Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-14 05:09:17,261 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.248.134.143)
2019-09-14 18:56:40
Comments on same subnet:
IP Type Details Datetime
180.248.134.118 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 20-12-2019 14:50:43.
2019-12-21 03:26:58
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.248.134.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1593
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.248.134.143.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Sep 14 18:56:30 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 143.134.248.180.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 67.207.67.2, trying next server
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 143.134.248.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
42.112.165.235 attackbots
Unauthorized connection attempt detected from IP address 42.112.165.235 to port 23 [J]
2020-01-27 02:05:17
41.42.14.134 attackspambots
Unauthorized connection attempt detected from IP address 41.42.14.134 to port 23 [J]
2020-01-27 02:05:32
162.62.26.17 attackspam
Unauthorized connection attempt detected from IP address 162.62.26.17 to port 8999 [J]
2020-01-27 01:51:34
157.245.61.195 attackbots
Invalid user usuario from 157.245.61.195 port 36678
2020-01-27 01:51:54
218.56.8.66 attackspam
Unauthorized connection attempt detected from IP address 218.56.8.66 to port 3389 [J]
2020-01-27 02:08:23
220.164.175.26 attack
Unauthorized connection attempt detected from IP address 220.164.175.26 to port 1433 [J]
2020-01-27 01:45:32
83.175.213.250 attackspam
Jan 26 18:35:02 srv206 sshd[6792]: Invalid user tester from 83.175.213.250
...
2020-01-27 02:01:49
186.53.187.3 attackspam
port scan and connect, tcp 88 (kerberos-sec)
2020-01-27 01:48:55
177.23.183.66 attackbots
Unauthorized connection attempt detected from IP address 177.23.183.66 to port 4899 [J]
2020-01-27 02:11:56
114.223.184.229 attack
Unauthorized connection attempt detected from IP address 114.223.184.229 to port 5555 [J]
2020-01-27 02:18:07
66.79.166.110 attackspam
Unauthorized connection attempt detected from IP address 66.79.166.110 to port 1433 [J]
2020-01-27 02:03:54
173.163.192.1 attack
Unauthorized connection attempt detected from IP address 173.163.192.1 to port 23 [J]
2020-01-27 02:13:47
187.250.159.184 attack
Unauthorized connection attempt detected from IP address 187.250.159.184 to port 23 [J]
2020-01-27 01:48:40
106.54.245.34 attackbots
SSH Login Bruteforce
2020-01-27 01:58:09
114.44.101.135 attack
Unauthorized connection attempt detected from IP address 114.44.101.135 to port 5555 [J]
2020-01-27 01:56:28

Recently Reported IPs

190.217.19.156 138.99.19.243 88.226.167.133 1.55.46.222
112.74.241.102 190.187.248.189 151.40.166.2 194.193.40.248
48.185.211.237 53.8.92.214 101.37.139.115 206.167.33.12
185.126.180.241 121.16.117.171 183.154.92.221 82.102.165.134
223.247.92.38 223.19.67.94 38.79.143.168 141.129.92.32