必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Jungnang-gu

省份(region): Seoul Special City

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 218.234.139.133


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 218.234.0.0 - 218.235.255.255 (/15)
기관명             : 에스케이브로드밴드주식회사
서비스명           : broadNnet
주소               : 서울특별시 중구 퇴계로 24
우편번호           : 04637
할당일자           : 20020527

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 218.234.139.0 - 218.234.139.255 (/24)
기관명             : 에스케이브로드밴드주식회사
네트워크 구분      : CUSTOMER
주소               : 서울특별시 중구 퇴계로
우편번호           : 04637
할당내역 등록일    : 20130205

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 218.234.0.0 - 218.235.255.255 (/15)
Organization Name  : SK Broadband Co Ltd
Service Name       : broadNnet
Address            : Seoul Jung-gu Toegye-ro 24
Zip Code           : 04637
Registration Date  : 20020527

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 218.234.139.0 - 218.234.139.255 (/24)
Organization Name  : SK Broadband Co Ltd
Network Type       : CUSTOMER
Address            : Seoul Jung-gu Toegye-ro
Zip Code           : 04637
Registration Date  : 20130205

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.234.139.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.234.139.133.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:22:47 CST 2026
;; MSG SIZE  rcvd: 108
HOST信息:
Host 133.139.234.218.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.139.234.218.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
37.9.169.6 attackbotsspam
Automatic report - Banned IP Access
2019-10-02 06:27:31
54.37.151.239 attack
2019-10-01T22:11:45.472914shield sshd\[29689\]: Invalid user kkk from 54.37.151.239 port 33749
2019-10-01T22:11:45.477531shield sshd\[29689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
2019-10-01T22:11:47.220602shield sshd\[29689\]: Failed password for invalid user kkk from 54.37.151.239 port 33749 ssh2
2019-10-01T22:15:15.884420shield sshd\[30184\]: Invalid user maf from 54.37.151.239 port 55281
2019-10-01T22:15:15.888678shield sshd\[30184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.151.239
2019-10-02 06:24:26
110.235.249.27 attackspam
postfix
2019-10-02 06:57:00
153.36.242.143 attack
Oct  2 00:23:08 icinga sshd[33548]: Failed password for root from 153.36.242.143 port 52495 ssh2
Oct  2 00:23:11 icinga sshd[33548]: Failed password for root from 153.36.242.143 port 52495 ssh2
Oct  2 00:23:16 icinga sshd[33548]: Failed password for root from 153.36.242.143 port 52495 ssh2
...
2019-10-02 06:56:47
110.80.142.84 attackspam
Oct  1 23:00:02 ns3110291 sshd\[26832\]: Invalid user 889900 from 110.80.142.84
Oct  1 23:00:02 ns3110291 sshd\[26832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.142.84 
Oct  1 23:00:04 ns3110291 sshd\[26832\]: Failed password for invalid user 889900 from 110.80.142.84 port 36180 ssh2
Oct  1 23:02:58 ns3110291 sshd\[27001\]: Invalid user 010203 from 110.80.142.84
Oct  1 23:02:58 ns3110291 sshd\[27001\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.142.84 
...
2019-10-02 07:01:57
51.77.144.50 attack
Oct  1 22:14:32 web8 sshd\[21292\]: Invalid user training from 51.77.144.50
Oct  1 22:14:32 web8 sshd\[21292\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.144.50
Oct  1 22:14:34 web8 sshd\[21292\]: Failed password for invalid user training from 51.77.144.50 port 58034 ssh2
Oct  1 22:18:17 web8 sshd\[23056\]: Invalid user olavo from 51.77.144.50
Oct  1 22:18:17 web8 sshd\[23056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.144.50
2019-10-02 06:27:50
148.70.41.33 attackspambots
2019-10-01T17:59:45.5405941495-001 sshd\[59248\]: Invalid user ir from 148.70.41.33 port 51502
2019-10-01T17:59:45.5463861495-001 sshd\[59248\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.41.33
2019-10-01T17:59:47.4454621495-001 sshd\[59248\]: Failed password for invalid user ir from 148.70.41.33 port 51502 ssh2
2019-10-01T18:04:43.6505891495-001 sshd\[59649\]: Invalid user proftpd from 148.70.41.33 port 34692
2019-10-01T18:04:43.6574011495-001 sshd\[59649\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.41.33
2019-10-01T18:04:45.4663121495-001 sshd\[59649\]: Failed password for invalid user proftpd from 148.70.41.33 port 34692 ssh2
...
2019-10-02 06:23:58
118.98.96.184 attackbotsspam
2019-10-01T22:41:23.177782abusebot-7.cloudsearch.cf sshd\[32596\]: Invalid user lzybert from 118.98.96.184 port 47775
2019-10-02 06:44:14
106.12.206.53 attackbotsspam
2019-10-01T17:57:45.1909561495-001 sshd\[59089\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.53
2019-10-01T17:57:46.9483201495-001 sshd\[59089\]: Failed password for invalid user weblogic from 106.12.206.53 port 59292 ssh2
2019-10-01T18:09:10.8134161495-001 sshd\[60040\]: Invalid user alutus from 106.12.206.53 port 40956
2019-10-01T18:09:10.8220801495-001 sshd\[60040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.53
2019-10-01T18:09:13.2878771495-001 sshd\[60040\]: Failed password for invalid user alutus from 106.12.206.53 port 40956 ssh2
2019-10-01T18:13:05.9256681495-001 sshd\[60297\]: Invalid user pr from 106.12.206.53 port 44270
2019-10-01T18:13:05.9293581495-001 sshd\[60297\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.206.53
...
2019-10-02 06:34:02
200.58.219.218 attackspam
Oct  1 16:59:01 xtremcommunity sshd\[81943\]: Invalid user master from 200.58.219.218 port 37898
Oct  1 16:59:01 xtremcommunity sshd\[81943\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.58.219.218
Oct  1 16:59:03 xtremcommunity sshd\[81943\]: Failed password for invalid user master from 200.58.219.218 port 37898 ssh2
Oct  1 17:03:22 xtremcommunity sshd\[82040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.58.219.218  user=root
Oct  1 17:03:24 xtremcommunity sshd\[82040\]: Failed password for root from 200.58.219.218 port 50810 ssh2
...
2019-10-02 06:43:57
23.101.24.79 attack
Oct  2 01:48:30 www4 sshd\[43177\]: Invalid user ax from 23.101.24.79
Oct  2 01:48:30 www4 sshd\[43177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.24.79
Oct  2 01:48:32 www4 sshd\[43177\]: Failed password for invalid user ax from 23.101.24.79 port 51386 ssh2
...
2019-10-02 06:58:01
173.236.245.172 attackbots
Oct  2 00:03:53 MK-Soft-VM4 sshd[11720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.236.245.172 
Oct  2 00:03:55 MK-Soft-VM4 sshd[11720]: Failed password for invalid user user from 173.236.245.172 port 42484 ssh2
...
2019-10-02 06:34:55
198.2.177.22 attackspam
I was bombed with over 2000 emails within 40 minutes.
2019-10-02 06:30:56
123.116.109.35 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-10-02 06:57:25
203.167.21.223 attack
Oct  1 22:58:14 DAAP sshd[2961]: Invalid user master2 from 203.167.21.223 port 56992
Oct  1 22:58:14 DAAP sshd[2961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.167.21.223
Oct  1 22:58:14 DAAP sshd[2961]: Invalid user master2 from 203.167.21.223 port 56992
Oct  1 22:58:16 DAAP sshd[2961]: Failed password for invalid user master2 from 203.167.21.223 port 56992 ssh2
Oct  1 23:03:13 DAAP sshd[3016]: Invalid user misson from 203.167.21.223 port 41470
...
2019-10-02 06:53:20

最近上报的IP列表

109.143.125.17 121.191.162.149 19.168.218.252 60.3.36.100
59.26.129.97 217.68.75.232 160.210.131.166 113.160.196.163
134.214.57.86 47.242.58.79 103.115.63.38 52.96.3.178
185.96.194.104 15.115.69.9 139.20.145.184 125.138.52.163
103.144.173.41 211.239.108.27 193.242.107.70 121.230.89.101