Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: Vodafone Portugal - Communicacoes Pessoais S.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
2020-08-26 22:36:04.069746-0500  localhost smtpd[75750]: NOQUEUE: reject: RCPT from unknown[148.63.120.241]: 554 5.7.1 Service unavailable; Client host [148.63.120.241] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/148.63.120.241; from= to= proto=ESMTP helo=<241.120.63.148.rev.vodafone.pt>
2020-08-27 15:42:11
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.63.120.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.63.120.241.			IN	A

;; AUTHORITY SECTION:
.			214	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Aug 27 15:41:59 CST 2020
;; MSG SIZE  rcvd: 118
Host info
241.120.63.148.in-addr.arpa domain name pointer 241.120.63.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.120.63.148.in-addr.arpa	name = 241.120.63.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
116.98.172.159 attack
Invalid user service from 116.98.172.159 port 49928
2020-07-18 23:18:54
177.0.23.37 attackspam
$f2bV_matches
2020-07-18 23:06:06
106.37.74.142 attack
Invalid user user from 106.37.74.142 port 51541
2020-07-18 23:21:02
45.143.223.103 attackspam
Invalid user admin from 45.143.223.103 port 52726
2020-07-18 23:32:46
64.227.37.93 attack
Invalid user tela from 64.227.37.93 port 55222
2020-07-18 23:26:16
182.61.133.172 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-18 23:45:54
104.236.151.120 attackbots
Invalid user dongpe from 104.236.151.120 port 42350
2020-07-18 23:21:40
175.193.13.3 attackbots
Invalid user marnie from 175.193.13.3 port 60184
2020-07-18 23:06:36
49.235.98.68 attack
Invalid user edu from 49.235.98.68 port 37570
2020-07-18 23:31:49
185.220.101.210 attackspambots
Invalid user admin from 185.220.101.210 port 4950
2020-07-18 23:44:33
150.109.22.143 attackspambots
Jul 18 07:08:46 propaganda sshd[30391]: Connection from 150.109.22.143 port 50556 on 10.0.0.160 port 22 rdomain ""
Jul 18 07:08:47 propaganda sshd[30391]: Connection closed by 150.109.22.143 port 50556 [preauth]
2020-07-18 23:10:22
51.255.77.78 attack
Logfile match
2020-07-18 23:29:05
178.32.219.209 attackspambots
Invalid user kai from 178.32.219.209 port 33004
2020-07-18 23:47:21
114.88.164.79 attack
Invalid user admin from 114.88.164.79 port 58170
2020-07-18 23:19:27
178.32.124.142 attack
(mod_security) mod_security (id:949110) triggered by 178.32.124.142 (FR/France/ip142.ip-178-32-124.eu): 10 in the last 3600 secs; ID: DAN
2020-07-18 23:05:50

Recently Reported IPs

191.13.230.198 186.179.155.80 150.221.200.230 176.28.4.15
210.217.164.170 131.161.169.254 12.73.102.106 31.33.48.134
197.63.234.140 75.80.155.121 61.147.103.175 217.147.232.8
219.146.85.226 183.231.200.29 42.228.63.187 186.71.118.28
209.124.88.5 51.116.237.174 48.12.109.2 36.92.106.227