City: unknown
Region: unknown
Country: China
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.40.243.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26731
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;106.40.243.96.			IN	A
;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400
;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 14:45:05 CST 2022
;; MSG SIZE  rcvd: 106Host 96.243.40.106.in-addr.arpa. not found: 3(NXDOMAIN)Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 96.243.40.106.in-addr.arpa: NXDOMAIN| IP | Type | Details | Datetime | 
|---|---|---|---|
| 112.3.28.155 | attackbotsspam | ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic | 2020-06-06 08:28:32 | 
| 14.51.6.100 | attack | Unauthorized connection attempt detected from IP address 14.51.6.100 to port 23 | 2020-06-06 08:12:56 | 
| 58.217.159.82 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic | 2020-06-06 08:43:21 | 
| 109.236.60.42 | attackbotsspam | 06/05/2020-20:27:25.516335 109.236.60.42 Protocol: 17 ET SCAN Sipvicious Scan | 2020-06-06 08:28:45 | 
| 84.38.185.137 | attack | Jun 6 01:58:26 debian-2gb-nbg1-2 kernel: \[13660257.521142\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=84.38.185.137 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=20339 PROTO=TCP SPT=43690 DPT=6000 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-06-06 08:36:52 | 
| 45.148.121.3 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 28 - port: 389 proto: TCP cat: Misc Attack | 2020-06-06 08:45:33 | 
| 71.6.167.142 | attack | Unauthorized connection attempt detected from IP address 71.6.167.142 to port 9200 | 2020-06-06 08:40:18 | 
| 156.96.119.148 | attackbotsspam | ET DROP Spamhaus DROP Listed Traffic Inbound group 12 - port: 443 proto: TCP cat: Misc Attack | 2020-06-06 08:24:55 | 
| 37.49.226.3 | attackbotsspam | firewall-block, port(s): 8443/tcp | 2020-06-06 08:47:54 | 
| 89.248.172.16 | attackbots | 
 | 2020-06-06 08:34:04 | 
| 185.153.199.211 | attack | Jun 6 03:09:01 debian kernel: [304702.548957] [UFW BLOCK] IN=eth0 OUT= MAC=52:54:00:be:e4:65:08:e8:4f:6e:48:0c:08:00 SRC=185.153.199.211 DST=89.252.131.35 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=12461 PROTO=TCP SPT=52795 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0 | 2020-06-06 08:22:09 | 
| 185.53.88.102 | attack | Scanned 1 times in the last 24 hours on port 5060 | 2020-06-06 08:23:58 | 
| 94.102.49.190 | attackspam | Jun 6 02:17:14 debian-2gb-nbg1-2 kernel: \[13661385.886311\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=94.102.49.190 DST=195.201.40.59 LEN=44 TOS=0x10 PREC=0x00 TTL=120 ID=4777 PROTO=TCP SPT=13944 DPT=1010 WINDOW=18960 RES=0x00 SYN URGP=0 | 2020-06-06 08:30:18 | 
| 45.143.220.99 | attackbotsspam | Scanned 1 times in the last 24 hours on port 5060 | 2020-06-06 08:45:59 | 
| 45.141.84.57 | attackbots | SmallBizIT.US 4 packets to tcp(3388,3395,6689,33389) | 2020-06-06 08:46:19 |