Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Barcelona

Region: Catalunya

Country: Spain

Internet Service Provider: Movistar

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '212.170.112.8 - 212.170.112.15'

% Abuse contact for '212.170.112.8 - 212.170.112.15' is 'nemesys@telefonica.es'

inetnum:        212.170.112.8 - 212.170.112.15
netname:        a75800776
descr:          07081111231458
country:        ES
admin-c:        TE3684-RIPE
tech-c:         TE3684-RIPE
status:         ASSIGNED PA
mnt-by:         MAINT-AS3352
created:        2025-07-15T05:45:08Z
last-modified:  2025-08-01T04:57:36Z
source:         RIPE

person:         a75800776 a75800776
address:        75800776
address:        75800776
address:        75800776
address:        75800776
phone:          +34609901489
fax-no:         +34
nic-hdl:        TE3684-RIPE
mnt-by:         MAINT-AS3352
created:        2025-03-17T11:27:33Z
last-modified:  2025-03-17T11:27:33Z
source:         RIPE # Filtered

% Information related to '212.170.0.0/16AS3352'

route:          212.170.0.0/16
descr:          TDENET (Red de servicios IP)
origin:         AS3352
mnt-by:         MAINT-AS3352
mnt-routes:     MAINT-AS3352
mnt-lower:      MAINT-AS3352
created:        2002-03-13T15:00:02Z
last-modified:  2006-06-22T09:44:31Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (ABERDEEN)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.170.112.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53896
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.170.112.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 16:58:44 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 11.112.170.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.112.170.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.177.111.67 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:31.
2020-03-18 23:30:15
14.185.8.65 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:32.
2020-03-18 23:29:30
183.83.239.54 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:36.
2020-03-18 23:16:10
212.174.57.49 attack
Honeypot attack, port: 81, PTR: 212.174.57.49.static.ttnet.com.tr.
2020-03-18 23:27:06
49.149.97.200 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:44.
2020-03-18 23:00:22
94.243.123.17 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:47.
2020-03-18 22:53:16
42.91.12.230 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:42.
2020-03-18 23:03:41
164.77.131.165 attack
SSH login attempts with user root.
2020-03-18 23:27:30
177.135.23.203 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:33.
2020-03-18 23:22:54
89.207.110.243 attackbots
Email rejected due to spam filtering
2020-03-18 23:31:39
180.242.215.172 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:35.
2020-03-18 23:17:45
222.186.175.148 attackbots
Mar 18 15:58:54 vpn01 sshd[13272]: Failed password for root from 222.186.175.148 port 22976 ssh2
Mar 18 15:59:08 vpn01 sshd[13272]: error: maximum authentication attempts exceeded for root from 222.186.175.148 port 22976 ssh2 [preauth]
...
2020-03-18 23:08:09
168.121.102.106 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:32.
2020-03-18 23:24:55
61.177.172.128 attackspambots
Mar 18 10:55:41 ny01 sshd[7976]: Failed password for root from 61.177.172.128 port 37787 ssh2
Mar 18 10:55:44 ny01 sshd[7976]: Failed password for root from 61.177.172.128 port 37787 ssh2
Mar 18 10:55:48 ny01 sshd[7976]: Failed password for root from 61.177.172.128 port 37787 ssh2
Mar 18 10:55:56 ny01 sshd[7976]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 37787 ssh2 [preauth]
2020-03-18 23:19:46
94.49.60.67 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 18-03-2020 13:10:48.
2020-03-18 22:52:22

Recently Reported IPs

82.145.117.233 2606:4700:10::6814:4998 2606:4700:10::6814:4814 2606:4700:10::6816:3322
2606:4700:10::6814:8583 2606:4700:10::6814:6878 2606:4700:10::6814:4512 2606:4700:10::6814:6341
2606:4700:10::6814:7617 2606:4700:10::6814:5779 110.78.150.134 2606:4700:10::6816:1133
2606:4700:10::ac43:1279 172.17.20.83 68.221.139.109 113.194.49.28
154.194.211.18 23.59.137.33 34.65.123.90 10.192.31.123