City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.52.84.17
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53568
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;20.52.84.17.			IN	A
;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 23:28:36 CST 2025
;; MSG SIZE  rcvd: 104
        Host 17.84.52.20.in-addr.arpa. not found: 3(NXDOMAIN)
        Server:		183.60.83.19
Address:	183.60.83.19#53
** server can't find 17.84.52.20.in-addr.arpa: NXDOMAIN
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 92.118.37.97 | attackspambots | ET CINS Active Threat Intelligence Poor Reputation IP group 88 - port: 7012 proto: TCP cat: Misc Attack  | 
                    2020-04-11 08:16:22 | 
| 80.82.78.104 | attackspambots | Scanned 1 times in the last 24 hours on port 23  | 
                    2020-04-11 08:21:57 | 
| 122.228.120.190 | attackbots | ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-11 08:09:04 | 
| 80.82.64.219 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 69 - port: 3389 proto: TCP cat: Misc Attack  | 
                    2020-04-11 08:23:16 | 
| 51.68.32.21 | attackbotsspam | ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 23 proto: TCP cat: Misc Attack  | 
                    2020-04-11 08:32:22 | 
| 5.135.253.172 | attack | Apr 11 01:06:16 debian-2gb-nbg1-2 kernel: \[8818982.200990\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=5.135.253.172 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=33870 PROTO=TCP SPT=40003 DPT=27685 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-04-11 08:35:42 | 
| 61.147.103.190 | attack | ET CINS Active Threat Intelligence Poor Reputation IP group 49 - port: 5901 proto: TCP cat: Misc Attack  | 
                    2020-04-11 08:28:55 | 
| 185.216.140.252 | attackbots | 04/10/2020-19:42:49.661787 185.216.140.252 Protocol: 6 ET DROP Dshield Block Listed Source group 1  | 
                    2020-04-11 08:04:25 | 
| 143.204.142.22 | attack | ET INFO TLS Handshake Failure - port: 46969 proto: TCP cat: Potentially Bad Traffic  | 
                    2020-04-11 08:07:37 | 
| 92.118.37.86 | attackbots | Apr 11 02:14:13 debian-2gb-nbg1-2 kernel: \[8823059.288748\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.86 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=55788 PROTO=TCP SPT=42081 DPT=3388 WINDOW=1024 RES=0x00 SYN URGP=0  | 
                    2020-04-11 08:16:47 | 
| 138.197.189.136 | attackspam | Apr 11 05:49:40 eventyay sshd[31269]: Failed password for root from 138.197.189.136 port 48162 ssh2 Apr 11 05:53:06 eventyay sshd[31317]: Failed password for root from 138.197.189.136 port 56042 ssh2 ...  | 
                    2020-04-11 12:03:14 | 
| 1.32.238.18 | attack | " "  | 
                    2020-04-11 08:37:16 | 
| 141.98.81.150 | attackspam | ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak  | 
                    2020-04-11 08:07:57 | 
| 157.230.249.90 | attack | Apr 10 23:48:35 NPSTNNYC01T sshd[4657]: Failed password for root from 157.230.249.90 port 55464 ssh2 Apr 10 23:52:37 NPSTNNYC01T sshd[4994]: Failed password for root from 157.230.249.90 port 34936 ssh2 Apr 10 23:56:34 NPSTNNYC01T sshd[5428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.249.90 ...  | 
                    2020-04-11 12:01:01 | 
| 104.206.128.58 | attack | GPL SNMP public access udp - port: 161 proto: UDP cat: Attempted Information Leak  | 
                    2020-04-11 08:10:54 |