Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: La Laguna

Region: Comunidad Autónoma de Canarias

Country: Spain

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '82.213.152.0 - 82.213.155.255'

% Abuse contact for '82.213.152.0 - 82.213.155.255' is 'abuse@corp.vodafone.es'

inetnum:        82.213.152.0 - 82.213.155.255
netname:        ONO
descr:          NAVARRA
descr:          Clientes de cablemodem
country:        ES
admin-c:        OIM1-RIPE
tech-c:         OIM1-RIPE
status:         ASSIGNED PA
mnt-by:         ONO-MNT
created:        2003-10-29T16:53:23Z
last-modified:  2021-05-19T08:27:49Z
source:         RIPE # Filtered

role:           VODAFONE ONO IP MANAGER
address:        Avenida de Amrica 115
address:        E-28042 Madrid
address:        SPAIN
phone:          +34 607 13 33 33
nic-hdl:        OIM1-RIPE
mnt-by:         ONO-MNT
created:        2002-09-25T09:49:21Z
last-modified:  2025-07-03T07:26:59Z
source:         RIPE # Filtered

% Information related to '82.213.128.0/18AS12430'

route:          82.213.128.0/18
origin:         AS12430
mnt-by:         AIRTELNET-MNT
created:        2021-09-30T07:01:29Z
last-modified:  2021-09-30T07:01:29Z
source:         RIPE

% Information related to '82.213.128.0/18AS6739'

route:          82.213.128.0/18
descr:          Ono
descr:          www.ono.es
descr:          CABLEUROPA S.A.U
descr:          C/ Emisora, 20
descr:          28224 Pozuelo de Alarcn
descr:          Madrid
descr:          SPAIN
origin:         AS6739
mnt-by:         ONO-MNT
created:        2010-04-06T09:14:03Z
last-modified:  2014-04-17T10:02:30Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121 (BUSA)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 82.213.153.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25366
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;82.213.153.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031000 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 10 15:30:18 CST 2026
;; MSG SIZE  rcvd: 107
Host info
144.153.213.82.in-addr.arpa domain name pointer 82.213.153.144.dyn.user.ono.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.153.213.82.in-addr.arpa	name = 82.213.153.144.dyn.user.ono.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
177.1.249.144 attack
Sep 22 08:10:22 sip sshd[14746]: Failed password for root from 177.1.249.144 port 45406 ssh2
Sep 22 19:00:50 sip sshd[26694]: Failed password for root from 177.1.249.144 port 56790 ssh2
2020-09-23 23:20:16
159.203.190.189 attackspambots
Invalid user user from 159.203.190.189 port 59332
2020-09-23 23:23:32
178.57.84.202 attack
Unauthorised access (Sep 23) SRC=178.57.84.202 LEN=52 TTL=117 ID=19371 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-23 23:31:13
112.85.42.102 attack
Sep 23 15:01:47 vps-51d81928 sshd[327978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 23 15:01:49 vps-51d81928 sshd[327978]: Failed password for root from 112.85.42.102 port 26183 ssh2
Sep 23 15:01:47 vps-51d81928 sshd[327978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.102  user=root
Sep 23 15:01:49 vps-51d81928 sshd[327978]: Failed password for root from 112.85.42.102 port 26183 ssh2
Sep 23 15:01:52 vps-51d81928 sshd[327978]: Failed password for root from 112.85.42.102 port 26183 ssh2
...
2020-09-23 23:03:55
120.131.13.186 attackspam
Invalid user test from 120.131.13.186 port 40102
2020-09-23 23:27:11
150.109.100.65 attack
Hits on port : 24236
2020-09-23 23:34:55
159.65.181.225 attack
Failed password for root from 159.65.181.225 port 41530
2020-09-23 23:41:36
187.45.103.15 attackspam
Invalid user caixa from 187.45.103.15 port 48327
2020-09-23 23:05:33
68.175.59.13 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-23 23:06:38
112.85.42.174 attackbots
(sshd) Failed SSH login from 112.85.42.174 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 10:41:35 optimus sshd[14697]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep 23 10:41:35 optimus sshd[14680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep 23 10:41:35 optimus sshd[14696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep 23 10:41:35 optimus sshd[14694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Sep 23 10:41:36 optimus sshd[14691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
2020-09-23 22:59:52
155.159.252.25 attack
Sep 23 14:27:06 server sshd[27622]: Failed password for root from 155.159.252.25 port 32984 ssh2
Sep 23 14:30:10 server sshd[28365]: Failed password for invalid user ubuntu from 155.159.252.25 port 55528 ssh2
Sep 23 14:33:18 server sshd[28973]: Failed password for invalid user jun from 155.159.252.25 port 48082 ssh2
2020-09-23 23:09:36
178.16.150.138 attackspam
Unauthorized connection attempt from IP address 178.16.150.138 on Port 445(SMB)
2020-09-23 23:33:32
177.12.28.111 attack
Unauthorized connection attempt from IP address 177.12.28.111 on Port 445(SMB)
2020-09-23 23:37:56
183.82.96.76 attackspam
Invalid user pascal from 183.82.96.76 port 12114
2020-09-23 23:26:12
213.5.134.14 attackspambots
445/tcp 445/tcp
[2020-09-16/23]2pkt
2020-09-23 23:00:14

Recently Reported IPs

77.68.6.216 123.220.94.80 147.185.133.163 188.166.219.219
165.232.43.198 143.198.165.121 80.94.92.158 107.172.20.103
167.172.149.199 167.172.90.204 60.190.252.115 104.28.94.138
146.190.82.177 110.38.242.96 60.190.252.139 192.168.50.17
205.198.70.172 230.160.191.239 157.245.197.148 208.80.248.25