1   1  /  1  页   跳转

【分享】攻击我的家伙~~

【分享】攻击我的家伙~~

[60.30.249.70]: 主机存活,响应ICMP请求
[60.30.249.70]: 发现 "存活主机".
[60.30.249.70]: 开放服务: 21/tcp
[60.30.249.70]: 开放服务: 139/tcp
[60.30.249.70]: 开放服务: 445/tcp
[60.30.249.70]: 开放服务: 3389/tcp
[60.30.249.70]: 139/tcp - Maybe the "netbios-ssn" service running on this port.
[60.30.249.70]: 21/tcp - Maybe the "ftp" service running on this port.
[60.30.249.70]: 3389/tcp - Maybe the "Windows Terminal Services" service running on this port.
[60.30.249.70]: 445/tcp - Maybe the "microsoft-ds" service running on this port.
[60.30.249.70]: "开放服务"扫描完成, 发现 4.
[60.30.249.70]: 445/tcp - Checks for openness of port 445
[60.30.249.70]: 139/tcp - Checks for openness of port 445
[60.30.249.70]: 137/udp - Using NetBIOS to retrieve information from a Windows host
[60.30.249.70]: 445/tcp - Attempts to log into the remote host
[60.30.249.70]: 445/tcp - Enumerates the list of remote services
[60.30.249.70]: 445/tcp - Determines whether the remote registry is accessible
[60.30.249.70]: 445/tcp - Determines whether the remote registry is fully accessible
[60.30.249.70]: "Nessus攻击脚本"扫描完成, 发现 7.
最后编辑2005-07-21 16:35:14
分享到:
gototop
 

第二个

您查询的IP是:218.87.36.148



国家:中国
省市:江西省
城市:南昌市
具体地址:南昌大学北区学生宿舍宽带
gototop
 

第三个

61.175.207.38--------攻击时间2005.7.21  1点06分


[61.175.207.38]: 主机存活,响应ICMP请求
[61.175.207.38]: 发现 "存活主机".
[61.175.207.38]: 开放服务: 21/tcp
[61.175.207.38]: 开放服务: 113/tcp
[61.175.207.38]: 开放服务: 1433/tcp
[61.175.207.38]: 开放服务: 3389/tcp
[61.175.207.38]: 开放服务: 6000/tcp
[61.175.207.38]: 1433/tcp - Maybe the "ms-sql-s" service running on this port.
[61.175.207.38]: 113/tcp - Maybe the "auth" service running on this port.
[61.175.207.38]: 21/tcp - Maybe the "ftp" service running on this port.
[61.175.207.38]: 3389/tcp - Maybe the "Windows Terminal Services" service running on this port.
[61.175.207.38]: 6000/tcp - Maybe the "x11 X Window System" service running on this port.
[61.175.207.38]: "开放服务"扫描完成, 发现 5.
[61.175.207.38]: 1521/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1521/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1541/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1541/tcp - 连接目标主机的1541或1521端口,执行一个TNS VERSION命令来查询版本信息
[61.175.207.38]: 1433/tcp - Microsoft's SQL TCP/IP listener is running
[61.175.207.38]: 1433/tcp - Microsoft's SQL Hello Overflow
[61.175.207.38]: "Nessus攻击脚本"扫描完成, 发现 6.
gototop
 

靠,真是不想理他们~

但有时又太气人,看着半截电影,就不动了,过会防火墙报警,拦截攻击,我............

靠~
gototop
 
1   1  /  1  页   跳转
页面顶部
Powered by Discuz!NT