Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 139.2.46.32
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;139.2.46.32.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 07:32:46 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 32.46.2.139.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 32.46.2.139.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.89.157.197 attackspambots
Invalid user wpg from 36.89.157.197 port 34398
2020-02-13 20:41:08
82.252.134.244 attack
unauthorized connection attempt
2020-02-13 21:04:37
103.132.171.2 attackbotsspam
Feb 13 07:02:42 server sshd\[16492\]: Invalid user test from 103.132.171.2
Feb 13 07:02:43 server sshd\[16492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.132.171.2 
Feb 13 07:02:44 server sshd\[16492\]: Failed password for invalid user test from 103.132.171.2 port 3422 ssh2
Feb 13 08:02:37 server sshd\[26216\]: Invalid user test from 103.132.171.2
Feb 13 08:02:37 server sshd\[26216\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.132.171.2 
...
2020-02-13 21:28:38
104.248.56.116 attackbots
unauthorized connection attempt
2020-02-13 20:39:05
103.248.20.118 attackspambots
Invalid user station from 103.248.20.118 port 48976
2020-02-13 21:32:17
207.154.243.255 attackspam
Invalid user vrx from 207.154.243.255 port 48702
2020-02-13 20:46:38
186.214.195.241 attack
Automatic report - Port Scan Attack
2020-02-13 21:31:13
106.13.99.83 attackbots
Invalid user ras from 106.13.99.83 port 55337
2020-02-13 21:04:03
122.227.39.50 attack
Unauthorized connection attempt from IP address 122.227.39.50 on Port 445(SMB)
2020-02-13 21:24:15
1.55.142.136 attack
Unauthorized connection attempt from IP address 1.55.142.136 on Port 445(SMB)
2020-02-13 20:38:28
106.12.17.19 attack
ssh failed login
2020-02-13 21:28:12
182.70.254.87 attack
Feb 13 05:45:48 vmd26974 sshd[31371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.70.254.87
Feb 13 05:45:50 vmd26974 sshd[31371]: Failed password for invalid user administrator from 182.70.254.87 port 40585 ssh2
...
2020-02-13 20:54:22
103.74.120.201 attackspam
Wordpress login
2020-02-13 21:30:41
175.111.131.65 attackbots
Automatic report - Port Scan Attack
2020-02-13 21:15:31
159.203.189.152 attackspambots
Feb 13 11:37:44 * sshd[8352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.189.152
Feb 13 11:37:47 * sshd[8352]: Failed password for invalid user dante from 159.203.189.152 port 38174 ssh2
2020-02-13 20:55:17

Recently Reported IPs

190.249.36.45 228.65.77.102 209.77.2.163 145.58.115.218
189.114.197.165 65.92.223.180 87.35.64.240 219.92.178.21
163.126.90.36 109.169.41.134 130.85.101.193 169.110.122.35
174.240.196.151 153.208.37.93 232.206.4.138 233.207.130.137
177.129.198.102 72.54.206.214 250.41.93.228 35.241.4.95