City: Daimiel
Region: Comunidad Autónoma de Castilla-La Mancha
Country: Spain
Internet Service Provider: Aire Networks del Mediterráneo, S.L.U.
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '109.167.82.0 - 109.167.82.255'
% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'
inetnum: 109.167.82.0 - 109.167.82.255
netname: AIONARAHALCBLE-NET-2
geoloc: 37.2592771 -5.5434645
country: ES
admin-c: AT14223-RIPE
tech-c: JRV40-RIPE
status: ASSIGNED PA
mnt-by: SERVIHOSTING-MNT
created: 2015-12-02T10:52:39Z
last-modified: 2026-01-13T12:52:14Z
source: RIPE
role: Airenetworks
address: C/Santiago Ramojn y Cajal 11
org: ORG-SNS2-RIPE
nic-hdl: AT14223-RIPE
abuse-mailbox: abuse@servihosting.es
mnt-by: SERVIHOSTING-MNT
created: 2017-08-25T09:33:41Z
last-modified: 2018-06-07T10:31:17Z
source: RIPE # Filtered
admin-c: JMG35-RIPE
admin-c: ZGC2-RIPE
tech-c: EGC5-RIPE
person: Javier Roiz Vazquez
address: Avda Reina de las Marismas,2
phone: +34623407327
nic-hdl: JRV40-RIPE
mnt-by: lir-es-codipro-1-MNT
created: 2025-11-20T16:42:00Z
last-modified: 2025-11-20T16:42:00Z
source: RIPE
% Information related to '109.167.82.0/24AS213686'
route: 109.167.82.0/24
origin: AS213686
mnt-by: SERVIHOSTING-MNT
created: 2025-12-02T10:45:57Z
last-modified: 2025-12-02T10:45:57Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14100
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;109.167.82.62. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032400 1800 900 604800 86400
;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 21:06:51 CST 2026
;; MSG SIZE rcvd: 106
62.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
62.82.167.109.in-addr.arpa name = aiontelecomunicaciones.es.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 184.105.247.243 | attackbotsspam | ¯\_(ツ)_/¯ |
2019-06-24 10:27:52 |
| 185.176.27.186 | attackbots | Port scan attempt detected by AWS-CCS, CTS, India |
2019-06-24 09:57:18 |
| 111.202.100.105 | attackspambots | Flask-IPban - exploit URL requested:/index.php |
2019-06-24 10:32:22 |
| 114.232.43.153 | attackbotsspam | 2019-06-23T18:41:06.102979 X postfix/smtpd[16171]: warning: unknown[114.232.43.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T21:33:43.060551 X postfix/smtpd[39204]: warning: unknown[114.232.43.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 2019-06-23T21:52:22.229434 X postfix/smtpd[41518]: warning: unknown[114.232.43.153]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 |
2019-06-24 10:38:50 |
| 177.130.162.96 | attack | SMTP-sasl brute force ... |
2019-06-24 10:26:02 |
| 159.65.128.166 | attackbots | Automatic report - Web App Attack |
2019-06-24 10:13:10 |
| 13.234.64.194 | attackspam | Automatic report - Web App Attack |
2019-06-24 10:30:57 |
| 199.249.230.70 | attackbotsspam | Brute Force Joomla login page |
2019-06-24 09:59:02 |
| 165.22.121.1 | attackspambots | [portscan] Port scan |
2019-06-24 10:10:02 |
| 185.244.25.247 | attack | DATE:2019-06-23_21:54:54, IP:185.244.25.247, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc) |
2019-06-24 10:07:50 |
| 139.59.5.178 | attackspambots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-06-24 10:22:22 |
| 49.5.3.5 | attack | 2019-06-24T03:35:52.775344centos sshd\[11867\]: Invalid user ryan from 49.5.3.5 port 42920 2019-06-24T03:35:52.780197centos sshd\[11867\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.5.3.5 2019-06-24T03:35:54.968781centos sshd\[11867\]: Failed password for invalid user ryan from 49.5.3.5 port 42920 ssh2 |
2019-06-24 10:00:54 |
| 171.244.43.172 | attack | Jun 24 01:13:40 OPSO sshd\[13358\]: Invalid user git from 171.244.43.172 port 50014 Jun 24 01:13:40 OPSO sshd\[13358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.172 Jun 24 01:13:42 OPSO sshd\[13358\]: Failed password for invalid user git from 171.244.43.172 port 50014 ssh2 Jun 24 01:23:35 OPSO sshd\[14085\]: Invalid user git from 171.244.43.172 port 33892 Jun 24 01:23:35 OPSO sshd\[14085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.172 |
2019-06-24 10:10:20 |
| 185.244.25.212 | attack | " " |
2019-06-24 10:24:29 |
| 36.111.191.73 | attack | Trying ports that it shouldn't be. |
2019-06-24 09:59:29 |