必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 211.188.60.100


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 211.188.32.0 - 211.188.63.255 (/19)
기관명             : 네이버클라우드 주식회사
서비스명           : NBP-NET
주소               : 경기도 성남시 분당구 불정로 6
우편번호           : 13561
할당일자           : 20170518

이름               : IP주소 담당자
전화번호           : +82-31-1588-3820
전자우편           : dl_noc@navercorp.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 211.188.48.0 - 211.188.63.255 (/20)
기관명             : 네이버클라우드주식회사(NCP)
네트워크 구분      : CUSTOMER
주소               : 경기도 성남시 분당구 불정로 6 NAVER 그린팩토리
우편번호           : 13561
할당내역 등록일    : 20240819

이름               : IP주소 담당자
전화번호           : +82-31-1588-3820
전자우편           : dl_noc@navercorp.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 211.188.32.0 - 211.188.63.255 (/19)
Organization Name  : NAVER Cloud Corp.
Service Name       : NBP-NET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 6
Zip Code           : 13561
Registration Date  : 20170518

Name               : IP Manager
Phone              : +82-31-1588-3820
E-Mail             : dl_noc@navercorp.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 211.188.48.0 - 211.188.63.255 (/20)
Organization Name  : NAVER Cloud Corp.(NCP)
Network Type       : CUSTOMER
Address            : 6 Buljeong-ro Bundang-gu Seongnam-si Gyeonggi-do
Zip Code           : 13561
Registration Date  : 20240819

Name               : IP Manager
Phone              : +82-31-1588-3820
E-Mail             : dl_noc@navercorp.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.188.60.100
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12435
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.188.60.100.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040601 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 07 02:00:16 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 100.60.188.211.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 100.60.188.211.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
131.100.63.100 attackbots
$f2bV_matches
2019-11-27 20:05:52
118.121.13.43 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-27 20:23:31
116.74.109.143 attackbots
Honeypot attack, port: 23, PTR: 109.74.116.143.hathway.com.
2019-11-27 20:37:28
45.55.243.124 attack
2019-11-27T08:45:12.905018shield sshd\[12138\]: Invalid user tha from 45.55.243.124 port 49098
2019-11-27T08:45:12.909172shield sshd\[12138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.243.124
2019-11-27T08:45:14.732484shield sshd\[12138\]: Failed password for invalid user tha from 45.55.243.124 port 49098 ssh2
2019-11-27T08:51:27.301752shield sshd\[13354\]: Invalid user mysql from 45.55.243.124 port 58814
2019-11-27T08:51:27.305958shield sshd\[13354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.243.124
2019-11-27 20:12:08
51.68.123.192 attackbots
Nov 27 09:49:34 lnxded63 sshd[28480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.192
2019-11-27 20:22:13
82.117.245.189 attackspam
Nov 27 07:10:06 sbg01 sshd[7561]: Failed password for root from 82.117.245.189 port 42438 ssh2
Nov 27 07:16:39 sbg01 sshd[7622]: Failed password for root from 82.117.245.189 port 49472 ssh2
2019-11-27 20:01:05
1.182.182.35 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-27 20:18:28
157.41.171.191 attackbots
Brute-force attack to non-existent web resources
2019-11-27 20:19:38
5.196.217.177 attackspambots
Nov 27 13:23:28 mail postfix/smtpd[5404]: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 13:32:12 mail postfix/smtpd[7464]: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 13:33:04 mail postfix/smtpd[8561]: warning: unknown[5.196.217.177]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-27 20:34:24
106.12.176.3 attackbotsspam
Invalid user bulin from 106.12.176.3 port 52996
2019-11-27 20:09:41
220.201.34.248 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=14699)(11271302)
2019-11-27 20:12:31
116.68.199.199 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-27 20:40:19
119.206.91.47 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-27 20:41:08
109.184.103.12 attackbotsspam
Honeypot attack, port: 23, PTR: 109-184-103-12.dynamic.mts-nn.ru.
2019-11-27 20:16:16
106.13.31.93 attackspambots
Nov 25 11:11:27 myhostname sshd[20082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.31.93  user=r.r
Nov 25 11:11:29 myhostname sshd[20082]: Failed password for r.r from 106.13.31.93 port 33620 ssh2
Nov 25 11:11:30 myhostname sshd[20082]: Received disconnect from 106.13.31.93 port 33620:11: Bye Bye [preauth]
Nov 25 11:11:30 myhostname sshd[20082]: Disconnected from 106.13.31.93 port 33620 [preauth]
Nov 25 11:34:48 myhostname sshd[10666]: Invalid user lotze from 106.13.31.93
Nov 25 11:34:48 myhostname sshd[10666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.31.93
Nov 25 11:34:50 myhostname sshd[10666]: Failed password for invalid user lotze from 106.13.31.93 port 46902 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.31.93
2019-11-27 20:22:31

最近上报的IP列表

45.199.224.63 122.192.203.142 2606:4700:10::6814:4427 2606:4700:10::6816:3647
2606:4700:10::ac43:2416 2606:4700:10::6814:5873 2606:4700:10::6814:9684 18.217.98.22
16.54.11.149 106.1.90.236 66.132.172.129 24.89.82.52
164.68.109.118 110.77.226.109 2606:4700:10::6816:4437 2606:4700:10::ac43:2616
2606:4700:10::6816:4841 110.78.150.146 2606:4700:10::6816:3142 2606:4700:10::6814:8551