Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: Vodafone Portugal - Communicacoes Pessoais S.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attack
Honeypot attack, port: 23, PTR: 246.153.60.94.rev.vodafone.pt.
2019-07-09 22:43:37
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 94.60.153.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19470
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;94.60.153.246.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 09 22:43:20 CST 2019
;; MSG SIZE  rcvd: 117
Host info
246.153.60.94.in-addr.arpa domain name pointer 246.153.60.94.rev.vodafone.pt.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
246.153.60.94.in-addr.arpa	name = 246.153.60.94.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.209.0.83 attackbotsspam
10/26/2019-23:06:42.057146 185.209.0.83 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:35:03
106.39.84.154 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:42:12
185.156.73.27 attack
Multiport scan : 26 ports scanned 9418 9419 9420 15307 15308 15309 16825 16826 16827 24052 24053 24054 30526 30527 33730 33731 33732 39097 39098 39099 42862 42863 42864 49990 49991 49992
2019-10-27 07:38:32
45.67.15.140 attackspam
firewall-block, port(s): 22/tcp
2019-10-27 07:29:51
92.53.65.129 attackspambots
firewall-block, port(s): 5552/tcp
2019-10-27 07:19:28
185.156.73.38 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-27 07:38:07
68.224.171.204 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:51:37
81.22.45.150 attack
10/26/2019-17:33:43.241278 81.22.45.150 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:48:06
185.209.0.92 attackbots
Multiport scan : 18 ports scanned 9000 9005 9007 9008 9010 9011 9015 9016 9017 9019 9020 9022 9025 9026 9029 9035 9037 9038
2019-10-27 07:34:01
92.119.160.143 attackbots
firewall-block, port(s): 39932/tcp, 45961/tcp, 51309/tcp, 56774/tcp, 57241/tcp, 57577/tcp
2019-10-27 07:43:22
185.156.73.21 attackbotsspam
Multiport scan : 25 ports scanned 9238 9239 9240 13240 13241 13242 15107 35812 35813 35814 42055 42056 42057 42508 42509 42510 54439 54440 54441 58609 58610 58611 61999 62000 62001
2019-10-27 07:38:59
45.82.153.35 attackspambots
10/26/2019-23:33:48.041162 45.82.153.35 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 44
2019-10-27 07:29:32
81.22.45.48 attack
10/26/2019-18:31:12.430986 81.22.45.48 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:49:17
92.53.65.82 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-10-27 07:19:40
80.82.64.127 attackspambots
10/26/2019-18:40:28.840822 80.82.64.127 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:50:05

Recently Reported IPs

114.233.110.131 37.53.70.64 122.154.63.250 77.42.117.78
145.255.0.125 42.81.117.178 90.64.137.225 27.72.137.240
157.230.98.238 64.52.101.194 223.206.242.114 158.174.113.97
179.246.161.237 14.215.176.15 14.215.176.17 177.68.89.26
156.219.241.138 156.219.85.74 1.55.198.186 197.242.98.207