必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 203.242.123.55


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 203.242.120.0 - 203.242.127.255 (/21)
기관명             : SK(주)
서비스명           : SK-NET
주소               : 경기도 성남시 분당구 성남대로343번길 9
우편번호           : 13558
할당일자           : 20000606

이름               : IP주소 담당자
전화번호           : +82-2-6400-4592
전자우편           : sk-net@sk.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 203.242.120.0 - 203.242.127.255 (/21)
기관명             : 에스케이씨
네트워크 구분      : CUSTOMER
주소               : 경기도 수원시 장안구 장안로 309번길 84
우편번호           : 16336
할당내역 등록일    : 20180115

이름               : IP주소 담당자
전화번호           : +82-2-6400-4297
전자우편           : burstsun@sk.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 203.242.120.0 - 203.242.127.255 (/21)
Organization Name  : SK Co.,
Service Name       : SK-NET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Seongnam-daero 343beon-gil 9
Zip Code           : 13558
Registration Date  : 20000606

Name               : IP Manager
Phone              : +82-2-6400-4592
E-Mail             : sk-net@sk.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 203.242.120.0 - 203.242.127.255 (/21)
Organization Name  : SKC
Network Type       : CUSTOMER
Address            : 84 Jangan-ro 309beon-gil Jangan-gu Suwon-si Gyeonggi-do
Zip Code           : 16336
Registration Date  : 20180115

Name               : IP Manager
Phone              : +82-2-6400-4297
E-Mail             : burstsun@sk.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.242.123.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.242.123.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 03:16:16 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 55.123.242.203.in-addr.arpa not found: 2(SERVFAIL)
NSLOOKUP信息:
server can't find 203.242.123.55.in-addr.arpa: SERVFAIL
相关IP信息:
最新评论:
IP 类型 评论内容 时间
107.189.2.3 attackbotsspam
WordPress brute force
2020-06-07 05:56:02
61.165.136.170 attackspambots
Unauthorized connection attempt from IP address 61.165.136.170 on Port 445(SMB)
2020-06-07 05:48:09
122.51.87.224 attackspam
WordPress brute force
2020-06-07 05:53:49
113.111.80.112 attackspambots
WordPress brute force
2020-06-07 05:55:30
160.16.147.188 attackspam
xmlrpc attack
2020-06-07 05:49:13
14.29.214.3 attack
Jun  6 23:43:44 legacy sshd[13707]: Failed password for root from 14.29.214.3 port 38542 ssh2
Jun  6 23:48:17 legacy sshd[13932]: Failed password for root from 14.29.214.3 port 34143 ssh2
...
2020-06-07 05:58:22
110.232.95.199 attackspambots
Zyxel Multiple Products Command Injection Vulnerability
2020-06-07 05:21:55
68.183.85.196 attack
WordPress brute force
2020-06-07 05:26:44
185.21.41.131 attackbots
WordPress brute force
2020-06-07 05:40:19
107.158.92.60 attack
WordPress brute force
2020-06-07 05:57:57
167.172.198.117 attackspam
WordPress brute force
2020-06-07 05:47:15
103.38.15.8 attackspam
Unauthorized connection attempt from IP address 103.38.15.8 on Port 445(SMB)
2020-06-07 05:31:02
182.180.128.132 attackbotsspam
(sshd) Failed SSH login from 182.180.128.132 (PK/Pakistan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  6 22:25:42 amsweb01 sshd[9717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.132  user=root
Jun  6 22:25:45 amsweb01 sshd[9717]: Failed password for root from 182.180.128.132 port 46686 ssh2
Jun  6 22:41:25 amsweb01 sshd[13133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.132  user=root
Jun  6 22:41:27 amsweb01 sshd[13133]: Failed password for root from 182.180.128.132 port 57364 ssh2
Jun  6 22:45:19 amsweb01 sshd[14590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.180.128.132  user=root
2020-06-07 05:53:05
139.138.9.250 attack
Scanning an empty webserver with deny all robots.txt
2020-06-07 05:20:10
72.10.34.44 attackbotsspam
WordPress brute force
2020-06-07 05:25:20

最近上报的IP列表

103.242.215.138 40.124.173.171 128.1.44.106 14.205.104.200
97.149.179.88 97.149.179.248 97.149.179.27 98.94.64.78
44.212.70.191 159.75.166.146 35.172.190.251 180.153.236.246
157.245.247.18 128.14.226.191 17.246.19.56 17.246.19.157
190.149.90.177 10.3.3.87 180.153.236.27 180.153.236.171