1 2 root@datacon-winterc:~/quickstart# cat /etc/nginx/nginx.conf | grep access_log access_log /var/log/nginx/access.log; #nginx访问日志文件 1 2 grep wp-admin /var/log/nginx/access.log | cat -n #查看日志中含wp-admin(wordpress后台)的内容 1 2 3 1 162.158.182.84 - - [05/Feb/2026:00:05:25 +0800] "GET /wordpress/wp-admin/setup-config.php HTTP/1.1" 404 134 "-" "https://alexsun.one/wordpress/wp-admin/setup-config.php" ...... 73 172.71.184.188 - - [05/Feb/2026:10:49:11 +0800] "GET /wp-admin/setup-config.php HTTP/1.1" 444 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/144.0.0.0 Safari/537.36" 我的站点上并没有安装WordPress,以上73条访问日志来自于恶意扫描1 用nginx的location可以配置路由,实现对恶意扫描的处理:
1 2 3 location [modifier] [URI] { } 下面下面是 Nginx 中 location 指令最常用的几种匹配方式(modifier)的语法总结,以表格形式呈现,便于对照和记忆。
...