必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Daimiel

省份(region): Comunidad Autónoma de Castilla-La Mancha

国家(country): Spain

运营商(isp): Aire Networks del Mediterráneo, S.L.U.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '109.167.82.0 - 109.167.82.255'

% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'

inetnum:        109.167.82.0 - 109.167.82.255
netname:        AIONARAHALCBLE-NET-2
geoloc:         37.2592771 -5.5434645
country:        ES
admin-c:        AT14223-RIPE
tech-c:         JRV40-RIPE
status:         ASSIGNED PA
mnt-by:         SERVIHOSTING-MNT
created:        2015-12-02T10:52:39Z
last-modified:  2026-01-13T12:52:14Z
source:         RIPE

role:           Airenetworks
address:        C/Santiago Ramojn y Cajal 11
org:            ORG-SNS2-RIPE
nic-hdl:        AT14223-RIPE
abuse-mailbox:  abuse@servihosting.es
mnt-by:         SERVIHOSTING-MNT
created:        2017-08-25T09:33:41Z
last-modified:  2018-06-07T10:31:17Z
source:         RIPE # Filtered
admin-c:        JMG35-RIPE
admin-c:        ZGC2-RIPE
tech-c:         EGC5-RIPE

person:         Javier Roiz Vazquez
address:        Avda Reina de las Marismas,2
phone:          +34623407327
nic-hdl:        JRV40-RIPE
mnt-by:         lir-es-codipro-1-MNT
created:        2025-11-20T16:42:00Z
last-modified:  2025-11-20T16:42:00Z
source:         RIPE

% Information related to '109.167.82.0/24AS213686'

route:          109.167.82.0/24
origin:         AS213686
mnt-by:         SERVIHOSTING-MNT
created:        2025-12-02T10:45:57Z
last-modified:  2025-12-02T10:45:57Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.101
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42834
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.167.82.101.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040100 1800 900 604800 86400

;; Query time: 27 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 23:04:17 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
101.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
101.82.167.109.in-addr.arpa	name = aiontelecomunicaciones.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
67.205.144.236 attack
Automatic report - Banned IP Access
2020-01-29 16:42:08
221.143.48.143 attack
Unauthorized connection attempt detected from IP address 221.143.48.143 to port 2220 [J]
2020-01-29 16:03:48
45.55.86.19 attackbotsspam
Jan 29 10:00:00 pkdns2 sshd\[9206\]: Invalid user suhas from 45.55.86.19Jan 29 10:00:02 pkdns2 sshd\[9206\]: Failed password for invalid user suhas from 45.55.86.19 port 52727 ssh2Jan 29 10:02:24 pkdns2 sshd\[9386\]: Invalid user iri from 45.55.86.19Jan 29 10:02:26 pkdns2 sshd\[9386\]: Failed password for invalid user iri from 45.55.86.19 port 35526 ssh2Jan 29 10:04:55 pkdns2 sshd\[9471\]: Invalid user nabhasindhu from 45.55.86.19Jan 29 10:04:56 pkdns2 sshd\[9471\]: Failed password for invalid user nabhasindhu from 45.55.86.19 port 46558 ssh2
...
2020-01-29 16:10:42
192.42.116.23 attackspam
Automatic report - Banned IP Access
2020-01-29 16:32:24
182.74.69.251 attackspam
Unauthorized connection attempt detected from IP address 182.74.69.251 to port 23 [J]
2020-01-29 16:21:24
207.154.246.51 attackspambots
Unauthorized connection attempt detected from IP address 207.154.246.51 to port 2220 [J]
2020-01-29 16:29:03
203.195.178.83 attackspambots
Jan 29 08:59:53 lnxmail61 sshd[5804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.178.83
2020-01-29 16:01:51
103.15.62.171 attackspambots
20/1/29@01:26:01: FAIL: Alarm-Network address from=103.15.62.171
...
2020-01-29 16:03:30
200.60.60.84 attackbots
Jan 29 05:49:17 lnxded64 sshd[4122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.60.84
Jan 29 05:49:19 lnxded64 sshd[4122]: Failed password for invalid user vidvala from 200.60.60.84 port 34779 ssh2
Jan 29 05:51:53 lnxded64 sshd[4742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.60.60.84
2020-01-29 16:05:16
112.85.42.185 attack
Jan 29 07:44:31 odroid64 sshd\[13298\]: User root from 112.85.42.185 not allowed because not listed in AllowUsers
Jan 29 07:44:32 odroid64 sshd\[13298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.185  user=root
...
2020-01-29 16:30:01
80.82.77.33 attackspam
Jan 29 08:48:29 debian-2gb-nbg1-2 kernel: \[2543374.060588\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.33 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=120 ID=64772 PROTO=TCP SPT=27153 DPT=992 WINDOW=43451 RES=0x00 SYN URGP=0
2020-01-29 16:11:58
27.79.147.179 attackspam
[Wed Jan 29 04:51:23.332425 2020] [authz_core:error] [pid 14835] [client 27.79.147.179:7471] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org
[Wed Jan 29 04:51:23.888067 2020] [authz_core:error] [pid 15125] [client 27.79.147.179:7497] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org
[Wed Jan 29 04:51:24.432470 2020] [authz_core:error] [pid 15181] [client 27.79.147.179:7523] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/, referer: http://wwww.rncbc.org
...
2020-01-29 16:27:10
128.199.84.201 attack
Jan 29 07:28:31 mout sshd[29669]: Invalid user kartik from 128.199.84.201 port 36366
2020-01-29 16:16:40
36.77.52.8 attack
1580273501 - 01/29/2020 05:51:41 Host: 36.77.52.8/36.77.52.8 Port: 445 TCP Blocked
2020-01-29 16:13:59
159.203.27.98 attackspambots
Jan 29 08:54:42 * sshd[24338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.27.98
Jan 29 08:54:44 * sshd[24338]: Failed password for invalid user lee from 159.203.27.98 port 33894 ssh2
2020-01-29 16:02:44

最近上报的IP列表

2606:4700:10::6816:1442 2606:4700:10::6814:9355 2606:4700:10::6814:9410 2606:4700:10::6814:9993
249.227.250.167 210.196.174.22 197.16.98.216 190.5.48.110
66.132.172.221 18.202.22.59 43.205.213.93 162.9.179.11
147.53.78.1 20.104.69.172 213.180.193.135 2606:4700:10::6814:8867
2606:4700:10::ac43:705 2606:4700:10::6814:5347 2606:4700:10::6814:8778 2606:4700:10::6816:2663