必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Daimiel

省份(region): Comunidad Autónoma de Castilla-La Mancha

国家(country): Spain

运营商(isp): Aire Networks del Mediterráneo, S.L.U.

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '109.167.82.0 - 109.167.82.255'

% Abuse contact for '109.167.82.0 - 109.167.82.255' is 'abuse@airenetworks.es'

inetnum:        109.167.82.0 - 109.167.82.255
netname:        AIONARAHALCBLE-NET-2
geoloc:         37.2592771 -5.5434645
country:        ES
admin-c:        AT14223-RIPE
tech-c:         JRV40-RIPE
status:         ASSIGNED PA
mnt-by:         SERVIHOSTING-MNT
created:        2015-12-02T10:52:39Z
last-modified:  2026-01-13T12:52:14Z
source:         RIPE

role:           Airenetworks
address:        C/Santiago Ramojn y Cajal 11
org:            ORG-SNS2-RIPE
nic-hdl:        AT14223-RIPE
abuse-mailbox:  abuse@servihosting.es
mnt-by:         SERVIHOSTING-MNT
created:        2017-08-25T09:33:41Z
last-modified:  2018-06-07T10:31:17Z
source:         RIPE # Filtered
admin-c:        JMG35-RIPE
admin-c:        ZGC2-RIPE
tech-c:         EGC5-RIPE

person:         Javier Roiz Vazquez
address:        Avda Reina de las Marismas,2
phone:          +34623407327
nic-hdl:        JRV40-RIPE
mnt-by:         lir-es-codipro-1-MNT
created:        2025-11-20T16:42:00Z
last-modified:  2025-11-20T16:42:00Z
source:         RIPE

% Information related to '109.167.82.0/24AS213686'

route:          109.167.82.0/24
origin:         AS213686
mnt-by:         SERVIHOSTING-MNT
created:        2025-12-02T10:45:57Z
last-modified:  2025-12-02T10:45:57Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.167.82.78
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.167.82.78.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042002 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 21 07:06:25 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
78.82.167.109.in-addr.arpa domain name pointer aiontelecomunicaciones.es.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
78.82.167.109.in-addr.arpa	name = aiontelecomunicaciones.es.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
45.141.84.126 attackbots
[LAN access from remote] from 45.141.84.126:11877
2020-08-04 13:16:21
78.128.113.42 attackbotsspam
firewall-block, port(s): 1199/tcp, 3133/tcp, 4844/tcp, 5151/tcp, 6622/tcp, 7277/tcp
2020-08-04 13:02:57
198.211.102.110 attackbotsspam
198.211.102.110 - - [04/Aug/2020:05:31:04 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.102.110 - - [04/Aug/2020:05:58:11 +0200] "POST /xmlrpc.php HTTP/1.1" 403 146 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-04 13:03:40
218.92.0.215 attack
Aug  4 07:01:05 piServer sshd[25109]: Failed password for root from 218.92.0.215 port 53602 ssh2
Aug  4 07:01:08 piServer sshd[25109]: Failed password for root from 218.92.0.215 port 53602 ssh2
Aug  4 07:01:12 piServer sshd[25109]: Failed password for root from 218.92.0.215 port 53602 ssh2
...
2020-08-04 13:05:12
113.185.43.144 attackspambots
08/03/2020-23:58:04.453721 113.185.43.144 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-08-04 13:07:50
106.13.18.86 attackspambots
Aug  4 07:41:59 piServer sshd[29656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86 
Aug  4 07:42:02 piServer sshd[29656]: Failed password for invalid user !234Qwer from 106.13.18.86 port 33982 ssh2
Aug  4 07:45:51 piServer sshd[30044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.18.86 
...
2020-08-04 13:51:35
222.240.1.0 attackspam
$f2bV_matches
2020-08-04 13:17:41
63.82.55.98 attack
Lines containing failures of 63.82.55.98
Aug  4 06:03:03 nbi-636 postfix/smtpd[1916]: connect from outdo.blotsisop.com[63.82.55.98]
Aug x@x
Aug  4 06:03:04 nbi-636 postfix/smtpd[1916]: disconnect from outdo.blotsisop.com[63.82.55.98] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.82.55.98
2020-08-04 13:08:41
198.245.50.81 attack
Aug  4 06:24:07 rancher-0 sshd[758780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.50.81  user=root
Aug  4 06:24:09 rancher-0 sshd[758780]: Failed password for root from 198.245.50.81 port 48708 ssh2
...
2020-08-04 13:08:25
42.119.98.223 attackspam
Port Scan detected!
...
2020-08-04 13:19:24
157.55.39.79 attackspambots
Automatic report - Banned IP Access
2020-08-04 13:28:21
199.187.211.99 attackspambots
4,55-01/03 [bc00/m31] PostRequest-Spammer scoring: zurich
2020-08-04 13:22:41
167.99.66.193 attack
Aug  4 00:58:37 NPSTNNYC01T sshd[4572]: Failed password for root from 167.99.66.193 port 33333 ssh2
Aug  4 01:03:00 NPSTNNYC01T sshd[5263]: Failed password for root from 167.99.66.193 port 39305 ssh2
...
2020-08-04 13:15:30
142.93.229.65 attackspam
lee-Joomla Authentification : try to force the door...
2020-08-04 13:46:48
80.82.64.114 attackspambots
Aug  4 07:22:31 dcd-gentoo sshd[11754]: User root from 80.82.64.114 not allowed because none of user's groups are listed in AllowGroups
Aug  4 07:22:41 dcd-gentoo sshd[11760]: Invalid user oracle from 80.82.64.114 port 53664
Aug  4 07:22:51 dcd-gentoo sshd[11766]: User root from 80.82.64.114 not allowed because none of user's groups are listed in AllowGroups
...
2020-08-04 13:45:27

最近上报的IP列表

70.112.135.163 109.167.82.169 2606:4700:10::6816:2069 2606:4700:10::6816:3608
2606:4700:10::6816:3509 2606:4700:10::6814:9032 2606:4700:10::6814:6705 2606:4700:10::6814:6823
2606:4700:10::6816:775 109.162.246.22 2606:4700:10::6814:9832 2606:4700:10::6814:9614
2606:4700:10::ac43:1329 2606:4700:10::6816:920 162.240.226.121 154.62.122.100
134.35.157.89 2606:4700:10::ac43:2523 2606:4700:10::6814:4703 2606:4700:10::6814:8194