City: Daimiel
Region: Comunidad Autónoma de Castilla-La Mancha
Country: Spain
Internet Service Provider: Aire Networks del Mediterráneo, S.L.U.
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '109.167.82.0 - 109.167.82.255'
% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'
inetnum: 109.167.82.0 - 109.167.82.255
netname: AIONARAHALCBLE-NET-2
geoloc: 37.2592771 -5.5434645
country: ES
admin-c: AT14223-RIPE
tech-c: JRV40-RIPE
status: ASSIGNED PA
mnt-by: SERVIHOSTING-MNT
created: 2015-12-02T10:52:39Z
last-modified: 2026-01-13T12:52:14Z
source: RIPE
role: Airenetworks
address: C/Santiago Ramojn y Cajal 11
org: ORG-SNS2-RIPE
nic-hdl: AT14223-RIPE
abuse-mailbox: abuse@servihosting.es
mnt-by: SERVIHOSTING-MNT
created: 2017-08-25T09:33:41Z
last-modified: 2018-06-07T10:31:17Z
source: RIPE # Filtered
admin-c: JMG35-RIPE
admin-c: ZGC2-RIPE
tech-c: EGC5-RIPE
person: Javier Roiz Vazquez
address: Avda Reina de las Marismas,2
phone: +34623407327
nic-hdl: JRV40-RIPE
mnt-by: lir-es-codipro-1-MNT
created: 2025-11-20T16:42:00Z
last-modified: 2025-11-20T16:42:00Z
source: RIPE
% Information related to '109.167.82.0/24AS213686'
route: 109.167.82.0/24
origin: AS213686
mnt-by: SERVIHOSTING-MNT
created: 2025-12-02T10:45:57Z
last-modified: 2025-12-02T10:45:57Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.120 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.167.82.131. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030301 1800 900 604800 86400
;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 04 05:06:37 CST 2026
;; MSG SIZE rcvd: 107
131.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
131.82.167.109.in-addr.arpa name = aiontelecomunicaciones.es.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 129.250.206.86 | attackspambots |
|
2020-09-04 06:44:56 |
| 109.181.157.33 | attackbots | Lines containing failures of 109.181.157.33 Sep 2 10:14:44 omfg postfix/smtpd[20612]: connect from unknown[109.181.157.33] Sep x@x Sep 2 10:14:44 omfg postfix/smtpd[20612]: lost connection after DATA from unknown[109.181.157.33] Sep 2 10:14:44 omfg postfix/smtpd[20612]: disconnect from unknown[109.181.157.33] ehlo=1 mail=1 rcpt=0/1 data=0/1 commands=2/4 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=109.181.157.33 |
2020-09-04 06:45:28 |
| 52.137.51.225 | attack | SSH Invalid Login |
2020-09-04 06:53:19 |
| 106.13.18.86 | attackspam | $f2bV_matches |
2020-09-04 06:43:10 |
| 13.95.2.167 | attackbots | DATE:2020-09-03 19:19:38, IP:13.95.2.167, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq) |
2020-09-04 06:52:22 |
| 222.186.169.194 | attack | Sep 4 00:37:00 amit sshd\[9498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Sep 4 00:37:02 amit sshd\[9498\]: Failed password for root from 222.186.169.194 port 10340 ssh2 Sep 4 00:37:20 amit sshd\[9500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root ... |
2020-09-04 06:40:02 |
| 150.109.99.243 | attack | 2020-09-03T15:15:45.035590sorsha.thespaminator.com sshd[13213]: Invalid user user3 from 150.109.99.243 port 53156 2020-09-03T15:15:46.813373sorsha.thespaminator.com sshd[13213]: Failed password for invalid user user3 from 150.109.99.243 port 53156 ssh2 ... |
2020-09-04 06:56:26 |
| 180.76.169.198 | attackbotsspam | Sep 3 16:21:09 Host-KLAX-C sshd[5896]: User root from 180.76.169.198 not allowed because not listed in AllowUsers ... |
2020-09-04 06:32:50 |
| 106.54.198.182 | attackspam | Sep 3 22:46:45 game-panel sshd[26779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.198.182 Sep 3 22:46:47 game-panel sshd[26779]: Failed password for invalid user zy from 106.54.198.182 port 51815 ssh2 Sep 3 22:51:04 game-panel sshd[26914]: Failed password for root from 106.54.198.182 port 40255 ssh2 |
2020-09-04 06:59:17 |
| 62.193.151.59 | attackspambots | Sep 3 11:48:52 mailman postfix/smtpd[14239]: warning: unknown[62.193.151.59]: SASL PLAIN authentication failed: authentication failure |
2020-09-04 06:32:09 |
| 105.235.135.204 | attackbots | Sep 3 18:48:21 mellenthin postfix/smtpd[20928]: NOQUEUE: reject: RCPT from unknown[105.235.135.204]: 554 5.7.1 Service unavailable; Client host [105.235.135.204] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/105.235.135.204; from= |
2020-09-04 07:01:21 |
| 113.161.79.191 | attack | Auto Fail2Ban report, multiple SSH login attempts. |
2020-09-04 06:35:08 |
| 189.234.178.212 | attackspam | 20/9/3@12:48:14: FAIL: Alarm-Network address from=189.234.178.212 20/9/3@12:48:14: FAIL: Alarm-Network address from=189.234.178.212 20/9/3@12:48:14: FAIL: Alarm-Network address from=189.234.178.212 ... |
2020-09-04 07:04:50 |
| 201.211.207.71 | attack | Brute forcing RDP port 3389 |
2020-09-04 07:04:29 |
| 218.92.0.158 | attackbotsspam | Sep 3 15:29:33 dignus sshd[10189]: Failed password for root from 218.92.0.158 port 11566 ssh2 Sep 3 15:29:36 dignus sshd[10189]: Failed password for root from 218.92.0.158 port 11566 ssh2 Sep 3 15:29:40 dignus sshd[10189]: Failed password for root from 218.92.0.158 port 11566 ssh2 Sep 3 15:29:43 dignus sshd[10189]: Failed password for root from 218.92.0.158 port 11566 ssh2 Sep 3 15:29:47 dignus sshd[10189]: Failed password for root from 218.92.0.158 port 11566 ssh2 ... |
2020-09-04 06:32:31 |