<script type="application/ld+json">{"@context":"http://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://www.simcentric.com/sc/"},{"@type":"ListItem","position":2,"name":"如何检测洛杉矶服务器是否感染病毒或遭受攻击？","item":"https://www.simcentric.com/sc/america-dedicated-server-sc/how-to-detect-virus-infections-and-attacks-on-la-servers/"}]}</script> {"id":22402,"date":"2025-02-05T11:48:39","date_gmt":"2025-02-05T03:48:39","guid":{"rendered":"https:\/\/www.simcentric.com\/uncategorized-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/"},"modified":"2025-02-05T11:52:08","modified_gmt":"2025-02-05T03:52:08","slug":"how-to-detect-virus-infections-and-attacks-on-la-servers","status":"publish","type":"post","link":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/","title":{"rendered":"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f"},"content":{"rendered":"<p>\u5728<a href=\"https:\/\/www.simcentric.com\/sc\/products\/dedicated-server-us\/\" target=\"_blank\">\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528<\/a>\u73af\u5883\u4e2d\uff0c\u670d\u52a1\u5668\u5b89\u5168\u9700\u8981\u6301\u7eed\u7684\u76d1\u63a7\u548c\u4e3b\u52a8\u7684\u5a01\u80c1\u68c0\u6d4b\u3002\u968f\u7740<a href=\"https:\/\/www.simcentric.com\/sc\/hong-kong-dedicated-server-sc\/malware-vs-trojans-securing-your-hong-kong-server\/\" target=\"_blank\">\u7f51\u7edc\u653b\u51fb<\/a>\u624b\u6bb5\u65e5\u76ca\u590d\u6742\uff0c\u7cfb\u7edf\u7ba1\u7406\u5458\u9700\u8981\u5f3a\u5927\u7684\u5de5\u5177\u548c\u65b9\u6cd5\u6765\u53ca\u65e9\u8bc6\u522b\u6f5c\u5728\u7684\u5b89\u5168\u9690\u60a3\u3002\u672c\u6280\u672f\u6307\u5357\u6df1\u5165\u63a2\u8ba8\u4e86\u68c0\u6d4b\u670d\u52a1\u5668\u611f\u67d3\u548c\u6076\u610f\u6d3b\u52a8\u7684\u5b9e\u7528\u65b9\u6cd5\u3002<\/p>\n<h2><strong>\u7406\u89e3\u7cfb\u7edf\u5f02\u5e38<\/strong><\/h2>\n<p>\u670d\u52a1\u5668\u906d\u53d7\u653b\u51fb\u7684\u9996\u8981\u8ff9\u8c61\u901a\u5e38\u8868\u73b0\u5728\u7cfb\u7edf\u6027\u80fd\u6307\u6807\u4e0a\u3002\u8ba9\u6211\u4eec\u7528\u5e38\u7528\u7684Linux\u547d\u4ee4\u6765\u68c0\u67e5\u5173\u952e\u53c2\u6570\uff1a<\/p>\n<pre><code>\r\n# \u68c0\u67e5CPU\u4f7f\u7528\u7387\r\ntop -b -n 1\r\n\r\n# \u76d1\u63a7\u7cfb\u7edf\u8d1f\u8f7d\u5e73\u5747\u503c\r\nuptime\r\n\r\n# \u8ddf\u8e2a\u5185\u5b58\u4f7f\u7528\u60c5\u51b5\r\nfree -m\r\n\r\n# \u76d1\u63a7\u78c1\u76d8I\/O\r\niostat -x 1\r\n<\/code><\/pre>\n<p>\u53ef\u7591\u7684\u6a21\u5f0f\u901a\u5e38\u5305\u62ec\uff1a<\/p>\n<ul>\n<li>\u6ca1\u6709\u5bf9\u5e94\u5408\u6cd5\u8fdb\u7a0b\u7684CPU\u4f7f\u7528\u7387\u7a81\u589e<\/li>\n<li>\u5f02\u5e38\u7684\u5185\u5b58\u6d88\u8017\u6a21\u5f0f<\/li>\n<li>\u610f\u5916\u7684\u78c1\u76d8I\/O\u6d3b\u52a8<\/li>\n<li>\u7f51\u7edc\u63a5\u53e3\u9971\u548c<\/li>\n<\/ul>\n<h2><strong>\u7f51\u7edc\u6d41\u91cf\u5206\u6790<\/strong><\/h2>\n<p>\u76d1\u63a7\u7f51\u7edc\u6a21\u5f0f\u6709\u52a9\u4e8e\u8bc6\u522b\u6f5c\u5728\u7684\u5165\u4fb5\u3002\u4ee5\u4e0b\u662f\u4f7f\u7528tcpdump\u7684\u5b9e\u7528\u65b9\u6cd5\uff1a<\/p>\n<pre><code>\r\n# \u76d1\u63a7\u53ef\u7591\u7684\u7f51\u7edc\u8fde\u63a5\r\ntcpdump -i any 'tcp[tcpflags] & (tcp-syn) != 0'\r\n\r\n# \u68c0\u67e5\u5df2\u5efa\u7acb\u7684\u8fde\u63a5\r\nnetstat -tunapel | grep ESTABLISHED\r\n<\/code><\/pre>\n<h2><strong>\u8fdb\u7a0b\u548c\u6587\u4ef6\u7cfb\u7edf\u76d1\u63a7<\/strong><\/h2>\n<p>\u6076\u610f\u8f6f\u4ef6\u5e38\u5e38\u5728\u8fdb\u7a0b\u884c\u4e3a\u548c\u6587\u4ef6\u7cfb\u7edf\u53d8\u5316\u4e2d\u7559\u4e0b\u75d5\u8ff9\u3002\u4ee5\u4e0b\u662f\u7cfb\u7edf\u5316\u7684\u68c0\u6d4b\u65b9\u6cd5\uff1a<\/p>\n<pre><code>\r\n# \u6309CPU\u4f7f\u7528\u7387\u6392\u5e8f\u5217\u51fa\u8fdb\u7a0b\r\nps aux --sort=-%cpu\r\n\r\n# \u68c0\u67e5\u6700\u8fd1\u4fee\u6539\u7684\u6587\u4ef6\r\nfind \/ -type f -mtime -1 -ls\r\n\r\n# \u5b9e\u65f6\u76d1\u63a7\u6587\u4ef6\u7cfb\u7edf\u53d8\u5316\r\ninotifywait -m -r \/var\/www\/ -e create,modify,delete\r\n<\/code><\/pre>\n<p>\u5165\u4fb5\u7684\u5173\u952e\u6307\u6807\u5305\u62ec\uff1a<\/p>\n<ul>\n<li>\u540d\u79f0\u968f\u673a\u5316\u7684\u8fdb\u7a0b<\/li>\n<li>\u610f\u5916\u7684\u8ba1\u5212\u4efb\u52a1\u6761\u76ee<\/li>\n<li>\u88ab\u4fee\u6539\u7684\u7cfb\u7edf\u4e8c\u8fdb\u5236\u6587\u4ef6<\/li>\n<li>\u5f02\u5e38\u4f4d\u7f6e\u7684\u9690\u85cf\u76ee\u5f55<\/li>\n<\/ul>\n<h2><strong>\u65e5\u5fd7\u5206\u6790\u548c\u5165\u4fb5\u68c0\u6d4b<\/strong><\/h2>\n<p>\u5728\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\uff0c\u6709\u6548\u7684\u65e5\u5fd7\u5206\u6790\u81f3\u5173\u91cd\u8981\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u57fa\u7840\u5165\u4fb5\u68c0\u6d4b\u7684bash\u811a\u672c\uff1a<\/p>\n<pre><code>\r\n#!\/bin\/bash\r\n# \u5feb\u901f\u5b89\u5168\u626b\u63cf\u811a\u672c\r\n\r\n# \u68c0\u67e5SSH\u5931\u8d25\u5c1d\u8bd5\r\necho \"SSH\u5931\u8d25\u5c1d\u8bd5:\"\r\ngrep \"Failed password\" \/var\/log\/auth.log | awk '{print $11}' | sort | uniq -c\r\n\r\n# \u76d1\u63a7\u53ef\u7591\u7684HTTP\u8bf7\u6c42\r\necho \"\u53ef\u7591HTTP\u8bf7\u6c42:\"\r\ngrep -i \"script\\|eval\\|base64\" \/var\/log\/apache2\/access.log\r\n\r\n# \u68c0\u67e5\u88ab\u4fee\u6539\u7684\u7cfb\u7edf\u6587\u4ef6\r\necho \"\u88ab\u4fee\u6539\u7684\u7cfb\u7edf\u4e8c\u8fdb\u5236\u6587\u4ef6:\"\r\nfind \/bin \/sbin \/usr\/bin \/usr\/sbin -type f -mtime -1\r\n<\/code><\/pre>\n<h2><strong>\u5b9e\u65f6\u76d1\u63a7\u8bbe\u7f6e<\/strong><\/h2>\n<p>\u4f7f\u7528\u73b0\u4ee3\u5de5\u5177\u5b9e\u73b0\u6301\u7eed\u76d1\u63a7\u3002\u4ee5\u4e0b\u662fPrometheus\u548cnode_exporter\u7684\u57fa\u672c\u914d\u7f6e\uff1a<\/p>\n<pre><code>\r\n# \u5b89\u88c5\u548c\u914d\u7f6enode_exporter\r\nwget https:\/\/github.com\/prometheus\/node_exporter\/releases\/download\/v1.3.1\/node_exporter-1.3.1.linux-amd64.tar.gz\r\ntar xvfz node_exporter-*.tar.gz\r\ncd node_exporter-*\r\n\r\n# \u521b\u5efasystemd\u670d\u52a1\r\ncat > \/etc\/systemd\/system\/node_exporter.service << EOF\r\n[Unit]\r\nDescription=Node Exporter\r\nAfter=network.target\r\n\r\n[Service]\r\nUser=node_exporter\r\nExecStart=\/usr\/local\/bin\/node_exporter\r\n\r\n[Install]\r\nWantedBy=multi-user.target\r\nEOF\r\n\r\nsystemctl daemon-reload\r\nsystemctl start node_exporter\r\n<\/code><\/pre>\n<p>\u5e38\u89c4\u76d1\u63a7\u5e94\u5305\u62ec\u901a\u8fc7\u53ef\u89c6\u5316\u5de5\u5177\u5206\u6790\u5173\u952e\u6307\u6807\u3002\u8fd9\u80fd\u591f\u5feb\u901f\u68c0\u6d4b\u7cfb\u7edf\u884c\u4e3a\u6a21\u5f0f\u4e2d\u7684\u5f02\u5e38\u3002<\/p>\n<h2><strong>\u81ea\u52a8\u5316\u5b89\u5168\u54cd\u5e94<\/strong><\/h2>\n<p>\u5b9e\u65bd\u81ea\u52a8\u5316\u54cd\u5e94\u53ef\u4ee5\u663e\u8457\u51cf\u5c11\u653b\u51fb\u9020\u6210\u7684\u635f\u5bb3\u3002\u4ee5\u4e0b\u662f\u4e00\u4e2a\u6f14\u793a\u57fa\u672c\u81ea\u52a8\u5316\u5b89\u5168\u63aa\u65bd\u7684Python\u811a\u672c\uff1a<\/p>\n<pre><code>\r\n#!\/usr\/bin\/python3\r\nimport subprocess\r\nimport re\r\nfrom datetime import datetime\r\n\r\ndef block_ip(ip):\r\n    cmd = f\"iptables -A INPUT -s {ip} -j DROP\"\r\n    subprocess.run(cmd.split())\r\n\r\ndef scan_auth_log():\r\n    failed_attempts = {}\r\n    with open('\/var\/log\/auth.log', 'r') as f:\r\n        for line in f:\r\n            if 'Failed password' in line:\r\n                ip = re.search(r'\\d+\\.\\d+\\.\\d+\\.\\d+', line)\r\n                if ip:\r\n                    ip = ip.group()\r\n                    failed_attempts[ip] = failed_attempts.get(ip, 0) + 1\r\n                    if failed_attempts[ip] >= 5:\r\n                        block_ip(ip)\r\n                        log_incident(ip)\r\n\r\ndef log_incident(ip):\r\n    with open('\/var\/log\/security_incidents.log', 'a') as f:\r\n        f.write(f\"{datetime.now()}: Blocked {ip} - Multiple failed login attempts\\n\")\r\n\r\nif __name__ == \"__main__\":\r\n    scan_auth_log()\r\n<\/code><\/pre>\n<h2><strong>\u7d27\u6025\u54cd\u5e94\u65b9\u6848<\/strong><\/h2>\n<p>\u5f53\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\u7684\u670d\u52a1\u5668\u906d\u5230\u5165\u4fb5\u65f6\uff0c\u8bf7\u9075\u5faa\u4ee5\u4e0b\u5173\u952e\u6b65\u9aa4\uff1a<\/p>\n<ol>\n<li>\u9694\u79bb\u53d7\u5f71\u54cd\u7684\u670d\u52a1\u5668\uff1a\n<pre><code>\r\n# \u963b\u6b62\u6240\u6709\u975e\u5fc5\u8981\u6d41\u91cf\r\niptables -P INPUT DROP\r\niptables -P FORWARD DROP\r\niptables -P OUTPUT DROP\r\n\r\n# \u4ec5\u5141\u8bb8\u60a8\u7684IP\r\niptables -A INPUT -s your_ip\/32 -j ACCEPT\r\niptables -A OUTPUT -d your_ip\/32 -j ACCEPT<\/code><\/pre>\n<\/li>\n<li>\u6355\u83b7\u7cfb\u7edf\u72b6\u6001\uff1a\n<pre><code>\r\n# \u521b\u5efa\u5185\u5b58\u8f6c\u50a8\r\ndd if=\/proc\/mem of=\/forensics\/memory-$(date +%Y%m%d).dump bs=1024\r\n\r\n# \u6355\u83b7\u8fd0\u884c\u4e2d\u7684\u8fdb\u7a0b\r\nps auxf > \/forensics\/processes-$(date +%Y%m%d).txt\r\n\r\n# \u5f52\u6863\u6240\u6709\u65e5\u5fd7\r\ntar czf \/forensics\/logs-$(date +%Y%m%d).tar.gz \/var\/log\/<\/code><\/pre>\n<\/li>\n<\/ol>\n<h2><strong>\u9884\u9632\u6027\u5b89\u5168\u63aa\u65bd<\/strong><\/h2>\n<p>\u5728\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\u5b9e\u65bd\u8fd9\u4e9b\u57fa\u672c\u7684\u5b89\u5168\u914d\u7f6e\uff1a<\/p>\n<pre><code>\r\n# \u914d\u7f6eSSH\u52a0\u56fa\r\ncat >> \/etc\/ssh\/sshd_config << EOF\r\nPermitRootLogin no\r\nPasswordAuthentication no\r\nMaxAuthTries 3\r\nProtocol 2\r\nX11Forwarding no\r\nAllowAgentForwarding no\r\nAllowTcpForwarding no\r\nEOF\r\n\r\n# \u8bbe\u7f6e\u81ea\u52a8\u5b89\u5168\u66f4\u65b0\r\napt install unattended-upgrades\r\ndpkg-reconfigure -plow unattended-upgrades\r\n\r\n# \u914d\u7f6e\u57fa\u672c\u9632\u706b\u5899\u89c4\u5219\r\nufw default deny incoming\r\nufw default allow outgoing\r\nufw allow ssh\r\nufw allow http\r\nufw allow https\r\nufw enable\r\n<\/code><\/pre>\n<p>\u5728\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\u7ef4\u62a4\u670d\u52a1\u5668\u5b89\u5168\u9700\u8981\u6301\u7eed\u7684\u8b66\u60d5\u548c\u5b9a\u671f\u7684\u5b89\u5168\u5ba1\u8ba1\u3002\u901a\u8fc7\u5b9e\u65bd\u8fd9\u4e9b\u76d1\u63a7\u5de5\u5177\u3001\u81ea\u52a8\u54cd\u5e94\u548c\u5b89\u5168\u534f\u8bae\uff0c\u7cfb\u7edf\u7ba1\u7406\u5458\u53ef\u4ee5\u663e\u8457\u964d\u4f4e\u6210\u529f\u653b\u51fb\u7684\u98ce\u9669\uff0c\u5e76\u80fd\u591f\u5feb\u901f\u54cd\u5e94\u6f5c\u5728\u7684\u5165\u4fb5\u3002<\/p>\n<h2><strong>\u6027\u80fd\u5f71\u54cd\u8003\u8651<\/strong><\/h2>\n<p>\u5728\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\u5b9e\u65bd\u5b89\u5168\u63aa\u65bd\u65f6\uff0c\u5e73\u8861\u4fdd\u62a4\u4e0e\u6027\u80fd\u81f3\u5173\u91cd\u8981\u3002\u4ee5\u4e0b\u662f\u8861\u91cf\u6027\u80fd\u5f71\u54cd\u7684\u57fa\u51c6\u6d4b\u8bd5\u811a\u672c\uff1a<\/p>\n<pre><code>\r\n#!\/bin\/bash\r\n# \u5b89\u5168\u76d1\u63a7\u6027\u80fd\u5f71\u54cd\u6d4b\u8bd5\r\n\r\n# \u57fa\u51c6\u6027\u80fd\u6d4b\u91cf\r\necho \"\u8fd0\u884c\u57fa\u51c6\u6d4b\u8bd5...\"\r\nsysbench cpu --cpu-max-prime=20000 run > baseline_cpu.log\r\nsysbench memory --memory-total-size=1G run > baseline_memory.log\r\n\r\n# \u542f\u52a8\u5b89\u5168\u76d1\u63a7\u5de5\u5177\r\n.\/security_monitor.sh &\r\nMONITOR_PID=$!\r\n\r\n# \u6d4b\u8bd5\u5e26\u76d1\u63a7\u65f6\u7684\u6027\u80fd\r\nsleep 30\r\necho \"\u8fd0\u884c\u5e26\u5b89\u5168\u76d1\u63a7\u7684\u6d4b\u8bd5...\"\r\nsysbench cpu --cpu-max-prime=20000 run > monitored_cpu.log\r\nsysbench memory --memory-total-size=1G run > monitored_memory.log\r\n\r\n# \u6bd4\u8f83\u7ed3\u679c\r\ndiff baseline_cpu.log monitored_cpu.log\r\ndiff baseline_memory.log monitored_memory.log\r\n\r\nkill $MONITOR_PID\r\n<\/code><\/pre>\n<h2><strong>\u9ad8\u7ea7\u6545\u969c\u6392\u67e5\u6280\u672f<\/strong><\/h2>\n<p>\u5bf9\u4e8e\u590d\u6742\u7684\u5b89\u5168\u4e8b\u4ef6\uff0c\u91c7\u7528\u8fd9\u4e9b\u9ad8\u7ea7\u8bca\u65ad\u65b9\u6cd5\uff1a<\/p>\n<pre><code>\r\n# \u8ffd\u8e2a\u53ef\u7591\u8fdb\u7a0b\u7684\u7cfb\u7edf\u8c03\u7528\r\nstrace -f -p $(pgrep suspicious_process)\r\n\r\n# \u76d1\u63a7\u6587\u4ef6\u7cfb\u7edf\u8bbf\u95ee\u6a21\u5f0f\r\nfatrace --current-mount --timestamp\r\n\r\n# \u5206\u6790\u7f51\u7edc\u5957\u63a5\u5b57\u7edf\u8ba1\r\nss -tunapeel\r\n\r\n# \u8ffd\u8e2a\u8fdb\u7a0b\u6811\u5173\u7cfb\r\npstree -p $(pgrep suspicious_process)\r\n<\/code><\/pre>\n<h2><strong>\u9762\u5411\u672a\u6765\u7684\u5b89\u5168\u7b56\u7565<\/strong><\/h2>\n<p>\u73b0\u4ee3\u670d\u52a1\u5668\u5b89\u5168\u9700\u8981\u9002\u5e94\u6027\u7b56\u7565\u3002\u5b9e\u65bd\u4ee5\u4e0b\u524d\u77bb\u6027\u63aa\u65bd\uff1a<\/p>\n<ul>\n<li>\u5173\u952e\u670d\u52a1\u7684\u5bb9\u5668\u9694\u79bb<\/li>\n<li>\u96f6\u4fe1\u4efb\u7f51\u7edc\u67b6\u6784<\/li>\n<li>\u57fa\u4e8e\u673a\u5668\u5b66\u4e60\u7684\u5f02\u5e38\u68c0\u6d4b<\/li>\n<li>\u5b9a\u671f\u6e17\u900f\u6d4b\u8bd5<\/li>\n<\/ul>\n<h2><strong>\u7ed3\u8bba<\/strong><\/h2>\n<p>\u5728\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\uff0c\u6709\u6548\u7684\u670d\u52a1\u5668\u5b89\u5168\u9700\u8981\u7efc\u5408\u65b9\u6cd5\uff0c\u7ed3\u5408\u4e3b\u52a8\u76d1\u63a7\u3001\u5feb\u901f\u54cd\u5e94\u80fd\u529b\u548c\u5bf9\u65b0\u5174\u5a01\u80c1\u7684\u6301\u7eed\u9002\u5e94\u3002\u901a\u8fc7\u5b9e\u65bd\u672c\u6307\u5357\u4e2d\u6982\u8ff0\u7684\u6280\u672f\u89e3\u51b3\u65b9\u6848\u548c\u534f\u8bae\uff0c\u7cfb\u7edf\u7ba1\u7406\u5458\u53ef\u4ee5\u6784\u5efa\u9488\u5bf9\u5404\u79cd\u653b\u51fb\u5411\u91cf\u7684\u5f3a\u5927\u9632\u5fa1\u673a\u5236\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528\u73af\u5883\u4e2d\uff0c\u670d\u52a1\u5668\u5b89\u5168\u9700\u8981\u6301\u7eed\u7684\u76d1\u63a7\u548c\u4e3b\u52a8\u7684\u5a01\u80c1\u68c0\u6d4b\u3002\u968f\u7740\u7f51\u7edc\u653b\u51fb\u624b\u6bb5\u65e5\u76ca\u590d\u6742\uff0c\u7cfb\u7edf\u7ba1\u7406\u5458\u9700\u8981\u5f3a\u5927\u7684\u5de5\u5177\u548c\u65b9\u6cd5\u6765\u53ca\u65e9\u8bc6\u522b\u6f5c\u5728\u7684\u5b89\u5168\u9690\u60a3\u3002\u672c\u6280\u672f\u6307\u5357\u6df1\u5165\u63a2\u8ba8\u4e86\u68c0\u6d4b\u670d\u52a1\u5668\u611f\u67d3\u548c\u6076\u610f\u6d3b\u52a8\u7684\u5b9e\u7528\u65b9\u6cd5\u3002 \u7406\u89e3\u7cfb\u7edf\u5f02\u5e38 \u670d\u52a1\u5668\u906d\u53d7\u653b\u51fb\u7684\u9996\u8981\u8ff9\u8c61\u901a\u5e38\u8868\u73b0\u5728\u7cfb\u7edf\u6027\u80fd\u6307\u6807\u4e0a\u3002\u8ba9\u6211\u4eec\u7528\u5e38\u7528\u7684Linux\u547d\u4ee4\u6765\u68c0\u67e5\u5173\u952e\u53c2\u6570\uff1a # \u68c0\u67e5CPU\u4f7f\u7528\u7387 top -b -n 1 # \u76d1\u63a7\u7cfb\u7edf\u8d1f\u8f7d\u5e73\u5747\u503c uptime # \u8ddf\u8e2a\u5185\u5b58\u4f7f\u7528\u60c5\u51b5 free -m # \u76d1\u63a7\u78c1\u76d8I\/O iostat -x 1 \u53ef\u7591\u7684\u6a21\u5f0f\u901a\u5e38\u5305\u62ec\uff1a \u6ca1\u6709\u5bf9\u5e94\u5408\u6cd5\u8fdb\u7a0b\u7684CPU\u4f7f\u7528\u7387\u7a81\u589e \u5f02\u5e38\u7684\u5185\u5b58\u6d88\u8017\u6a21\u5f0f \u610f\u5916\u7684\u78c1\u76d8I\/O\u6d3b\u52a8 \u7f51\u7edc\u63a5\u53e3\u9971\u548c \u7f51\u7edc\u6d41\u91cf\u5206\u6790 \u76d1\u63a7\u7f51\u7edc\u6a21\u5f0f\u6709\u52a9\u4e8e\u8bc6\u522b\u6f5c\u5728\u7684\u5165\u4fb5\u3002\u4ee5\u4e0b\u662f\u4f7f\u7528tcpdump\u7684\u5b9e\u7528\u65b9\u6cd5\uff1a # \u76d1\u63a7\u53ef\u7591\u7684\u7f51\u7edc\u8fde\u63a5 tcpdump -i any &#8216;tcp[tcpflags] &#038; (tcp-syn) != 0&#8217; # \u68c0\u67e5\u5df2\u5efa\u7acb\u7684\u8fde\u63a5 netstat -tunapel | grep ESTABLISHED \u8fdb\u7a0b\u548c\u6587\u4ef6\u7cfb\u7edf\u76d1\u63a7 \u6076\u610f\u8f6f\u4ef6\u5e38\u5e38\u5728\u8fdb\u7a0b\u884c\u4e3a\u548c\u6587\u4ef6\u7cfb\u7edf\u53d8\u5316\u4e2d\u7559\u4e0b\u75d5\u8ff9\u3002\u4ee5\u4e0b\u662f\u7cfb\u7edf\u5316\u7684\u68c0\u6d4b\u65b9\u6cd5\uff1a # \u6309CPU\u4f7f\u7528\u7387\u6392\u5e8f\u5217\u51fa\u8fdb\u7a0b ps aux &#8211;sort=-%cpu # \u68c0\u67e5\u6700\u8fd1\u4fee\u6539\u7684\u6587\u4ef6 find [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":3,"featured_media":22390,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4816],"tags":[6554,6555,5048,5003,2080],"class_list":["post-22402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-america-dedicated-server-sc","tag-virus-detection-sc","tag-system-monitoring-sc","tag-5048","tag-server-hosting-la-sc","tag-network-attacks-sc"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f<\/title>\n<meta name=\"description\" content=\"\u5b66\u4e60\u68c0\u6d4b\u670d\u52a1\u5668\u53d7\u635f\u7684\u9ad8\u7ea7\u6280\u672f\uff0c\u4ece\u7cfb\u7edf\u65e5\u5fd7\u5206\u6790\u5230\u7f51\u7edc\u6a21\u5f0f\u76d1\u63a7\u3002\u5305\u542b\u7cfb\u7edf\u7ba1\u7406\u5458\u5b9e\u7528\u7684\u4ee3\u7801\u793a\u4f8b\u3002\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"company\" \/>\n<meta property=\"og:title\" content=\"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402\" \/>\n<meta property=\"og:site_name\" content=\"\u65b0\u5929\u57df\u4e92\u8054\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-05T03:48:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-05T03:52:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.simcentric.com\/wp-content\/uploads\/2025\/02\/sim_0205a.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"353\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f","description":"\u5b66\u4e60\u68c0\u6d4b\u670d\u52a1\u5668\u53d7\u635f\u7684\u9ad8\u7ea7\u6280\u672f\uff0c\u4ece\u7cfb\u7edf\u65e5\u5fd7\u5206\u6790\u5230\u7f51\u7edc\u6a21\u5f0f\u76d1\u63a7\u3002\u5305\u542b\u7cfb\u7edf\u7ba1\u7406\u5458\u5b9e\u7528\u7684\u4ee3\u7801\u793a\u4f8b\u3002","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402","og_locale":"zh_CN","og_type":"company","og_title":"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f","og_url":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402","og_site_name":"\u65b0\u5929\u57df\u4e92\u8054","article_published_time":"2025-02-05T03:48:39+00:00","article_modified_time":"2025-02-05T03:52:08+00:00","og_image":[{"width":620,"height":353,"url":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2025\/02\/sim_0205a.jpg","type":"image\/jpeg"}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#article","isPartOf":{"@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/"},"author":{"name":"Felix Cheung","@id":"https:\/\/simcentric.com\/tc\/#\/schema\/person\/2865b3454f789caf7083a203799d4a6d"},"headline":"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f","datePublished":"2025-02-05T03:48:39+00:00","dateModified":"2025-02-05T03:52:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/"},"wordCount":10,"publisher":{"@id":"https:\/\/simcentric.com\/tc\/#organization"},"image":{"@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2025\/02\/sim_0205a.jpg","keywords":["\u75c5\u6bd2\u68c0\u6d4b","\u7cfb\u7edf\u76d1\u63a7","\u670d\u52a1\u5668\u5b89\u5168","\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u79df\u7528","\u7f51\u7edc\u653b\u51fb"],"articleSection":["\u7f8e\u56fd\u670d\u52a1\u5668"],"inLanguage":"zh-CHN"},{"@type":"WebPage","@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/","url":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/","name":"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f","isPartOf":{"@id":"https:\/\/simcentric.com\/tc\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#primaryimage"},"image":{"@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2025\/02\/sim_0205a.jpg","datePublished":"2025-02-05T03:48:39+00:00","dateModified":"2025-02-05T03:52:08+00:00","description":"\u5b66\u4e60\u68c0\u6d4b\u670d\u52a1\u5668\u53d7\u635f\u7684\u9ad8\u7ea7\u6280\u672f\uff0c\u4ece\u7cfb\u7edf\u65e5\u5fd7\u5206\u6790\u5230\u7f51\u7edc\u6a21\u5f0f\u76d1\u63a7\u3002\u5305\u542b\u7cfb\u7edf\u7ba1\u7406\u5458\u5b9e\u7528\u7684\u4ee3\u7801\u793a\u4f8b\u3002","breadcrumb":{"@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#breadcrumb"},"inLanguage":"zh-CHN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/"]}]},{"@type":"ImageObject","inLanguage":"zh-CHN","@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#primaryimage","url":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2025\/02\/sim_0205a.jpg","contentUrl":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2025\/02\/sim_0205a.jpg","width":620,"height":353},{"@type":"BreadcrumbList","@id":"https:\/\/www.simcentric.com\/sc\/america-dedicated-server-sc\/how-to-detect-virus-infections-and-attacks-on-la-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.simcentric.com\/sc\/"},{"@type":"ListItem","position":2,"name":"\u5982\u4f55\u68c0\u6d4b\u6d1b\u6749\u77f6\u670d\u52a1\u5668\u662f\u5426\u611f\u67d3\u75c5\u6bd2\u6216\u906d\u53d7\u653b\u51fb\uff1f"}]},{"@type":"WebSite","@id":"https:\/\/simcentric.com\/tc\/#website","url":"https:\/\/simcentric.com\/tc\/","name":"Simcentric Solutions","description":"","publisher":{"@id":"https:\/\/simcentric.com\/tc\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/simcentric.com\/tc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CHN"},{"@type":"Organization","@id":"https:\/\/simcentric.com\/tc\/#organization","name":"Simcentric Solutions","url":"https:\/\/simcentric.com\/tc\/","logo":{"@type":"ImageObject","inLanguage":"zh-CHN","@id":"https:\/\/simcentric.com\/tc\/#\/schema\/logo\/image\/","url":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2023\/06\/sim-logo-2023.png","contentUrl":"https:\/\/www.simcentric.com\/wp-content\/uploads\/2023\/06\/sim-logo-2023.png","width":800,"height":222,"caption":"Simcentric Solutions"},"image":{"@id":"https:\/\/simcentric.com\/tc\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/simcentric.com\/tc\/#\/schema\/person\/2865b3454f789caf7083a203799d4a6d","name":"Felix Cheung","image":{"@type":"ImageObject","inLanguage":"zh-CHN","@id":"https:\/\/secure.gravatar.com\/avatar\/836e6f2be80c47f0897198ffea03fae331dad9aaafbc988c752691eb595e0e2f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/836e6f2be80c47f0897198ffea03fae331dad9aaafbc988c752691eb595e0e2f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/836e6f2be80c47f0897198ffea03fae331dad9aaafbc988c752691eb595e0e2f?s=96&d=mm&r=g","caption":"Felix Cheung"}}]}},"_links":{"self":[{"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/comments?post=22402"}],"version-history":[{"count":1,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402\/revisions"}],"predecessor-version":[{"id":22404,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/posts\/22402\/revisions\/22404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/media\/22390"}],"wp:attachment":[{"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/media?parent=22402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/categories?post=22402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.simcentric.com\/sc\/wp-json\/wp\/v2\/tags?post=22402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}