城市(city): Goyang-si
省份(region): Gyeonggi-do
国家(country): South Korea
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
query : 211.202.33.195
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 211.200.0.0 - 211.203.255.255 (/14)
기관명 : 에스케이브로드밴드주식회사
서비스명 : broadNnet
주소 : 서울특별시 중구 퇴계로 24
우편번호 : 04637
할당일자 : 20000823
이름 : IP주소 담당자
전화번호 : +82-80-828-2106
전자우편 : ip-adm@skbroadband.com
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 211.202.33.0 - 211.202.33.255 (/24)
기관명 : 에스케이브로드밴드주식회사
네트워크 구분 : CUSTOMER
주소 : 서울특별시 중구 퇴계로
우편번호 : 04637
할당내역 등록일 : 20061214
이름 : IP주소 담당자
전화번호 : +82-80-828-2106
전자우편 : ip-adm@skbroadband.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 211.200.0.0 - 211.203.255.255 (/14)
Organization Name : SK Broadband Co Ltd
Service Name : broadNnet
Address : Seoul Jung-gu Toegye-ro 24
Zip Code : 04637
Registration Date : 20000823
Name : IP Manager
Phone : +82-80-828-2106
E-Mail : ip-adm@skbroadband.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 211.202.33.0 - 211.202.33.255 (/24)
Organization Name : SK Broadband Co Ltd
Network Type : CUSTOMER
Address : Seoul Jung-gu Toegye-ro
Zip Code : 04637
Registration Date : 20061214
Name : IP Manager
Phone : +82-80-828-2106
E-Mail : ip-adm@skbroadband.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.202.33.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.202.33.195. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032301 1800 900 604800 86400
;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 02:28:16 CST 2026
;; MSG SIZE rcvd: 107
Host 195.33.202.211.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 195.33.202.211.in-addr.arpa: NXDOMAIN
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 106.75.132.222 | attack | Nov 14 19:46:37 h2177944 sshd\[10605\]: Invalid user bubu from 106.75.132.222 port 40052 Nov 14 19:46:37 h2177944 sshd\[10605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.132.222 Nov 14 19:46:39 h2177944 sshd\[10605\]: Failed password for invalid user bubu from 106.75.132.222 port 40052 ssh2 Nov 14 20:07:05 h2177944 sshd\[11677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.132.222 user=root ... |
2019-11-15 04:01:29 |
| 84.221.162.189 | attackbots | IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/84.221.162.189/ IT - 1H : (182) Protection Against DDoS WordPress plugin : "odzyskiwanie danych help-dysk" IP Address Ranges by Country : IT NAME ASN : ASN8612 IP : 84.221.162.189 CIDR : 84.220.0.0/14 PREFIX COUNT : 32 UNIQUE IP COUNT : 1536000 ATTACKS DETECTED ASN8612 : 1H - 1 3H - 1 6H - 2 12H - 3 24H - 8 DateTime : 2019-11-14 15:33:34 INFO : Port Scan TELNET Detected and Blocked by ADMIN - data recovery |
2019-11-15 04:12:55 |
| 80.249.144.88 | attackspambots | Nov x@x Nov x@x Nov x@x Nov x@x Nov x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=80.249.144.88 |
2019-11-15 04:20:19 |
| 129.226.129.191 | attackbots | 2019-11-14T15:20:54.030132shield sshd\[25116\]: Invalid user wisky from 129.226.129.191 port 49558 2019-11-14T15:20:54.036224shield sshd\[25116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191 2019-11-14T15:20:56.425787shield sshd\[25116\]: Failed password for invalid user wisky from 129.226.129.191 port 49558 ssh2 2019-11-14T15:25:15.262011shield sshd\[25537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.226.129.191 user=root 2019-11-14T15:25:17.816980shield sshd\[25537\]: Failed password for root from 129.226.129.191 port 58752 ssh2 |
2019-11-15 03:52:51 |
| 183.166.99.144 | attackspambots | [Aegis] @ 2019-11-14 14:33:16 0000 -> Sendmail rejected message. |
2019-11-15 04:25:02 |
| 182.117.43.75 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-15 04:12:17 |
| 222.142.147.98 | attack | Telnet/23 MH Probe, BF, Hack - |
2019-11-15 03:49:59 |
| 212.73.25.2 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-15 03:52:26 |
| 185.69.152.79 | attackspam | xmlrpc attack |
2019-11-15 04:18:43 |
| 62.210.105.116 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-15 04:00:54 |
| 18.182.115.140 | attackbotsspam | RDP Bruteforce |
2019-11-15 04:21:15 |
| 185.220.101.24 | attackspambots | Automatic report - XMLRPC Attack |
2019-11-15 04:00:26 |
| 206.189.123.66 | attackspam | Nov 14 15:25:35 server2 sshd[31311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.123.66 user=r.r Nov 14 15:25:37 server2 sshd[31311]: Failed password for r.r from 206.189.123.66 port 37668 ssh2 Nov 14 15:25:37 server2 sshd[31311]: Received disconnect from 206.189.123.66: 11: Bye Bye [preauth] Nov 14 15:25:37 server2 sshd[31313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.123.66 user=r.r Nov 14 15:25:39 server2 sshd[31313]: Failed password for r.r from 206.189.123.66 port 45642 ssh2 Nov 14 15:25:39 server2 sshd[31313]: Received disconnect from 206.189.123.66: 11: Bye Bye [preauth] Nov 14 15:25:40 server2 sshd[31315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.123.66 user=r.r Nov 14 15:25:42 server2 sshd[31315]: Failed password for r.r from 206.189.123.66 port 54568 ssh2 Nov 14 15:25:42 server2 sshd[31315]: Receiv........ ------------------------------- |
2019-11-15 04:02:28 |
| 163.172.106.114 | attackspambots | Nov 14 21:33:15 lcl-usvr-02 sshd[12150]: Invalid user admin from 163.172.106.114 port 59804 ... |
2019-11-15 04:27:55 |
| 83.103.98.211 | attackspambots | Invalid user server from 83.103.98.211 port 25241 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.98.211 Failed password for invalid user server from 83.103.98.211 port 25241 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.98.211 user=root Failed password for root from 83.103.98.211 port 19259 ssh2 |
2019-11-15 04:05:16 |