搜狗截图20190913010916.png

1:选择日志 ,然后打开
2.运行SQL语句或者说运行脚本
3.存储脚本或者SQL语句到LPS程序
4.导出.CSV类型查询的结果
5.解锁小按钮。在重新写SQL语句时,需要解锁小按钮,方可操作
6.选择日志的类型。一般默认都是图中IISW3CLOG
7.在此处编写SQL语句

分享几个比较好用的SQL语句脚本:

防采集:统计访问.html的IP数:

select c-ip, count(c-ip) as requestcount from '[LOGFILEPATH]' where c-ip not like '%203.208.60.%' and c-ip not like '%220.181.125.149%' and cs(User-Agent) not like '%+MJ12bot/v1.4.8;%' and  cs-uri-stem like '%.html%' group by c-ip order by count(c-ip) desc

这句话的意思:去除203.208.60.*可以确定的谷歌蜘蛛;去除220.181.125.149可以确定的搜狗蜘蛛;去除+MJ12bot/v1.4.8;这个国外关于统计外链的蜘蛛类型。
然后统计剩下的访问.html的IP数,一般采集人,会在一分钟内大量访问很多html页面,这不符合正常访客的行为,这时候我们就能看到异常IP

采集:统计单个IP访问.html的详情

select c-ip,cs-uri-stem,sc-status,time,cs(User-Agent) from '[LOGFILEPATH]' where c-ip='124.225.168.19' and cs-uri-stem like '%.html%'

可以清楚的看到异常IP访问的所有.html页面

扫描IP:统计POST的IP次数

select c-ip, count(c-ip) as requestcount from '[LOGFILEPATH]' where  cs-method='POST' group by c-ip order by count(c-ip) desc

统计黑客人员利用扫描工具进行漏洞POST请求注入

扫描IP:单个IP的post详情

select c-ip,cs-uri-stem,sc-status,time,cs(User-Agent) from '[LOGFILEPATH]' where c-ip='113.121.44.120' 

统计百度蜘蛛

SELECT time,c-ip,cs-method,cs-uri-stem,s-port,sc-status,cs(User-Agent),time-taken FROM '[LOGFILEPATH]' where cs(User-Agent) like '%Baiduspider%'

统计搜狗蜘蛛

SELECT time,c-ip,cs-method,cs-uri-stem,s-port,sc-status,cs(User-Agent),time-taken FROM '[LOGFILEPATH]' where cs(User-Agent) like '%Sogou.com%'

统计神马蜘蛛

SELECT time,c-ip,cs-method,cs-uri-stem,s-port,sc-status,cs(User-Agent),time-taken FROM '[LOGFILEPATH]' where cs(User-Agent) like '%YisouSpider%'

统计360蜘蛛

SELECT time,c-ip,cs-method,cs-uri-stem,s-port,sc-status,cs(User-Agent),time-taken FROM '[LOGFILEPATH]' where cs(User-Agent) like '%360Spider%'

统计谷歌蜘蛛

SELECT time,c-ip,cs-method,cs-uri-stem,s-port,sc-status,cs(User-Agent),time-taken FROM '[LOGFILEPATH]' where cs(User-Agent) like '%Googlebot%'
Last modification:July 22nd, 2021 at 05:19 pm
如果觉得我的文章对你有用,请随意赞赏