City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.117.144.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.117.144.40.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 19:18:13 CST 2025
;; MSG SIZE  rcvd: 107
        Host 40.144.117.199.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 40.144.117.199.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 162.243.144.22 | attackspam | firewall-block, port(s): 143/tcp  | 
                    2019-08-05 03:04:34 | 
| 178.73.215.171 | attack | Scanning (more than 2 packets) random ports - tries to find possible vulnerable services  | 
                    2019-08-05 03:01:57 | 
| 109.169.12.94 | attackspam | SMB Server BruteForce Attack  | 
                    2019-08-05 02:35:32 | 
| 171.225.254.117 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230)  | 
                    2019-08-05 02:28:58 | 
| 187.201.14.139 | attack | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230)  | 
                    2019-08-05 02:57:32 | 
| 35.205.59.24 | attackbotsspam | [portscan] tcp/22 [SSH] *(RWIN=65535)(08041230)  | 
                    2019-08-05 02:46:49 | 
| 14.161.37.213 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=8192)(08041230)  | 
                    2019-08-05 02:49:40 | 
| 39.89.224.84 | attackspam | [portscan] tcp/23 [TELNET] *(RWIN=38814)(08041230)  | 
                    2019-08-05 02:45:09 | 
| 221.134.152.69 | attackbotsspam | [portscan] tcp/139 [NetBIOS Session Service] *(RWIN=1024)(08041230)  | 
                    2019-08-05 02:15:31 | 
| 79.107.203.95 | attack | [portscan] tcp/23 [TELNET] *(RWIN=45266)(08041230)  | 
                    2019-08-05 02:42:12 | 
| 36.251.99.23 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=52233)(08041230)  | 
                    2019-08-05 02:45:48 | 
| 210.56.60.135 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=63443)(08041230)  | 
                    2019-08-05 02:52:17 | 
| 176.235.128.37 | attackbotsspam | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230)  | 
                    2019-08-05 02:27:49 | 
| 5.103.132.150 | attackbots | [SMB remote code execution attempt: port tcp/445] *(RWIN=1024)(08041230)  | 
                    2019-08-05 02:50:33 | 
| 198.143.158.85 | attack | [IPBX probe: SIP RTP=tcp/554] *(RWIN=1024)(08041230)  | 
                    2019-08-05 02:53:36 |