Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Daimiel

Region: Comunidad Autónoma de Castilla-La Mancha

Country: Spain

Internet Service Provider: Aire Networks del Mediterráneo, S.L.U.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '109.167.82.0 - 109.167.82.255'

% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'

inetnum:        109.167.82.0 - 109.167.82.255
netname:        AIONARAHALCBLE-NET-2
geoloc:         37.2592771 -5.5434645
country:        ES
admin-c:        AT14223-RIPE
tech-c:         JRV40-RIPE
status:         ASSIGNED PA
mnt-by:         SERVIHOSTING-MNT
created:        2015-12-02T10:52:39Z
last-modified:  2026-01-13T12:52:14Z
source:         RIPE

role:           Airenetworks
address:        C/Santiago Ramojn y Cajal 11
org:            ORG-SNS2-RIPE
nic-hdl:        AT14223-RIPE
abuse-mailbox:  abuse@servihosting.es
mnt-by:         SERVIHOSTING-MNT
created:        2017-08-25T09:33:41Z
last-modified:  2018-06-07T10:31:17Z
source:         RIPE # Filtered
admin-c:        JMG35-RIPE
admin-c:        ZGC2-RIPE
tech-c:         EGC5-RIPE

person:         Javier Roiz Vazquez
address:        Avda Reina de las Marismas,2
phone:          +34623407327
nic-hdl:        JRV40-RIPE
mnt-by:         lir-es-codipro-1-MNT
created:        2025-11-20T16:42:00Z
last-modified:  2025-11-20T16:42:00Z
source:         RIPE

% Information related to '109.167.82.0/24AS213686'

route:          109.167.82.0/24
origin:         AS213686
mnt-by:         SERVIHOSTING-MNT
created:        2025-12-02T10:45:57Z
last-modified:  2025-12-02T10:45:57Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61412
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.167.82.98.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031802 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 09:04:26 CST 2026
;; MSG SIZE  rcvd: 106
Host info
98.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
98.82.167.109.in-addr.arpa	name = aiontelecomunicaciones.es.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
119.123.28.81 attackspam
Jan 10 05:49:11 grey postfix/smtpd\[32661\]: NOQUEUE: reject: RCPT from unknown\[119.123.28.81\]: 554 5.7.1 Service unavailable\; Client host \[119.123.28.81\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?119.123.28.81\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-10 19:05:47
182.254.172.159 attackbots
Jan 10 06:39:07 ns381471 sshd[6011]: Failed password for root from 182.254.172.159 port 58710 ssh2
Jan 10 06:43:04 ns381471 sshd[6093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.172.159
2020-01-10 19:03:20
180.76.150.29 attack
Brute-force attempt banned
2020-01-10 18:59:45
46.17.105.186 attackspam
01/09/2020-23:49:21.731931 46.17.105.186 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-10 18:57:45
159.203.201.227 attack
firewall-block, port(s): 17758/tcp
2020-01-10 18:51:09
74.82.47.7 attackspam
23/tcp 30005/tcp 389/tcp...
[2019-11-10/2020-01-09]44pkt,13pt.(tcp),2pt.(udp)
2020-01-10 18:38:31
124.156.50.111 attackspam
SIP/5060 Probe, BF, Hack -
2020-01-10 19:14:48
45.168.35.229 attackspambots
v+ssh-bruteforce
2020-01-10 18:42:38
188.166.251.156 attackbotsspam
Jan 10 05:49:23 mail sshd[415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.156  user=root
Jan 10 05:49:25 mail sshd[415]: Failed password for root from 188.166.251.156 port 35868 ssh2
...
2020-01-10 18:53:55
182.61.28.191 attackspambots
SSH brutforce
2020-01-10 19:14:15
202.163.116.138 attackspam
Jan 10 09:02:54 grey postfix/smtpd\[24410\]: NOQUEUE: reject: RCPT from unknown\[202.163.116.138\]: 554 5.7.1 Service unavailable\; Client host \[202.163.116.138\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?202.163.116.138\; from=\ to=\ proto=ESMTP helo=\<\[202.163.116.138\]\>
...
2020-01-10 19:09:35
185.239.238.129 attackspam
2020-01-10T10:48:43.801990shield sshd\[8332\]: Invalid user a from 185.239.238.129 port 49756
2020-01-10T10:48:43.807099shield sshd\[8332\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.238.129
2020-01-10T10:48:45.504149shield sshd\[8332\]: Failed password for invalid user a from 185.239.238.129 port 49756 ssh2
2020-01-10T10:49:21.428782shield sshd\[8390\]: Invalid user finger from 185.239.238.129 port 60546
2020-01-10T10:49:21.433624shield sshd\[8390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.239.238.129
2020-01-10 18:57:14
39.164.161.51 attack
Unauthorized connection attempt detected from IP address 39.164.161.51 to port 1433 [T]
2020-01-10 19:06:19
185.176.27.18 attackspambots
01/10/2020-05:25:15.853117 185.176.27.18 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-10 18:48:49
185.176.27.2 attackbotsspam
01/10/2020-06:10:13.409974 185.176.27.2 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-10 19:12:50

Recently Reported IPs

2606:4700:10::6814:9449 2606:4700:10::ac43:2933 91.231.89.189 91.196.152.240
91.196.152.203 8.159.137.112 238.200.27.165 31.209.53.6
172.237.102.140 70.39.195.129 2606:4700:10::6816:1863 2606:4700:10::ac43:2747
2606:4700:10::6816:4326 2606:4700:10::6816:2671 2606:4700:10::6816:1385 193.51.233.144
13.234.23.56 122.161.78.251 111.55.74.27 192.168.212.239