Anyone have any idea why a host from IANA would be scanning DNS
servers?
;; AUTHORITY SECTION:
4.32.198.in-addr.arpa. 10551
IN SOA dot.ip4.int.
hostmaster.ip4.int. 1928630 10800 900 604800 86400
10/03-01:29:45.947001 [**] [1:1616:4]
DNS
named version attempt [**] [Classification: Attempted Information
Leak] [Priority: 2] {UDP}
198.32.4.13:33581
-> 63.105.37.21:53
10/03-01:29:46.257443 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:39050 -> 63.105.37.21:53
10/03-01:29:46.544719 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:33623 -> 63.105.37.20:53
10/03-01:29:47.067072 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:39057 -> 63.105.37.20:53
10/03-01:57:47.356984 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:56229 -> 63.105.37.20:53
10/03-01:57:47.762762 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:46196 -> 63.105.37.20:53
10/03-02:01:02.332948 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:36697 -> 63.105.37.20:53
10/03-02:01:02.739583 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:47061 -> 63.105.37.20:53
10/03-02:01:59.042381 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:39008 -> 63.105.37.20:53
10/03-02:01:59.455718 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:47296 -> 63.105.37.20:53
10/03-02:05:01.297316 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:46251 -> 63.105.37.20:53
10/03-02:05:01.710271 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:48067 -> 63.105.37.20:53
10/03-02:05:28.770286 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:47507 -> 63.105.37.20:53
10/03-02:05:29.326121 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:48191 -> 63.105.37.20:53
10/03-02:05:44.704398 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:48082 -> 63.105.37.20:53
10/03-02:05:45.755863 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:48244 -> 63.105.37.20:53
10/03-02:10:20.499887 [**] [1:1616:4] DNS named version attempt [**] [Classification: Attempted Information Leak] [Priority: 2] {UDP} 198.32.4.13:57711 -> 63.105.37.20:53
10/03-02:10:20.906450 [**] [1:255:8] DNS zone transfer TCP [**] [Classification: Attempted Information Leak] [Priority: 2] {TCP} 198.32.4.13:49232 -> 63.105.37.20:53