150.160.251:80 202.103.207.201:2389 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:3164 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:2112 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:1601 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:2114 CLOSE_WAIT
tcp 213 0 219.150.160.251:80 202.103.207.201:1603 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:1092 CLOSE_WAIT
tcp 188 0 219.150.160.251:80 202.103.207.201:1862 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:1350 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:4936 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:4937 CLOSE_WAIT
tcp 224 0 219.150.160.251:80 202.103.207.201:2378 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:4939 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:4941 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:4942 CLOSE_WAIT
tcp 223 0 219.150.160.251:80 202.103.207.201:3150 CLOSE_WAIT
tcp 223 0 219.150.160.251:80 202.103.207.201:3151 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:2639 CLOSE_WAIT
tcp 223 0 219.150.160.251:80 202.103.207.201:2160 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:2672 CLOSE_WAIT
tcp 1 0 219.150.160.251:80 202.103.207.201:4976 CLOSE_WAIT
tcp 223 0 219.150.160.251:80 202.103.207.201:2161 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:3185 CLOSE_WAIT
tcp 224 0 219.150.160.251:80 202.103.207.201:3186 CLOSE_WAIT
tcp 228 0 219.150.160.251:80 207.46.98.76:3052 CLOSE_WAIT
tcp 0 0 219.150.160.251:80 202.103.207.201:1396 CLOSE_WAIT
tcp 220 0 219.150.160.251:80 202.103.207.201:1654 CLOSE_WAIT
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
![扫码二维码加入Web技术交流群](/public/img/jiaqun_03.jpg)
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(7)
iptables -A INPUT -d 202.103.207.201 -j DROP![](https://www.wenjiangs.com/wp-content/uploads/chinaunix/202206/icon_eek.gif)
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL FIN,URG,PSH -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix " INVAILD NMAP SCAN "
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL FIN,URG,PSH -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-flags SYN,RST SYN,RST -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix " SYN/RST "
iptables -A CHECK_FLAGS -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-flags SYN,FIN SYN,FIN -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix " SYN/FIN SCAN "
iptables -A CHECK_FLAGS -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-option 64 -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix " Bogus TCP FLAG 64 "
iptables -A CHECK_FLAGS -p tcp --tcp-option 64 -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-option 128 -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix " Bogus TCP FLAG 128 "
iptables -A CHECK_FLAGS -p tcp --tcp-option 128 -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL ALL -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix "Merry Xmas Tree:"
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL ALL -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix "XMAS-PSH:"
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL NONE -m limit --limit 5/minute -j LOG --log-level 6 --log-prefix "NULL_SCAN"
iptables -A CHECK_FLAGS -p tcp --tcp-flags ALL NONE -j DROP
参考下可能有帮助,以前网上找的一个iptables脚本
CHECK_FLAGS是自己定义的一个链
iptables -A INPUT -p tcp --syn -m limit --limit 1/s -j ACCEPT
iptables -A FORWARD -p tcp --syn -m limit --limit 1/s -j ACCEPT
流行的做法
不过SYN好像真的没有办法搞啊
限制了IP人家可以换IP,限制了流量就连正常的都限制了
比方加上上边这两条的话就连正常的都限制了
前边放一个好点的防火墙做代理,就看防火墙能不能顶住了,嘿嘿
不知道有高手能支招吗?
[quote]原帖由 "xuhehao"]iptables -A INPUT -d 202.103.207.201 -j DROP
[/quote 发表:
这样做也没用,如果别人是固定IP的话,这架搞定,但如果不是的话那我就惨了~~
什么啊,带宽都占满了,什么招都没用了
如果是网络带宽占了100% 那真没办法了.
如果是系统资源占用100%,倒还能有点办法解决!
l楼上这话说的好![](https://www.wenjiangs.com/wp-content/uploads/chinaunix/202206/icon_smile.gif)