必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 220.103.92.112


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 220.103.0.0 - 220.103.255.255 (/16)
기관명             : 에스케이텔레콤(주)
서비스명           : SK-TELECOM-NET
주소               : 서울특별시 중구 을지로 65
우편번호           : 04539
할당일자           : 20040715

이름               : IP주소 담당자
전화번호           : +82-2-1599-0011
전자우편           : sktsec@sk.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 220.103.0.0 - 220.103.255.255 (/16)
기관명             : 에스케이텔레콤(주)
네트워크 구분      : INFRA
주소               : 서울특별시 중구 을지로65
우편번호           : 04539
할당내역 등록일    : 20040715

이름               : IP주소 담당자
전화번호           : +82-2-1588-7555
전자우편           : sktsec@sk.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 220.103.0.0 - 220.103.255.255 (/16)
Organization Name  : SK Telecom
Service Name       : SK-TELECOM-NET
Address            : Seoul Jung-gu Eulji-ro 65
Zip Code           : 04539
Registration Date  : 20040715

Name               : IP Manager
Phone              : +82-2-1599-0011
E-Mail             : sktsec@sk.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 220.103.0.0 - 220.103.255.255 (/16)
Organization Name  : SK Telecom
Network Type       : INFRA
Address            : Seoul Jung-gu Eulji-ro 65
Zip Code           : 04539
Registration Date  : 20040715

Name               : IP Manager
Phone              : +82-2-1588-7555
E-Mail             : sktsec@sk.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.103.92.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43539
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.103.92.112.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031200 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 12 17:30:19 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
Host 112.92.103.220.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 112.92.103.220.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
177.138.24.124 attackspam
Unauthorized connection attempt detected from IP address 177.138.24.124 to port 445 [T]
2020-08-13 23:23:33
134.196.6.32 attackspambots
Unauthorized connection attempt detected from IP address 134.196.6.32 to port 445 [T]
2020-08-13 23:24:58
2a01:cb0c:6f:d800:d900:58a8:7101:2800 attackspam
SSH Bruteforce attempt
2020-08-13 22:59:58
143.92.32.108 attack
[Thu Aug 13 13:40:19 2020] - Syn Flood From IP: 143.92.32.108 Port: 14374
2020-08-13 23:39:30
200.46.231.146 attack
Icarus honeypot on github
2020-08-13 23:08:34
122.202.48.251 attackbotsspam
[ssh] SSH attack
2020-08-13 23:42:35
203.34.48.33 attackspam
Unauthorized connection attempt detected from IP address 203.34.48.33 to port 6379 [T]
2020-08-13 23:20:25
162.243.128.129 attack
Unauthorized connection attempt detected from IP address 162.243.128.129 to port 1911 [T]
2020-08-13 23:24:32
90.182.188.195 attackspam
Unauthorized connection attempt detected from IP address 90.182.188.195 to port 445 [T]
2020-08-13 23:28:09
170.246.0.164 attackbots
Unauthorized connection attempt detected from IP address 170.246.0.164 to port 1433 [T]
2020-08-13 23:38:04
139.255.88.196 attackbotsspam
Unauthorized connection attempt detected from IP address 139.255.88.196 to port 445 [T]
2020-08-13 23:40:32
5.188.84.115 attackspambots
0,34-02/04 [bc01/m09] PostRequest-Spammer scoring: rome
2020-08-13 23:10:03
222.186.169.194 attackspambots
Aug 13 15:31:23 scw-6657dc sshd[5723]: Failed password for root from 222.186.169.194 port 63382 ssh2
Aug 13 15:31:23 scw-6657dc sshd[5723]: Failed password for root from 222.186.169.194 port 63382 ssh2
Aug 13 15:31:26 scw-6657dc sshd[5723]: Failed password for root from 222.186.169.194 port 63382 ssh2
...
2020-08-13 23:31:44
202.109.239.128 attack
Unauthorized connection attempt detected from IP address 202.109.239.128 to port 80 [T]
2020-08-13 23:20:53
45.154.35.251 attackbots
xmlrpc attack
2020-08-13 23:06:23

最近上报的IP列表

2.249.142.165 185.231.33.46 10.36.198.186 254.238.12.218
178.16.53.90 74.7.241.51 74.7.175.142 149.52.71.138
80.174.222.112 122.162.151.75 192.71.224.103 37.24.235.170
45.142.154.32 178.62.29.13 20.23.9.218 91.231.89.68
91.231.89.2 58.240.69.164 62.33.26.212 115.45.42.36