必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Yuseong-gu

省份(region): Daejeon Metropolitan City

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 211.203.178.71


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 211.200.0.0 - 211.203.255.255 (/14)
기관명             : 에스케이브로드밴드주식회사
서비스명           : broadNnet
주소               : 서울특별시 중구 퇴계로 24
우편번호           : 04637
할당일자           : 20000823

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 211.203.178.0 - 211.203.178.255 (/24)
기관명             : 에스케이브로드밴드주식회사
네트워크 구분      : CUSTOMER
주소               : 서울특별시 중구 퇴계로
우편번호           : 04637
할당내역 등록일    : 20140110

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 211.200.0.0 - 211.203.255.255 (/14)
Organization Name  : SK Broadband Co Ltd
Service Name       : broadNnet
Address            : Seoul Jung-gu Toegye-ro 24
Zip Code           : 04637
Registration Date  : 20000823

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 211.203.178.0 - 211.203.178.255 (/24)
Organization Name  : SK Broadband Co Ltd
Network Type       : CUSTOMER
Address            : Seoul Jung-gu Toegye-ro
Zip Code           : 04637
Registration Date  : 20140110

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.203.178.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7548
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.203.178.71.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033001 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 02:43:32 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 71.178.203.211.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 71.178.203.211.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
14.175.237.89 attackbots
Unauthorized connection attempt from IP address 14.175.237.89 on Port 445(SMB)
2019-06-22 03:03:57
189.158.69.241 attackbotsspam
Unauthorized connection attempt from IP address 189.158.69.241 on Port 445(SMB)
2019-06-22 02:43:41
202.169.61.227 attackbots
Unauthorized connection attempt from IP address 202.169.61.227 on Port 445(SMB)
2019-06-22 02:55:10
45.55.151.0 attack
WordPress attack for list of Users/Admin account: GET /?author=1 HTTP/1.1
2019-06-22 02:30:53
58.229.176.151 attack
fraudulent SSH attempt
2019-06-22 03:04:28
58.59.2.26 attackspambots
SSH Brute Force, server-1 sshd[2795]: Failed password for invalid user ye from 58.59.2.26 port 43088 ssh2
2019-06-22 02:57:07
82.207.123.218 attackbotsspam
Unauthorized connection attempt from IP address 82.207.123.218 on Port 445(SMB)
2019-06-22 02:37:21
211.75.38.33 attack
Unauthorized connection attempt from IP address 211.75.38.33 on Port 445(SMB)
2019-06-22 02:51:15
111.77.102.168 attackbotsspam
Jun 21 11:04:00 ns3042688 proftpd\[891\]: 127.0.0.1 \(111.77.102.168\[111.77.102.168\]\) - USER anonymous: no such user found from 111.77.102.168 \[111.77.102.168\] to 51.254.197.112:21
Jun 21 11:04:02 ns3042688 proftpd\[917\]: 127.0.0.1 \(111.77.102.168\[111.77.102.168\]\) - USER www: no such user found from 111.77.102.168 \[111.77.102.168\] to 51.254.197.112:21
Jun 21 11:04:07 ns3042688 proftpd\[1074\]: 127.0.0.1 \(111.77.102.168\[111.77.102.168\]\) - USER www: no such user found from 111.77.102.168 \[111.77.102.168\] to 51.254.197.112:21
Jun 21 11:04:14 ns3042688 proftpd\[1133\]: 127.0.0.1 \(111.77.102.168\[111.77.102.168\]\) - USER cesumin \(Login failed\): Incorrect password
Jun 21 11:04:18 ns3042688 proftpd\[1172\]: 127.0.0.1 \(111.77.102.168\[111.77.102.168\]\) - USER cesumin \(Login failed\): Incorrect password
...
2019-06-22 02:56:34
178.48.85.29 attackbots
Jun 21 04:41:19 raspberrypi sshd\[5585\]: Invalid user gameserver from 178.48.85.29 port 59912
Jun 21 04:41:19 raspberrypi sshd\[5585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.85.29
Jun 21 04:41:22 raspberrypi sshd\[5585\]: Failed password for invalid user gameserver from 178.48.85.29 port 59912 ssh2
Jun 21 04:51:17 raspberrypi sshd\[5604\]: Invalid user pan from 178.48.85.29 port 46494
Jun 21 04:51:17 raspberrypi sshd\[5604\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.48.85.29
...
2019-06-22 02:30:34
2607:5300:60:2bb::1 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-06-22 02:58:12
118.24.185.217 attack
My-Apache-Badbots (ownc)
2019-06-22 03:01:13
180.183.248.109 attack
Unauthorized connection attempt from IP address 180.183.248.109 on Port 445(SMB)
2019-06-22 02:19:54
62.216.42.210 attackspambots
Many RDP login attempts detected by IDS script
2019-06-22 02:27:08
61.125.131.40 attackbots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-21 11:04:16]
2019-06-22 02:36:15

最近上报的IP列表

88.216.68.244 198.239.4.43 2606:4700:10::6814:6037 2606:4700:10::6816:1627
2606:4700:10::6816:3380 2606:4700:10::6814:8058 2606:4700:10::ac43:2680 2606:4700:10::6816:3249
2606:4700:10::6814:7570 2606:4700:10::6816:3342 2606:4700:10::6814:4808 2606:4700:10::6814:6201
147.67.82.22 210.247.124.236 2606:4700:10::ac43:835 2606:4700:10::6814:6032
2606:4700:10::6816:2516 2606:4700:10::ac43:1362 2606:4700:10::6816:3975 2606:4700:10::ac43:1348