Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.139.32.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43499
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.139.32.104.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:32:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
104.32.139.82.in-addr.arpa domain name pointer 082139032104.unknown.vectranet.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.32.139.82.in-addr.arpa	name = 082139032104.unknown.vectranet.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.132.250.139 attackbotsspam
Port Scan: TCP/445
2019-09-14 14:34:41
187.190.11.249 attackspam
Port Scan: TCP/445
2019-09-14 14:35:21
84.52.59.234 attack
Port Scan: TCP/445
2019-09-14 14:17:14
115.59.131.190 attackbots
Seq 2995002506
2019-09-14 14:08:57
61.244.186.37 attackspam
Sep 14 02:49:41 xtremcommunity sshd\[64444\]: Invalid user kg from 61.244.186.37 port 54321
Sep 14 02:49:41 xtremcommunity sshd\[64444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.244.186.37
Sep 14 02:49:43 xtremcommunity sshd\[64444\]: Failed password for invalid user kg from 61.244.186.37 port 54321 ssh2
Sep 14 02:53:56 xtremcommunity sshd\[64574\]: Invalid user 19 from 61.244.186.37 port 48056
Sep 14 02:53:56 xtremcommunity sshd\[64574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.244.186.37
...
2019-09-14 14:57:57
176.58.139.126 attackspambots
Port Scan: TCP/23
2019-09-14 14:39:04
67.227.191.47 attack
Port Scan: TCP/445
2019-09-14 14:22:26
68.101.38.102 attackbotsspam
Port Scan: UDP/137
2019-09-14 14:21:05
104.232.53.243 attack
Port Scan: TCP/445
2019-09-14 14:13:02
91.247.193.140 attack
Port Scan: TCP/445
2019-09-14 14:48:26
41.65.68.66 attackbots
Port Scan: TCP/445
2019-09-14 14:56:11
76.170.7.245 attackbots
Port Scan: UDP/80
2019-09-14 14:50:10
78.30.196.146 attack
Port Scan: TCP/443
2019-09-14 14:17:37
98.174.231.230 attackspam
Port Scan: UDP/137
2019-09-14 14:46:12
124.19.25.1 attackbotsspam
Port Scan: TCP/135
2019-09-14 14:42:15

Recently Reported IPs

15.19.113.3 164.14.236.171 109.121.120.124 249.179.136.180
87.162.47.212 189.99.125.144 139.148.168.252 233.147.137.57
151.195.88.156 236.177.94.52 216.167.153.191 188.51.106.24
234.114.235.99 135.202.12.151 117.184.241.223 51.185.11.23
33.125.227.86 24.84.52.10 9.127.181.112 243.134.21.77