必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Ansan-si

省份(region): Gyeonggi-do

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 210.182.22.112


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 210.182.0.0 - 210.182.255.255 (/16)
기관명             : (주)엘지유플러스
서비스명           : BORANET
주소               : 서울특별시 용산구 한강대로 32
우편번호           : 04389
할당일자           : 20030402

이름               : IP주소 담당자
전화번호           : +82-2-1-01
전자우편           : ipadm@lguplus.co.kr

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 210.182.22.0 - 210.182.22.255 (/24)
기관명             : LG유플러스
네트워크 구분      : CUSTOMER
주소               : 경기도 안양시 만안구 덕천로 37
우편번호           : 14088
할당내역 등록일    : 20141010

이름               : IP주소 담당자
전화번호           : +82-2-2089-7750
전자우편           : b8273338@user.bora.net


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 210.182.0.0 - 210.182.255.255 (/16)
Organization Name  : LG DACOM Corporation
Service Name       : BORANET
Address            : Seoul Yongsan-gu Hangang-daero 32
Zip Code           : 04389
Registration Date  : 20030402

Name               : IP Manager
Phone              : +82-2-1-01
E-Mail             : ipadm@lguplus.co.kr

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 210.182.22.0 - 210.182.22.255 (/24)
Organization Name  : LG Uplus
Network Type       : CUSTOMER
Address            : Gyeonggi-do Manan-gu, Anyang-si Deokcheon-ro 37
Zip Code           : 14088
Registration Date  : 20141010

Name               : IP Manager
Phone              : +82-2-2089-7750
E-Mail             : b8273338@user.bora.net


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.182.22.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63672
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;210.182.22.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 14:21:49 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 112.22.182.210.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.22.182.210.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
54.171.126.200 attackspambots
ang 54.171.126.200 [10/Oct/2020:13:19:06 "-" "GET /wp-login.php 200 6716
54.171.126.200 [11/Oct/2020:03:41:04 "-" "GET /wp-login.php 200 2758
54.171.126.200 [11/Oct/2020:03:41:51 "-" "POST /wp-login.php 200 2876
2020-10-11 10:00:44
118.25.27.67 attackbots
Oct 10 16:45:14 mail sshd\[23539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.27.67  user=root
...
2020-10-11 10:06:33
95.110.129.91 attackspambots
MYH,DEF GET /wp-login.php
2020-10-11 10:22:58
140.206.55.6 attackbotsspam
Oct 11 05:48:57 dhoomketu sshd[3740972]: Invalid user odoo from 140.206.55.6 port 11403
Oct 11 05:48:57 dhoomketu sshd[3740972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.206.55.6 
Oct 11 05:48:57 dhoomketu sshd[3740972]: Invalid user odoo from 140.206.55.6 port 11403
Oct 11 05:48:59 dhoomketu sshd[3740972]: Failed password for invalid user odoo from 140.206.55.6 port 11403 ssh2
Oct 11 05:51:46 dhoomketu sshd[3741049]: Invalid user odoo from 140.206.55.6 port 5675
...
2020-10-11 10:20:11
120.237.140.219 attackspambots
Oct 11 01:42:53 vps647732 sshd[6009]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.237.140.219
Oct 11 01:42:56 vps647732 sshd[6009]: Failed password for invalid user digi-user from 120.237.140.219 port 63211 ssh2
...
2020-10-11 10:11:06
103.84.233.67 attack
Port Scan: TCP/443
2020-10-11 10:12:57
187.123.232.164 attackbots
187.123.232.164 - - [10/Oct/2020:21:45:14 +0100] "POST /wp-login.php HTTP/1.1" 200 2556 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
187.123.232.164 - - [10/Oct/2020:21:45:18 +0100] "POST /wp-login.php HTTP/1.1" 200 2558 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
187.123.232.164 - - [10/Oct/2020:21:45:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2533 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-11 09:58:41
51.210.242.109 attackbotsspam
Oct 11 07:40:41 dhoomketu sshd[3747103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.242.109 
Oct 11 07:40:41 dhoomketu sshd[3747103]: Invalid user newpass from 51.210.242.109 port 37368
Oct 11 07:40:43 dhoomketu sshd[3747103]: Failed password for invalid user newpass from 51.210.242.109 port 37368 ssh2
Oct 11 07:44:01 dhoomketu sshd[3747226]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.210.242.109  user=root
Oct 11 07:44:02 dhoomketu sshd[3747226]: Failed password for root from 51.210.242.109 port 42052 ssh2
...
2020-10-11 10:16:30
112.85.42.233 attackbots
 TCP (SYN) 112.85.42.233:34492 -> port 22, len 40
2020-10-11 10:20:45
45.83.65.113 attackspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-11 09:57:52
180.76.248.85 attack
Failed password for invalid user teacher from 180.76.248.85 port 58092 ssh2
2020-10-11 10:07:59
185.220.101.202 attackspambots
21 attempts against mh-misbehave-ban on sonic
2020-10-11 09:51:16
85.208.96.65 attack
Automatic report - Banned IP Access
2020-10-11 09:56:48
42.117.57.45 attack
Unauthorised access (Oct 10) SRC=42.117.57.45 LEN=40 TOS=0x10 PREC=0x40 TTL=51 ID=45740 TCP DPT=23 WINDOW=44133 SYN
2020-10-11 10:19:03
164.90.226.53 attack
DATE:2020-10-11 02:24:45, IP:164.90.226.53, PORT:ssh SSH brute force auth (docker-dc)
2020-10-11 10:00:20

最近上报的IP列表

122.192.203.58 195.50.181.206 193.112.219.164 222.106.204.211
191.7.81.112 137.238.33.133 129.171.203.126 202.160.94.5
120.1.1.172 113.187.86.110 113.187.86.121 2606:4700:10::6816:2452
2606:4700:10::6816:500 2606:4700:10::6814:5924 2606:4700:10::6816:4063 128.242.104.43
2606:4700:10::6814:8744 2606:4700:10::ac43:2621 2606:4700:10::6814:7663 2606:4700:10::6816:1011