Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.208.132.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9012
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.208.132.19.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 01:08:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
19.132.208.82.in-addr.arpa domain name pointer scprofsp.cluj.astral.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.132.208.82.in-addr.arpa	name = scprofsp.cluj.astral.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
35.228.162.115 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-27 14:08:56
111.250.182.74 attack
Jun 27 05:52:57 h1745522 sshd[31055]: Invalid user av from 111.250.182.74 port 50534
Jun 27 05:52:58 h1745522 sshd[31055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.250.182.74
Jun 27 05:52:57 h1745522 sshd[31055]: Invalid user av from 111.250.182.74 port 50534
Jun 27 05:53:00 h1745522 sshd[31055]: Failed password for invalid user av from 111.250.182.74 port 50534 ssh2
Jun 27 05:53:53 h1745522 sshd[31112]: Invalid user helpdesk from 111.250.182.74 port 35670
Jun 27 05:53:53 h1745522 sshd[31112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.250.182.74
Jun 27 05:53:53 h1745522 sshd[31112]: Invalid user helpdesk from 111.250.182.74 port 35670
Jun 27 05:53:55 h1745522 sshd[31112]: Failed password for invalid user helpdesk from 111.250.182.74 port 35670 ssh2
Jun 27 05:54:48 h1745522 sshd[31150]: Invalid user bo from 111.250.182.74 port 49040
...
2020-06-27 14:10:45
104.244.73.251 attack
Invalid user developer from 104.244.73.251 port 43056
2020-06-27 13:57:38
134.122.79.249 attack
Automatic report - XMLRPC Attack
2020-06-27 14:20:45
85.234.117.151 attackspam
Jun 26 21:12:41 mockhub sshd[29903]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.234.117.151
Jun 26 21:12:42 mockhub sshd[29903]: Failed password for invalid user bugzilla from 85.234.117.151 port 36915 ssh2
...
2020-06-27 13:50:21
102.133.165.93 attackspam
Jun 27 07:41:05 fhem-rasp sshd[6979]: Failed password for root from 102.133.165.93 port 25734 ssh2
Jun 27 07:41:06 fhem-rasp sshd[6979]: Disconnected from authenticating user root 102.133.165.93 port 25734 [preauth]
...
2020-06-27 13:56:27
46.166.151.73 attack
[2020-06-27 01:25:12] NOTICE[1273][C-00005028] chan_sip.c: Call from '' (46.166.151.73:57903) to extension '31014422006166' rejected because extension not found in context 'public'.
[2020-06-27 01:25:12] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-27T01:25:12.265-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="31014422006166",SessionID="0x7f31c05e9da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.73/57903",ACLName="no_extension_match"
[2020-06-27 01:26:20] NOTICE[1273][C-00005029] chan_sip.c: Call from '' (46.166.151.73:62582) to extension '31114422006166' rejected because extension not found in context 'public'.
[2020-06-27 01:26:20] SECURITY[1288] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-06-27T01:26:20.652-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="31114422006166",SessionID="0x7f31c05e9da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.1
...
2020-06-27 13:47:58
95.133.155.11 attackbots
20/6/26@23:54:54: FAIL: IoT-Telnet address from=95.133.155.11
20/6/26@23:54:54: FAIL: IoT-Telnet address from=95.133.155.11
...
2020-06-27 14:03:00
187.51.12.106 attackspam
SSH Scan
2020-06-27 14:02:24
180.250.124.227 attackbots
Invalid user europe from 180.250.124.227 port 50176
2020-06-27 13:39:18
13.82.169.159 attackspambots
SSH login attempts.
2020-06-27 14:21:02
134.209.71.245 attack
Jun 27 05:14:02 onepixel sshd[4163279]: Invalid user admin from 134.209.71.245 port 33432
Jun 27 05:14:02 onepixel sshd[4163279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.71.245 
Jun 27 05:14:02 onepixel sshd[4163279]: Invalid user admin from 134.209.71.245 port 33432
Jun 27 05:14:04 onepixel sshd[4163279]: Failed password for invalid user admin from 134.209.71.245 port 33432 ssh2
Jun 27 05:17:15 onepixel sshd[4165004]: Invalid user cx from 134.209.71.245 port 60536
2020-06-27 13:58:48
51.161.34.8 attackbotsspam
2020-06-27T08:57:27.482801hostname sshd[30316]: Failed password for invalid user jyh from 51.161.34.8 port 52810 ssh2
2020-06-27T09:05:09.719440hostname sshd[3605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps-54abb8d7.vps.ovh.ca  user=root
2020-06-27T09:05:11.105798hostname sshd[3605]: Failed password for root from 51.161.34.8 port 36970 ssh2
...
2020-06-27 13:48:30
27.22.113.187 attackspambots
SmallBizIT.US 1 packets to tcp(23)
2020-06-27 13:59:14
165.227.206.114 attack
165.227.206.114 - - [27/Jun/2020:06:32:27 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.227.206.114 - - [27/Jun/2020:06:32:28 +0200] "POST /wp-login.php HTTP/1.1" 200 3412 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-27 13:42:04

Recently Reported IPs

37.3.129.132 230.30.178.160 106.208.199.226 89.162.13.122
80.215.188.115 38.21.30.165 215.198.148.219 226.194.189.115
176.224.2.199 193.201.97.168 61.201.247.143 190.94.26.64
130.0.200.222 141.91.105.136 39.64.132.151 41.69.212.181
82.235.109.107 90.158.87.147 42.114.251.121 42.188.114.43