Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daimiel

Region: Comunidad Autónoma de Castilla-La Mancha

Country: Spain

Internet Service Provider: Aire Networks del Mediterráneo, S.L.U.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '109.167.82.0 - 109.167.82.255'

% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'

inetnum:        109.167.82.0 - 109.167.82.255
netname:        AIONARAHALCBLE-NET-2
geoloc:         37.2592771 -5.5434645
country:        ES
admin-c:        AT14223-RIPE
tech-c:         JRV40-RIPE
status:         ASSIGNED PA
mnt-by:         SERVIHOSTING-MNT
created:        2015-12-02T10:52:39Z
last-modified:  2026-01-13T12:52:14Z
source:         RIPE

role:           Airenetworks
address:        C/Santiago Ramojn y Cajal 11
org:            ORG-SNS2-RIPE
nic-hdl:        AT14223-RIPE
abuse-mailbox:  abuse@servihosting.es
mnt-by:         SERVIHOSTING-MNT
created:        2017-08-25T09:33:41Z
last-modified:  2018-06-07T10:31:17Z
source:         RIPE # Filtered
admin-c:        JMG35-RIPE
admin-c:        ZGC2-RIPE
tech-c:         EGC5-RIPE

person:         Javier Roiz Vazquez
address:        Avda Reina de las Marismas,2
phone:          +34623407327
nic-hdl:        JRV40-RIPE
mnt-by:         lir-es-codipro-1-MNT
created:        2025-11-20T16:42:00Z
last-modified:  2025-11-20T16:42:00Z
source:         RIPE

% Information related to '109.167.82.0/24AS213686'

route:          109.167.82.0/24
origin:         AS213686
mnt-by:         SERVIHOSTING-MNT
created:        2025-12-02T10:45:57Z
last-modified:  2025-12-02T10:45:57Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36692
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.167.82.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040800 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 09 00:04:09 CST 2026
;; MSG SIZE  rcvd: 107
Host info
158.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
158.82.167.109.in-addr.arpa	name = aiontelecomunicaciones.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.235.251.41 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.251.41  user=root
Failed password for root from 49.235.251.41 port 35398 ssh2
Invalid user mcjung from 49.235.251.41 port 40136
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.251.41
Failed password for invalid user mcjung from 49.235.251.41 port 40136 ssh2
2019-12-02 19:55:13
103.119.30.52 attackbots
2019-12-02T11:33:50.823677abusebot.cloudsearch.cf sshd\[15546\]: Invalid user hayamizu from 103.119.30.52 port 50716
2019-12-02T11:33:50.828470abusebot.cloudsearch.cf sshd\[15546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.119.30.52
2019-12-02 20:09:24
156.195.109.32 attack
Unauthorised access (Dec  2) SRC=156.195.109.32 LEN=52 TOS=0x10 PREC=0x40 TTL=111 ID=23879 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 19:51:27
193.200.83.247 attack
Lines containing failures of 193.200.83.247
Dec  2 09:46:46 icinga sshd[23460]: Invalid user !!! from 193.200.83.247 port 53012
Dec  2 09:46:47 icinga sshd[23460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.200.83.247
Dec  2 09:46:48 icinga sshd[23460]: Failed password for invalid user !!! from 193.200.83.247 port 53012 ssh2
Dec  2 09:46:48 icinga sshd[23460]: Connection closed by invalid user !!! 193.200.83.247 port 53012 [preauth]
Dec  2 11:05:04 icinga sshd[12798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.200.83.247  user=sshd
Dec  2 11:05:07 icinga sshd[12798]: Failed password for sshd from 193.200.83.247 port 34750 ssh2
Dec  2 11:05:07 icinga sshd[12798]: Connection closed by authenticating user sshd 193.200.83.247 port 34750 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=193.200.83.247
2019-12-02 20:02:58
49.235.209.223 attackbotsspam
Dec  2 10:24:18 srv01 sshd[24864]: Invalid user webmaster from 49.235.209.223 port 38472
Dec  2 10:24:18 srv01 sshd[24864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.209.223
Dec  2 10:24:18 srv01 sshd[24864]: Invalid user webmaster from 49.235.209.223 port 38472
Dec  2 10:24:21 srv01 sshd[24864]: Failed password for invalid user webmaster from 49.235.209.223 port 38472 ssh2
Dec  2 10:30:38 srv01 sshd[25478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.209.223  user=root
Dec  2 10:30:40 srv01 sshd[25478]: Failed password for root from 49.235.209.223 port 36834 ssh2
...
2019-12-02 20:02:12
49.234.96.205 attackspam
Dec  2 12:39:25 OPSO sshd\[1215\]: Invalid user cartohl from 49.234.96.205 port 35276
Dec  2 12:39:25 OPSO sshd\[1215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.205
Dec  2 12:39:27 OPSO sshd\[1215\]: Failed password for invalid user cartohl from 49.234.96.205 port 35276 ssh2
Dec  2 12:46:09 OPSO sshd\[2908\]: Invalid user Jquery\$%\^\& from 49.234.96.205 port 41792
Dec  2 12:46:09 OPSO sshd\[2908\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.205
2019-12-02 20:00:12
209.17.96.26 attackbots
209.17.96.26 was recorded 12 times by 11 hosts attempting to connect to the following ports: 6379,5916,21,8088,8531,8080,5905. Incident counter (4h, 24h, all-time): 12, 48, 1000
2019-12-02 20:07:43
47.9.248.161 attackspam
Unauthorised access (Dec  2) SRC=47.9.248.161 LEN=52 TOS=0x08 PREC=0x20 TTL=109 ID=5190 DF TCP DPT=445 WINDOW=8192 SYN 
Unauthorised access (Dec  2) SRC=47.9.248.161 LEN=52 TOS=0x08 PREC=0x20 TTL=110 ID=20177 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-02 20:05:07
103.133.37.50 attackbots
445/tcp
[2019-12-02]1pkt
2019-12-02 19:58:41
106.12.4.109 attackbots
Dec  2 12:39:32 eventyay sshd[6946]: Failed password for root from 106.12.4.109 port 60422 ssh2
Dec  2 12:46:04 eventyay sshd[7212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.4.109
Dec  2 12:46:06 eventyay sshd[7212]: Failed password for invalid user admin from 106.12.4.109 port 38940 ssh2
...
2019-12-02 19:57:02
171.235.61.38 attackbotsspam
Dec  2 12:07:29 venus sshd\[15158\]: Invalid user sconsole from 171.235.61.38 port 56904
Dec  2 12:07:30 venus sshd\[15158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.235.61.38
Dec  2 12:07:32 venus sshd\[15158\]: Failed password for invalid user sconsole from 171.235.61.38 port 56904 ssh2
...
2019-12-02 20:25:31
81.30.152.54 attackspam
\[2019-12-02 06:59:31\] NOTICE\[2754\] chan_sip.c: Registration from '\' failed for '81.30.152.54:57437' - Wrong password
\[2019-12-02 06:59:31\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-02T06:59:31.702-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="360",SessionID="0x7f26c4a90648",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.30.152.54/57437",Challenge="6055cdc2",ReceivedChallenge="6055cdc2",ReceivedHash="169f13da1a261073964f9acd90c2485c"
\[2019-12-02 07:00:06\] NOTICE\[2754\] chan_sip.c: Registration from '\' failed for '81.30.152.54:57196' - Wrong password
\[2019-12-02 07:00:06\] SECURITY\[2765\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-12-02T07:00:06.926-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="6962",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.30.152.54/5
2019-12-02 20:22:32
139.59.161.78 attack
21 attempts against mh-ssh on cloud.magehost.pro
2019-12-02 20:22:00
147.135.255.107 attack
Dec  2 01:54:23 hanapaa sshd\[23165\]: Invalid user vandagriff from 147.135.255.107
Dec  2 01:54:23 hanapaa sshd\[23165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3085217.ip-147-135-255.eu
Dec  2 01:54:25 hanapaa sshd\[23165\]: Failed password for invalid user vandagriff from 147.135.255.107 port 55452 ssh2
Dec  2 02:00:17 hanapaa sshd\[23862\]: Invalid user jillian from 147.135.255.107
Dec  2 02:00:17 hanapaa sshd\[23862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3085217.ip-147-135-255.eu
2019-12-02 20:12:01
124.123.69.67 attack
445/tcp
[2019-12-02]1pkt
2019-12-02 20:21:02

Recently Reported IPs

8.130.133.39 114.66.13.13 2606:4700:10::6814:6751 14.207.194.100
2606:4700:10::6814:7232 2606:4700:10::6814:8379 114.66.43.13 2606:4700:10::ac43:2161
2606:4700:10::6814:4413 2606:4700:10::ac43:1648 2606:4700:10::6814:9705 2606:4700:10::6814:6988
2606:4700:10::6816:1321 2606:4700:10::6814:5701 2606:4700:10::6814:8096 121.230.89.189
2606:4700:10::6814:5919 2606:4700:10::6814:5472 2606:4700:10::6816:2323 122.193.247.191