Proxy Attack Summaries 2015/07/01 thru 2015/07/31

Sorted by Source Network Range
Sorted by Total Connections From Source Network
Sorted by Source Country
Sorted by Total Connections From Source Country
Counts by fetch target URL.
Counts by fetch target URL - sorted by URL in rev. domain order.

Sorted by Source Network Range


Source Network Registered owner Local Target IP or range Target Ports
5.34.60.117 - 5.34.60.117 undefined ?? attacked MULTIPLE-IPs for ports 25x23 993x12 53x15 80x22 23x24 6000x5 465x5 114
49.144.0.0 - 49.151.255.255 IPG PH attacked MULTIPLE-IPs for ports 80x67 114x3
52.0.0.0 - 52.31.255.255 Amazon Technologies Inc. Seattle, WA, US attacked 132.235.1.249 for ports 80
58.17.0.0 - 58.17.127.255 China Unicom Jiangxi province network China Unicom CNC Group CHINA169 Jiangxi Province Network CN attacked MULTIPLE-IPs for ports 79x3 514 513 975 23x3 111x3 21x3 25x2 114 587 53 37 995 993
60.166.0.0 - 60.175.255.255 CHINANET anhui province network China Telecom A12,Xin-Jie-Kou-Wai Street CN attacked MULTIPLE-IPs for ports 21x3 3306x2 25 993 80
63.141.251.224 - 63.141.251.239 Fbivps North Kansas City, MO, US attacked MULTIPLE-IPs for ports 80x5
66.241.160.0 - 66.241.191.255 HUNTEL.NET Blair, NE, US attacked MULTIPLE-IPS for ports 80x11
74.91.16.0 - 74.91.31.255 undefined ?? attacked MULTIPLE-IPs for ports 80x628 21x14 993x19 3306x14 25x9 53x8 23x12 465 6000
104.143.32.0 - 104.143.47.255 KLAYER Fremont, CA, US attacked 132.235.1.249 for ports 25x2
106.128.0.0 - 106.191.255.255 KDDI CORPORATION GARDEN AIR TOWER,3-10-10,Iidabashi,Chiyoda-ku,Tokyo JP attacked MULTIPLE-IPs for ports 80x3 993x3 3306x3 21 25x4
107.191.46.0 - 107.191.47.255 Vultr Holdings, LLC AUBERVILLIERS , , FR attacked MULTIPLE-IPs for ports 80x60 114x15 21x15
108.59.0.0 - 108.59.15.255 undefined ?? attacked MULTIPLE-IPs for ports 80x6 21 114
112.224.0.0 - 112.255.255.255 China Unicom Shandong province network China Unicom CN attacked MULTIPLE-IPs for ports 80x5 114
113.53.0.0 - 113.53.255.255 TOT Public Company Limited 89/2 Moo 3, Chaengwattana Rd, Tungsonghong, Laksi, Bangkok TH attacked MULTIPLE-IPS for ports 80x11
114.215.0.0 - 114.215.255.255 Aliyun Computing Co., LTD 5F, Builing D, the West Lake International Plaza of S&T CN attacked 132.235.1.11 for ports 3306x2
118.173.112.0 - 118.173.112.255 TOT Public Company Limited Bangkok TH attacked MULTIPLE-IPS for ports 80x11
118.248.0.0 - 118.255.255.255 CHINANET Hunan province network China Telecom No.31,jingrong street CN attacked 132.235.1.2 for ports 80
119.94.96.0 - 119.94.127.255 PLDT_CDOHME60i01_DHCP PH attacked MULTIPLE-IPs for ports 80x75 114x2
121.32.0.0 - 121.35.255.255 CHINANET Guangdong province network China Telecom No.31,jingrong street Beijing 100032 CN attacked MULTIPLE-IPS for ports 80x2
123.184.0.0 - 123.187.255.255 CHINANET liaoning province network China Telecom No.6,Feiyun Road,Hunnan New District CN attacked MULTIPLE-IPS for ports 80x7
124.73.0.0 - 124.73.255.255 CHINANET anhui province network China Telecom A12,Xin-Jie-Kou-Wai Street Beijing 100088 CN attacked 132.235.1.249 for ports 25
124.83.0.0 - 124.83.127.255 IPG PH attacked MULTIPLE-IPS for ports 80x11
125.26.24.0 - 125.26.24.255 TOT Public Company Limited Bangkok TH attacked MULTIPLE-IPS for ports 80x10
125.27.0.0 - 125.27.0.255 undefined ?? attacked MULTIPLE-IPS for ports 80x38
142.54.165.136 - 142.54.165.143 undefined ?? attacked MULTIPLE-IPs for ports 80x49
162.243.0.0 - 162.243.255.255 Digital Ocean, Inc. New York, NY, US attacked MULTIPLE-IPs for ports 80 993 3306 21 25x4
175.16.0.0 - 175.23.255.255 undefined ?? attacked MULTIPLE-IPs for ports 80x8 114 21
177.72.56/21 DF LINK TELECOM COMERCIO E SERVIÇOS DE COMUNICAÇÃO BR attacked MULTIPLE-IPS for ports 80x11
177.128.140/22 Crvnet Comunicações Junqueira e Guimarães ltda BR attacked MULTIPLE-IPS for ports 80x11
177.184.144/21 INFOWAY COMERCIO DE INFORM E TELECOMUNICACOES LTDA BR attacked MULTIPLE-IPS for ports 80x11
180.96.0.0 - 180.127.255.255 Chinanet Jiangsu Province Network China Telecom No.31,jingrong street CN attacked MULTIPLE-IPs for ports 80x12
180.234.128.0 - 180.234.143.255 undefined ?? attacked MULTIPLE-IPs for ports 80x2 53
186.116/14 COLOMBIA TELECOMUNICACIONES S.A. ESP Transversal 60, 114, A 55 N - BOGOTA - Cu Transversal 60, 114 A, 55 571111 - BOGOTA DC - CU Transversal, 60, 114 A, 55 CO attacked MULTIPLE-IPS for ports 80x11
187.120.144/20 undefined ?? attacked MULTIPLE-IPs for ports 80x30
190.107.248/21 Eutel N.V. Van Toningen Weg Z/N, 1, 0 -- - ST. EUSTATIUS - -- Vantonningen weg z/n, none, BQ attacked MULTIPLE-IPS for ports 80x11
192.241.128.0 - 192.241.255.255 Digital Ocean, Inc. New York, NY, US attacked MULTIPLE-IPs for ports 25x11 3306x4 21x4 993x3 80x3
198.154.60.0 - 198.154.63.255 Fortacloud Doral, FL, US attacked 132.235.1.1 for ports 80
198.245.48.0 - 198.245.63.255 OVH Hosting, Inc. Montreal, QC, CA attacked 132.235.3.155 for ports 80x2
200.185.192/19 BITCOM PROVEDOR DE SERVICOS DE INTERNET LTDA BR attacked MULTIPLE-IPS for ports 80x11
208.90.152.0 - 208.90.155.255 Techie Hosting, Inc. Newark, NJ, US attacked MULTIPLE-IPs for ports 80x2
211.8.0.0 - 211.19.255.255 undefined ?? attacked MULTIPLE-IPs for ports 80x15 21x3 114x3 25x4 993x2 53x2 23x4 6000 465
221.4.169.128 - 221.4.169.255 xinxizhongxing, Foshan, Guangdong province CN attacked MULTIPLE-IPs for ports 80x4 114
223.27.32.0 - 223.27.63.255 PUMO NETWORK DIGITAL TECHNOLOGY CO.,LTD 13F.-1, No.716, Zhongzheng Rd., Zhonghe City TW attacked MULTIPLE-IPs for ports 3306x2 993x2 21x3 25x4
223.240.0.0 - 223.247.255.255 CHINANET Anhui province network Data Communication Division CN attacked 132.235.1.249 for ports 25

Sorted By Total Connections From Source Network

Count Source Network Registered Owner Local Target IP or Range Target Ports
1 52.0.0.0 - 52.31.255.255 Amazon Technologies Inc. Seattle, WA, US attacked 132.235.1.249 for ports 80
1 118.248.0.0 - 118.255.255.255 CHINANET Hunan province network China Telecom No.31,jingrong street CN attacked 132.235.1.2 for ports 80
1 124.73.0.0 - 124.73.255.255 CHINANET anhui province network China Telecom A12,Xin-Jie-Kou-Wai Street Beijing 100088 CN attacked 132.235.1.249 for ports 25
1 198.154.60.0 - 198.154.63.255 Fortacloud Doral, FL, US attacked 132.235.1.1 for ports 80
1 223.240.0.0 - 223.247.255.255 CHINANET Anhui province network Data Communication Division CN attacked 132.235.1.249 for ports 25
2 104.143.32.0 - 104.143.47.255 KLAYER Fremont, CA, US attacked 132.235.1.249 for ports 25x2
2 114.215.0.0 - 114.215.255.255 Aliyun Computing Co., LTD 5F, Builing D, the West Lake International Plaza of S&T CN attacked 132.235.1.11 for ports 3306x2
2 121.32.0.0 - 121.35.255.255 CHINANET Guangdong province network China Telecom No.31,jingrong street Beijing 100032 CN attacked MULTIPLE-IPS for ports 80x2
2 198.245.48.0 - 198.245.63.255 OVH Hosting, Inc. Montreal, QC, CA attacked 132.235.3.155 for ports 80x2
2 208.90.152.0 - 208.90.155.255 Techie Hosting, Inc. Newark, NJ, US attacked MULTIPLE-IPs for ports 80x2
3 180.234.128.0 - 180.234.143.255 undefined ?? attacked MULTIPLE-IPs for ports 80x2 53
5 63.141.251.224 - 63.141.251.239 Fbivps North Kansas City, MO, US attacked MULTIPLE-IPs for ports 80x5
5 221.4.169.128 - 221.4.169.255 xinxizhongxing, Foshan, Guangdong province CN attacked MULTIPLE-IPs for ports 80x4 114
6 112.224.0.0 - 112.255.255.255 China Unicom Shandong province network China Unicom CN attacked MULTIPLE-IPs for ports 80x5 114
7 123.184.0.0 - 123.187.255.255 CHINANET liaoning province network China Telecom No.6,Feiyun Road,Hunnan New District CN attacked MULTIPLE-IPS for ports 80x7
8 60.166.0.0 - 60.175.255.255 CHINANET anhui province network China Telecom A12,Xin-Jie-Kou-Wai Street CN attacked MULTIPLE-IPs for ports 21x3 3306x2 25 993 80
8 108.59.0.0 - 108.59.15.255 undefined ?? attacked MULTIPLE-IPs for ports 80x6 21 114
8 162.243.0.0 - 162.243.255.255 Digital Ocean, Inc. New York, NY, US attacked MULTIPLE-IPs for ports 80 993 3306 21 25x4
10 125.26.24.0 - 125.26.24.255 TOT Public Company Limited Bangkok TH attacked MULTIPLE-IPS for ports 80x10
10 175.16.0.0 - 175.23.255.255 undefined ?? attacked MULTIPLE-IPs for ports 80x8 114 21
11 66.241.160.0 - 66.241.191.255 HUNTEL.NET Blair, NE, US attacked MULTIPLE-IPS for ports 80x11
11 113.53.0.0 - 113.53.255.255 TOT Public Company Limited 89/2 Moo 3, Chaengwattana Rd, Tungsonghong, Laksi, Bangkok TH attacked MULTIPLE-IPS for ports 80x11
11 118.173.112.0 - 118.173.112.255 TOT Public Company Limited Bangkok TH attacked MULTIPLE-IPS for ports 80x11
11 124.83.0.0 - 124.83.127.255 IPG PH attacked MULTIPLE-IPS for ports 80x11
11 177.72.56/21 DF LINK TELECOM COMERCIO E SERVIÇOS DE COMUNICAÇÃO BR attacked MULTIPLE-IPS for ports 80x11
11 177.128.140/22 Crvnet Comunicações Junqueira e Guimarães ltda BR attacked MULTIPLE-IPS for ports 80x11
11 177.184.144/21 INFOWAY COMERCIO DE INFORM E TELECOMUNICACOES LTDA BR attacked MULTIPLE-IPS for ports 80x11
11 186.116/14 COLOMBIA TELECOMUNICACIONES S.A. ESP Transversal 60, 114, A 55 N - BOGOTA - Cu Transversal 60, 114 A, 55 571111 - BOGOTA DC - CU Transversal, 60, 114 A, 55 CO attacked MULTIPLE-IPS for ports 80x11
11 190.107.248/21 Eutel N.V. Van Toningen Weg Z/N, 1, 0 -- - ST. EUSTATIUS - -- Vantonningen weg z/n, none, BQ attacked MULTIPLE-IPS for ports 80x11
11 200.185.192/19 BITCOM PROVEDOR DE SERVICOS DE INTERNET LTDA BR attacked MULTIPLE-IPS for ports 80x11
11 223.27.32.0 - 223.27.63.255 PUMO NETWORK DIGITAL TECHNOLOGY CO.,LTD 13F.-1, No.716, Zhongzheng Rd., Zhonghe City TW attacked MULTIPLE-IPs for ports 3306x2 993x2 21x3 25x4
12 180.96.0.0 - 180.127.255.255 Chinanet Jiangsu Province Network China Telecom No.31,jingrong street CN attacked MULTIPLE-IPs for ports 80x12
14 106.128.0.0 - 106.191.255.255 KDDI CORPORATION GARDEN AIR TOWER,3-10-10,Iidabashi,Chiyoda-ku,Tokyo JP attacked MULTIPLE-IPs for ports 80x3 993x3 3306x3 21 25x4
23 58.17.0.0 - 58.17.127.255 China Unicom Jiangxi province network China Unicom CNC Group CHINA169 Jiangxi Province Network CN attacked MULTIPLE-IPs for ports 79x3 514 513 975 23x3 111x3 21x3 25x2 114 587 53 37 995 993
25 192.241.128.0 - 192.241.255.255 Digital Ocean, Inc. New York, NY, US attacked MULTIPLE-IPs for ports 25x11 3306x4 21x4 993x3 80x3
30 187.120.144/20 undefined ?? attacked MULTIPLE-IPs for ports 80x30
35 211.8.0.0 - 211.19.255.255 undefined ?? attacked MULTIPLE-IPs for ports 80x15 21x3 114x3 25x4 993x2 53x2 23x4 6000 465
38 125.27.0.0 - 125.27.0.255 undefined ?? attacked MULTIPLE-IPS for ports 80x38
49 142.54.165.136 - 142.54.165.143 undefined ?? attacked MULTIPLE-IPs for ports 80x49
70 49.144.0.0 - 49.151.255.255 IPG PH attacked MULTIPLE-IPs for ports 80x67 114x3
77 119.94.96.0 - 119.94.127.255 PLDT_CDOHME60i01_DHCP PH attacked MULTIPLE-IPs for ports 80x75 114x2
90 107.191.46.0 - 107.191.47.255 Vultr Holdings, LLC AUBERVILLIERS , , FR attacked MULTIPLE-IPs for ports 80x60 114x15 21x15
107 5.34.60.117 - 5.34.60.117 undefined ?? attacked MULTIPLE-IPs for ports 25x23 993x12 53x15 80x22 23x24 6000x5 465x5 114
706 74.91.16.0 - 74.91.31.255 undefined ?? attacked MULTIPLE-IPs for ports 80x628 21x14 993x19 3306x14 25x9 53x8 23x12 465 6000

Summarized By Source Country

Source Country Local Target IP or Range Target Ports
?? attacked MULTIPLE-IPs for ports 25x36 993x33 53x26 80x759 23x40 6000x7 465x7 114x5 21x19 3306x14
BD attacked MULTIPLE-IPS for ports 80x2
BQ attacked MULTIPLE-IPS for ports 80x11
BR attacked MULTIPLE-IPS for ports 80x55
CA attacked 132.235.3.155 for ports 80x2
CN attacked MULTIPLE-IPs for ports 79x3 514 513 975 23x3 111x3 21x6 25x5 114x4 587 53 37 995 993x2 3306x4 80x40
CO attacked MULTIPLE-IPS for ports 80x11
FR attacked MULTIPLE-IPs for ports 80x60 114x15 21x15
JP attacked MULTIPLE-IPs for ports 80x4 993x3 3306x3 21 25x4
PH attacked MULTIPLE-IPs for ports 80x153 114x5
TH attacked MULTIPLE-IPS for ports 80x43
TW attacked MULTIPLE-IPs for ports 3306x2 993x2 21x3 25x4
US attacked MULTIPLE-IPs for ports 80x30 25x17 993x4 3306x5 21x5

Summarized By Source Country

Total Connection Counts Source Country Local Target IP or Range Target Ports
2 BD attacked MULTIPLE-IPS for ports 80x2
2 CA attacked 132.235.3.155 for ports 80x2
11 BQ attacked MULTIPLE-IPS for ports 80x11
11 CO attacked MULTIPLE-IPS for ports 80x11
11 TW attacked MULTIPLE-IPs for ports 3306x2 993x2 21x3 25x4
15 JP attacked MULTIPLE-IPs for ports 80x4 993x3 3306x3 21 25x4
43 TH attacked MULTIPLE-IPS for ports 80x43
55 BR attacked MULTIPLE-IPS for ports 80x55
61 US attacked MULTIPLE-IPs for ports 80x30 25x17 993x4 3306x5 21x5
77 CN attacked MULTIPLE-IPs for ports 79x3 514 513 975 23x3 111x3 21x6 25x5 114x4 587 53 37 995 993x2 3306x4 80x40
90 FR attacked MULTIPLE-IPs for ports 80x60 114x15 21x15
158 PH attacked MULTIPLE-IPs for ports 80x153 114x5
946 ?? attacked MULTIPLE-IPs for ports 25x36 993x33 53x26 80x759 23x40 6000x7 465x7 114x5 21x19 3306x14

Summarized By Target URL to Fetch - sorted by attempts made

Count Target host name GET/PUT/etc Target URL to Fetch
1 -c POST //%63%67%69%2D%62%69%6E/%70%68%70?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%6
1 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDY%40Z%5DV
1 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZZ
1 afrenchholiday.com GET /
1 alexanderlions.org GET /wp-content/plugins/reflex-gallery/readme.txt
1 impuls.name GET http://impuls.name/pgpro/getheaders0.php?test=1d6bfc948757fcf12368fe2cee94e5d8&auth=1046B831B00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders0.php?test=f16c4a32613c47f01f3a8ee553ad25ee&auth=1046B817900EA
1 impuls.name GET http://impuls.name/pgpro/getheaders1.php?test=67de92a855f12b183d02c72a076f1997&auth=1046B831B00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders1.php?test=819f859ffd589ba6f7fe97195eafbb18&auth=1046B8281008D
1 impuls.name GET http://impuls.name/pgpro/getheaders2.php?test=26cf00e0fd16fe80e2899e8698bfea49&auth=1046B817900EA
1 impuls.name GET http://impuls.name/pgpro/getheaders2.php?test=5a29fa99606239912c6aa52a111aa3ab&auth=1046B817900AF
1 impuls.name GET http://impuls.name/pgpro/getheaders2.php?test=b19bd6d7d8c3d1ba711600b2ab803fe2&auth=1046B8281008D
1 impuls.name GET http://impuls.name/pgpro/getheaders2.php?test=d194a7704298ed01d8a3e438e24ad818&auth=1046B831B00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders3.php?test=31c8f6c006d298bc53f2d716d443ea1c&auth=1046B817900AF
1 impuls.name GET http://impuls.name/pgpro/getheaders3.php?test=e92e15c977ef27539b2dbc687faf2d92&auth=1046B817900EA
1 impuls.name GET http://impuls.name/pgpro/getheaders4.php?test=7f6db8f0bc065463ec041517dd947c42&auth=1046B8281008D
1 impuls.name GET http://impuls.name/pgpro/getheaders4.php?test=f448582a3f2742d14124bca1f69b66a4&auth=1046B818100AF
1 impuls.name GET http://impuls.name/pgpro/getheaders5.php?test=808dddf3a63f924d3fdd597dcefdbdab&auth=1046B818100AF
1 impuls.name GET http://impuls.name/pgpro/getheaders5.php?test=95c564fea1097fcd9b62057f04d561cf&auth=1046B817900EA
1 impuls.name GET http://impuls.name/pgpro/getheaders5.php?test=a31137c2caf2ea93889f47ab5aa08f53&auth=1046B831D00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders5.php?test=bcad5bf1544b216786fee243be9c74c9&auth=1046B818100AF
1 impuls.name GET http://impuls.name/pgpro/getheaders7.php?test=539f612bdc9ff261eebff541e681ca62&auth=1046B831D00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders7.php?test=95b7abf6a37c7977a8473c87c0b39beb&auth=1046B818100AF
1 impuls.name GET http://impuls.name/pgpro/getheaders8.php?test=07fa85da83b7fe2299b5825afbe109f1&auth=1046B817900AF
1 impuls.name GET http://impuls.name/pgpro/getheaders8.php?test=31bc3afff44ba399bbb329d17f89e42e&auth=1046B831D00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders8.php?test=74929b5add38353a424dec6e034b8ab1&auth=1046B831B00AF
1 impuls.name GET http://impuls.name/pgpro/getheaders8.php?test=819f0d7780938d18fcfe5fb6f69695fd&auth=1046B8281008D
1 impuls.name GET http://impuls.name/pgpro/getheaders9.php?test=895f1ac72c4b7bcaad0386e782475394&auth=1046B817900AF
1 impuls.name GET http://impuls.name/pgpro/getheaders9.php?test=9170362c502e059f1cf70d2dc9ac87f9&auth=1046B831D00AF
1 sapb.bandzior.pl POST http://sapb.bandzior.pl/test_ip.php?random=1993754672960278212174240803118494209091313098790
1 technology-fashion.com GET /14634823/?????????????????
1 technology-fashion.com GET /robots.txt
1 www.google.com CONNECT www.google.com:443
2 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDY%40ZY
2 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZY
2 httpheader.net GET http://httpheader.net
2 news.cnblogs.com GET http://news.cnblogs.com/n/524040/
2 www.google.com GET http://www.google.com/
2 www.xtrail-nissan.ru POST http://www.xtrail-nissan.ru/1.php
3 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZZPN
3 chek.zennolab.com POST http://chek.zennolab.com/proxy.php
3 chekfast.zennolab.com POST http://chekfast.zennolab.com/proxy.php
3 libs.baidu.com GET http://libs.baidu.com/bootstrap/3.0.3/css/bootstrap.css
5 192.168.1.1 GET /phpMyAdmin/scripts/setup.php
5 www.bing.com GET http://www.bing.com/search?format=rss&q=132.235.1.1:80&filters=ex1%3a%22ez3%22&count=50
5 www.bing.com GET http://www.bing.com/search?format=rss&q=132.235.1.249:21&filters=ex1%3a%22ez3%22&count=50
5 www.bing.com GET http://www.bing.com/search?format=rss&q=132.235.1.249:80&filters=ex1%3a%22ez3%22&count=50
5 www.bing.com GET http://www.bing.com/search?format=rss&q=132.235.2.1:114&filters=ex1%3a%22ez3%22&count=50
5 www.bing.com GET http://www.bing.com/search?format=rss&q=132.235.3.155:80&filters=ex1%3a%22ez3%22&count=50
5 www.bing.com GET http://www.bing.com/search?format=rss&q=132.235.3.157:80&filters=ex1%3a%22ez3%22&count=50
5 www.google.com GET http://www.google.com/search?hl=en&complete=0&q=132.235.1.1:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
5 www.google.com GET http://www.google.com/search?hl=en&complete=0&q=132.235.1.249:21&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
5 www.google.com GET http://www.google.com/search?hl=en&complete=0&q=132.235.1.249:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
5 www.google.com GET http://www.google.com/search?hl=en&complete=0&q=132.235.2.1:114&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
5 www.google.com GET http://www.google.com/search?hl=en&complete=0&q=132.235.3.155:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
5 www.google.com GET http://www.google.com/search?hl=en&complete=0&q=132.235.3.157:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
6 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYAZYPF
6 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYAZYQ%40
6 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCAFUBZ
6 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCAFUGS
6 check2.zennolab.com POST http://check2.zennolab.com/proxy.php
7 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYAZYQB
7 24x7-allrequestsallowed.com GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZYRC
9 www.baidu.com GET http://www.baidu.com/
11 *** GET /con/trust
11 www.desheng28.com GET /
23 dx.doi.org GET http://dx.doi.org/
30 google.com GET http://google.com/complete/search?client=firefox&hl=en&q=ipho
30 www.google.ca CONNECT www.google.ca:443
35 chek.zennolab.com GET http://chek.zennolab.com/proxy.php
37 chekfast.zennolab.com GET http://chekfast.zennolab.com/proxy.php
40 check2.zennolab.com GET http://check2.zennolab.com/proxy.php
48 www.sbjudge1.com GET http://www.sbjudge1.com:80/ip4.php
48 www.sbjudge3.com GET http://www.sbjudge3.com:80/ip4.php
51 www.sbjudge2.com GET http://www.sbjudge2.com:80/ip4.php
153 gc.gamexp.ru GET http://gc.gamexp.ru/
195 127.0.0.1 GET /
595 spam-chaos.com GET http://spam-chaos.com/pp/set-cookie.php

Summarized By Target URL to Fetch - sorted in reverse domain order

Target host name Count GET/PUT/etc Target URL to Fetch
*** 11 GET /con/trust
-c 1 POST //%63%67%69%2D%62%69%6E/%70%68%70?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%66%66+%2D%64+%73%75%68%6F%73%69%6E%2E%73%69%6D%75%6C%61%74%69%6F%6E%3D%6F%6E+%2D%64+%64%69%73%6
127.0.0.1 195 GET /
192.168.1.1 5 GET /phpMyAdmin/scripts/setup.php
24x7-allrequestsallowed.com 1 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDY%40Z%5DV
24x7-allrequestsallowed.com 2 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDY%40ZY
24x7-allrequestsallowed.com 6 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYAZYPF
24x7-allrequestsallowed.com 6 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYAZYQ%40
24x7-allrequestsallowed.com 7 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYAZYQB
24x7-allrequestsallowed.com 6 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCAFUBZ
24x7-allrequestsallowed.com 6 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCAFUGS
24x7-allrequestsallowed.com 2 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZY
24x7-allrequestsallowed.com 7 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZYRC
24x7-allrequestsallowed.com 1 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZZ
24x7-allrequestsallowed.com 3 GET http://24x7-allrequestsallowed.com/?PHPSESSID=a45ad32b00143PQQJTUDYCZZPN
afrenchholiday.com 1 GET /
alexanderlions.org 1 GET /wp-content/plugins/reflex-gallery/readme.txt
check2.zennolab.com 40 GET http://check2.zennolab.com/proxy.php
check2.zennolab.com 6 POST http://check2.zennolab.com/proxy.php
chek.zennolab.com 35 GET http://chek.zennolab.com/proxy.php
chek.zennolab.com 3 POST http://chek.zennolab.com/proxy.php
chekfast.zennolab.com 37 GET http://chekfast.zennolab.com/proxy.php
chekfast.zennolab.com 3 POST http://chekfast.zennolab.com/proxy.php
dx.doi.org 23 GET http://dx.doi.org/
gc.gamexp.ru 153 GET http://gc.gamexp.ru/
google.com 30 GET http://google.com/complete/search?client=firefox&hl=en&q=ipho
httpheader.net 2 GET http://httpheader.net
impuls.name 1 GET http://impuls.name/pgpro/getheaders0.php?test=1d6bfc948757fcf12368fe2cee94e5d8&auth=1046B831B00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders0.php?test=f16c4a32613c47f01f3a8ee553ad25ee&auth=1046B817900EA
impuls.name 1 GET http://impuls.name/pgpro/getheaders1.php?test=67de92a855f12b183d02c72a076f1997&auth=1046B831B00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders1.php?test=819f859ffd589ba6f7fe97195eafbb18&auth=1046B8281008D
impuls.name 1 GET http://impuls.name/pgpro/getheaders2.php?test=26cf00e0fd16fe80e2899e8698bfea49&auth=1046B817900EA
impuls.name 1 GET http://impuls.name/pgpro/getheaders2.php?test=5a29fa99606239912c6aa52a111aa3ab&auth=1046B817900AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders2.php?test=b19bd6d7d8c3d1ba711600b2ab803fe2&auth=1046B8281008D
impuls.name 1 GET http://impuls.name/pgpro/getheaders2.php?test=d194a7704298ed01d8a3e438e24ad818&auth=1046B831B00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders3.php?test=31c8f6c006d298bc53f2d716d443ea1c&auth=1046B817900AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders3.php?test=e92e15c977ef27539b2dbc687faf2d92&auth=1046B817900EA
impuls.name 1 GET http://impuls.name/pgpro/getheaders4.php?test=7f6db8f0bc065463ec041517dd947c42&auth=1046B8281008D
impuls.name 1 GET http://impuls.name/pgpro/getheaders4.php?test=f448582a3f2742d14124bca1f69b66a4&auth=1046B818100AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders5.php?test=808dddf3a63f924d3fdd597dcefdbdab&auth=1046B818100AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders5.php?test=95c564fea1097fcd9b62057f04d561cf&auth=1046B817900EA
impuls.name 1 GET http://impuls.name/pgpro/getheaders5.php?test=a31137c2caf2ea93889f47ab5aa08f53&auth=1046B831D00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders5.php?test=bcad5bf1544b216786fee243be9c74c9&auth=1046B818100AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders7.php?test=539f612bdc9ff261eebff541e681ca62&auth=1046B831D00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders7.php?test=95b7abf6a37c7977a8473c87c0b39beb&auth=1046B818100AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders8.php?test=07fa85da83b7fe2299b5825afbe109f1&auth=1046B817900AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders8.php?test=31bc3afff44ba399bbb329d17f89e42e&auth=1046B831D00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders8.php?test=74929b5add38353a424dec6e034b8ab1&auth=1046B831B00AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders8.php?test=819f0d7780938d18fcfe5fb6f69695fd&auth=1046B8281008D
impuls.name 1 GET http://impuls.name/pgpro/getheaders9.php?test=895f1ac72c4b7bcaad0386e782475394&auth=1046B817900AF
impuls.name 1 GET http://impuls.name/pgpro/getheaders9.php?test=9170362c502e059f1cf70d2dc9ac87f9&auth=1046B831D00AF
libs.baidu.com 3 GET http://libs.baidu.com/bootstrap/3.0.3/css/bootstrap.css
news.cnblogs.com 2 GET http://news.cnblogs.com/n/524040/
sapb.bandzior.pl 1 POST http://sapb.bandzior.pl/test_ip.php?random=1993754672960278212174240803118494209091313098790
spam-chaos.com 595 GET http://spam-chaos.com/pp/set-cookie.php
technology-fashion.com 1 GET /14634823/?????????????????
technology-fashion.com 1 GET /robots.txt
www.baidu.com 9 GET http://www.baidu.com/
www.bing.com 5 GET http://www.bing.com/search?format=rss&q=132.235.1.1:80&filters=ex1%3a%22ez3%22&count=50
www.bing.com 5 GET http://www.bing.com/search?format=rss&q=132.235.1.249:21&filters=ex1%3a%22ez3%22&count=50
www.bing.com 5 GET http://www.bing.com/search?format=rss&q=132.235.1.249:80&filters=ex1%3a%22ez3%22&count=50
www.bing.com 5 GET http://www.bing.com/search?format=rss&q=132.235.2.1:114&filters=ex1%3a%22ez3%22&count=50
www.bing.com 5 GET http://www.bing.com/search?format=rss&q=132.235.3.155:80&filters=ex1%3a%22ez3%22&count=50
www.bing.com 5 GET http://www.bing.com/search?format=rss&q=132.235.3.157:80&filters=ex1%3a%22ez3%22&count=50
www.desheng28.com 11 GET /
www.google.ca 30 CONNECT www.google.ca:443
www.google.com 1 CONNECT www.google.com:443
www.google.com 2 GET http://www.google.com/
www.google.com 5 GET http://www.google.com/search?hl=en&complete=0&q=132.235.1.1:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
www.google.com 5 GET http://www.google.com/search?hl=en&complete=0&q=132.235.1.249:21&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
www.google.com 5 GET http://www.google.com/search?hl=en&complete=0&q=132.235.1.249:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
www.google.com 5 GET http://www.google.com/search?hl=en&complete=0&q=132.235.2.1:114&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
www.google.com 5 GET http://www.google.com/search?hl=en&complete=0&q=132.235.3.155:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
www.google.com 5 GET http://www.google.com/search?hl=en&complete=0&q=132.235.3.157:80&num=100&start=0&tbs=qdr:m&gws_rd=ssl&filter=0
www.sbjudge1.com 48 GET http://www.sbjudge1.com:80/ip4.php
www.sbjudge2.com 51 GET http://www.sbjudge2.com:80/ip4.php
www.sbjudge3.com 48 GET http://www.sbjudge3.com:80/ip4.php
www.xtrail-nissan.ru 2 POST http://www.xtrail-nissan.ru/1.php