City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
        ; <<>> DiG 9.10.3-P4-Ubuntu <<>> 44.202.200.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48192
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;44.202.200.57.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400
;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:46:51 CST 2025
;; MSG SIZE  rcvd: 106
        57.200.202.44.in-addr.arpa domain name pointer ec2-44-202-200-57.compute-1.amazonaws.com.
        Server:		183.60.83.19
Address:	183.60.83.19#53
Non-authoritative answer:
57.200.202.44.in-addr.arpa	name = ec2-44-202-200-57.compute-1.amazonaws.com.
Authoritative answers can be found from:
        | IP | Type | Details | Datetime | 
|---|---|---|---|
| 46.12.60.53 | attackspambots | Unauthorized connection attempt detected from IP address 46.12.60.53 to port 23 [J]  | 
                    2020-01-25 01:41:25 | 
| 39.46.47.171 | attackspam | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -  | 
                    2020-01-25 01:18:21 | 
| 69.46.29.66 | attack | 389/udp 389/udp [2020-01-24]2pkt  | 
                    2020-01-25 01:12:50 | 
| 103.221.68.90 | attack | Unauthorized connection attempt from IP address 103.221.68.90 on Port 445(SMB)  | 
                    2020-01-25 01:31:06 | 
| 39.48.98.28 | attackspambots | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -  | 
                    2020-01-25 01:13:13 | 
| 2.184.44.239 | attackspambots | 8080/tcp [2020-01-24]1pkt  | 
                    2020-01-25 01:10:31 | 
| 176.49.160.170 | attackbotsspam | 445/tcp [2020-01-24]1pkt  | 
                    2020-01-25 00:59:35 | 
| 5.62.56.34 | attackbotsspam | Brute forcing RDP port 3389  | 
                    2020-01-25 01:02:26 | 
| 103.82.80.6 | attackspambots | Unauthorized connection attempt from IP address 103.82.80.6 on Port 445(SMB)  | 
                    2020-01-25 01:32:43 | 
| 51.89.173.198 | attackspam | Unauthorized connection attempt detected from IP address 51.89.173.198 to port 1025 [J]  | 
                    2020-01-25 01:26:02 | 
| 119.136.88.5 | attackspambots | Unauthorized connection attempt from IP address 119.136.88.5 on Port 445(SMB)  | 
                    2020-01-25 01:10:04 | 
| 31.148.168.12 | attackspambots | Unauthorized connection attempt from IP address 31.148.168.12 on Port 445(SMB)  | 
                    2020-01-25 01:13:31 | 
| 63.80.184.137 | attack | Jan 24 14:41:01 grey postfix/smtpd\[31316\]: NOQUEUE: reject: RCPT from box.sapuxfiori.com\[63.80.184.137\]: 554 5.7.1 Service unavailable\; Client host \[63.80.184.137\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.80.184.137\]\; from=\  | 
                    2020-01-25 01:11:47 | 
| 89.198.209.114 | attack | 445/tcp 445/tcp [2020-01-24]2pkt  | 
                    2020-01-25 01:33:17 | 
| 217.131.61.247 | attackbots | Automatic report - Port Scan Attack  | 
                    2020-01-25 01:12:12 |