City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.240.217.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;56.240.217.20.			IN	A
;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 00:06:29 CST 2025
;; MSG SIZE  rcvd: 106b'Host 20.217.240.56.in-addr.arpa not found: 2(SERVFAIL)
'server can't find 56.240.217.20.in-addr.arpa: SERVFAIL| IP | Type | Details | Datetime | 
|---|---|---|---|
| 1.52.199.138 | attackbots | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(11190859) | 2019-11-19 20:16:15 | 
| 85.214.248.128 | attackspambots | [portscan] tcp/3389 [MS RDP] *(RWIN=1024)(11190859) | 2019-11-19 20:05:13 | 
| 182.113.245.91 | attackbots | [portscan] tcp/23 [TELNET] *(RWIN=50551)(11190859) | 2019-11-19 19:53:20 | 
| 14.227.211.124 | attack | [portscan] tcp/23 [TELNET] *(RWIN=31283)(11190859) | 2019-11-19 20:15:57 | 
| 189.134.41.242 | attackspambots | [portscan] tcp/1433 [MsSQL] [scan/connect: 2 time(s)] *(RWIN=1024)(11190859) | 2019-11-19 20:26:18 | 
| 156.237.25.8 | attackbotsspam | Scanning random ports - tries to find possible vulnerable services | 2019-11-19 19:53:52 | 
| 23.30.53.161 | attackspambots | [portscan] tcp/81 [alter-web/web-proxy] *(RWIN=14600)(11190859) | 2019-11-19 19:49:45 | 
| 46.38.144.57 | attackbots | Nov 19 13:01:59 relay postfix/smtpd\[7367\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 19 13:02:17 relay postfix/smtpd\[16291\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 19 13:02:35 relay postfix/smtpd\[11991\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 19 13:02:53 relay postfix/smtpd\[16291\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 Nov 19 13:03:11 relay postfix/smtpd\[11991\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... | 2019-11-19 20:06:35 | 
| 177.40.170.89 | attack | Telnet/23 MH Probe, BF, Hack - | 2019-11-19 20:20:23 | 
| 85.105.30.239 | attack | [portscan] tcp/1433 [MsSQL] [scan/connect: 2 time(s)] *(RWIN=64240)(11190859) | 2019-11-19 20:14:57 | 
| 222.186.173.142 | attack | Nov 19 16:59:51 gw1 sshd[9699]: Failed password for root from 222.186.173.142 port 36280 ssh2 Nov 19 17:00:04 gw1 sshd[9699]: Failed password for root from 222.186.173.142 port 36280 ssh2 ... | 2019-11-19 20:08:29 | 
| 91.98.110.113 | attack | [portscan] tcp/23 [TELNET] *(RWIN=14600)(11190859) | 2019-11-19 20:13:17 | 
| 197.55.9.250 | attackspam | [portscan] tcp/1433 [MsSQL] *(RWIN=8192)(11190859) | 2019-11-19 20:16:59 | 
| 186.50.11.132 | attackspambots | [portscan] tcp/23 [TELNET] *(RWIN=6122)(11190859) | 2019-11-19 20:00:12 | 
| 138.99.69.98 | attackspambots | [portscan] tcp/23 [TELNET] [scan/connect: 2 time(s)] *(RWIN=15166,63758)(11190859) | 2019-11-19 19:54:28 |