Here is a reverse DNS and WHOIS lookup of the "attacker"'s address: When hovering mouse pointer over thetrailcolumn's content (IP address), you'll be presented with the search results fromDuckDuckGowhere you'll be able to find more information about the "attacker" (i.e. Shodan): ...
constructor in favor of browser_executable_path which should not be used unless you are the edge case (yep, you are) who can't add your custom chrome installation folder to your PATH environment variable, or have an army of different browsers/versions and automatic lookup returns the wrong ...