Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daimiel

Region: Comunidad Autónoma de Castilla-La Mancha

Country: Spain

Internet Service Provider: Aire Networks del Mediterráneo, S.L.U.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '109.167.82.0 - 109.167.82.255'

% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'

inetnum:        109.167.82.0 - 109.167.82.255
netname:        AIONARAHALCBLE-NET-2
geoloc:         37.2592771 -5.5434645
country:        ES
admin-c:        AT14223-RIPE
tech-c:         JRV40-RIPE
status:         ASSIGNED PA
mnt-by:         SERVIHOSTING-MNT
created:        2015-12-02T10:52:39Z
last-modified:  2026-01-13T12:52:14Z
source:         RIPE

role:           Airenetworks
address:        C/Santiago Ramojn y Cajal 11
org:            ORG-SNS2-RIPE
nic-hdl:        AT14223-RIPE
abuse-mailbox:  abuse@servihosting.es
mnt-by:         SERVIHOSTING-MNT
created:        2017-08-25T09:33:41Z
last-modified:  2018-06-07T10:31:17Z
source:         RIPE # Filtered
admin-c:        JMG35-RIPE
admin-c:        ZGC2-RIPE
tech-c:         EGC5-RIPE

person:         Javier Roiz Vazquez
address:        Avda Reina de las Marismas,2
phone:          +34623407327
nic-hdl:        JRV40-RIPE
mnt-by:         lir-es-codipro-1-MNT
created:        2025-11-20T16:42:00Z
last-modified:  2025-11-20T16:42:00Z
source:         RIPE

% Information related to '109.167.82.0/24AS213686'

route:          109.167.82.0/24
origin:         AS213686
mnt-by:         SERVIHOSTING-MNT
created:        2025-12-02T10:45:57Z
last-modified:  2025-12-02T10:45:57Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.171
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13851
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.167.82.171.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032700 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 01:05:31 CST 2026
;; MSG SIZE  rcvd: 107
Host info
171.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
171.82.167.109.in-addr.arpa	name = aiontelecomunicaciones.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
61.12.74.190 attack
445/tcp 1433/tcp
[2020-03-02/16]2pkt
2020-03-17 05:38:39
58.216.156.195 attack
1433/tcp 1433/tcp 1433/tcp
[2020-02-17/03-16]3pkt
2020-03-17 05:26:46
132.232.40.86 attack
Mar 16 15:06:05 ns382633 sshd\[19728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86  user=root
Mar 16 15:06:07 ns382633 sshd\[19728\]: Failed password for root from 132.232.40.86 port 37274 ssh2
Mar 16 15:48:43 ns382633 sshd\[24153\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86  user=root
Mar 16 15:48:45 ns382633 sshd\[24153\]: Failed password for root from 132.232.40.86 port 45506 ssh2
Mar 16 16:01:03 ns382633 sshd\[25707\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.40.86  user=root
2020-03-17 05:40:02
110.249.223.39 attackbots
Mar 16 17:05:43 vps647732 sshd[6206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.249.223.39
Mar 16 17:05:45 vps647732 sshd[6206]: Failed password for invalid user HTTP from 110.249.223.39 port 42690 ssh2
...
2020-03-17 05:34:09
103.36.18.100 attackspambots
1433/tcp 1433/tcp
[2020-02-12/03-16]2pkt
2020-03-17 05:29:14
62.210.185.4 attack
62.210.185.4 - - [16/Mar/2020:23:08:28 +0300] "POST /wp-login.php HTTP/1.1" 200 2790 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-17 05:06:32
103.244.121.5 attackbots
Mar 16 21:28:23 mout sshd[14554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.244.121.5  user=root
Mar 16 21:28:25 mout sshd[14554]: Failed password for root from 103.244.121.5 port 56956 ssh2
2020-03-17 05:09:53
134.34.192.106 attackspam
Chat Spam
2020-03-17 05:15:10
223.197.225.176 attackbots
37215/tcp 37215/tcp
[2020-01-28/03-16]2pkt
2020-03-17 05:22:09
123.124.71.107 attackbotsspam
03/16/2020-10:37:08.979522 123.124.71.107 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-17 05:31:41
185.176.27.102 attackspam
03/16/2020-16:50:38.353500 185.176.27.102 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-17 05:06:19
50.250.116.235 attackbots
Mar 16 16:37:49 ws24vmsma01 sshd[65948]: Failed password for root from 50.250.116.235 port 38766 ssh2
...
2020-03-17 05:35:48
185.176.27.14 attackbots
Mar 16 21:33:25 debian-2gb-nbg1-2 kernel: \[6649924.428889\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.14 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52397 PROTO=TCP SPT=48502 DPT=2500 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-17 05:01:03
211.72.81.172 attackspam
1433/tcp 445/tcp 1433/tcp
[2020-02-13/03-16]3pkt
2020-03-17 05:41:10
148.204.63.133 attack
$f2bV_matches
2020-03-17 05:09:22

Recently Reported IPs

2606:4700:10::6816:3371 2606:4700:10::6816:4034 2606:4700:10::6814:5336 2606:4700:10::ac43:260e
2606:4700:10::6814:9783 2606:4700:10::ac43:2886 2606:4700:10::ac43:89e 2606:4700:10::6814:5860
109.162.251.229 2606:4700:10::6814:5748 2606:4700:10::6814:9905 2606:4700:10::ac43:2604
2606:4700:10::6814:6208 190.194.63.8 86.20.184.253 110.249.202.39
211.216.88.34 66.132.172.143 14.207.1.206 10.56.104.119