必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): South Korea

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
query : 220.64.53.124


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 220.64.0.0 - 220.64.255.255 (/16)
기관명             : 드림라인(주)
서비스명           : DREAMX
주소               : 서울특별시 구로구 디지털로31길 61
우편번호           : 08375
할당일자           : 20031027

이름               : IP주소 담당자
전화번호           : +82-2-6007-6215
전자우편           : ip@dreamline.co.kr

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 220.64.53.64 - 220.64.53.127 (/26)
기관명             : 컴앤랜탈
네트워크 구분      : CUSTOMER
주소               : 경상남도 창원시 의창구 창원대로 400
우편번호           : 51401
할당내역 등록일    : 20160803

이름               : IP주소 담당자
전화번호           : +82-10-9307-0786
전자우편           : connrental@naver.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 220.64.0.0 - 220.64.255.255 (/16)
Organization Name  : DREAMLINE CO.
Service Name       : DREAMX
Address            : Seoul Guro-gu Digital-ro 31-gil 61
Zip Code           : 08375
Registration Date  : 20031027

Name               : IP Manager
Phone              : +82-2-6007-6215
E-Mail             : ip@dreamline.co.kr

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 220.64.53.64 - 220.64.53.127 (/26)
Organization Name  : ComNRental
Network Type       : CUSTOMER
Address            : Gyeongsangnam-do Uichang-gu Changwon-si Changwon-daero 400
Zip Code           : 51401
Registration Date  : 20160803

Name               : IP Manager
Phone              : +82-10-9307-0786
E-Mail             : connrental@naver.com


- KISA/KRNIC WHOIS Service -
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.64.53.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.64.53.124.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 08:39:19 CST 2026
;; MSG SIZE  rcvd: 106
HOST信息:
Host 124.53.64.220.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.53.64.220.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
49.234.30.113 attackspambots
SSH Brute-Forcing (server2)
2020-06-13 19:46:05
120.239.196.81 attack
Invalid user web3 from 120.239.196.81 port 36715
2020-06-13 19:21:01
111.161.74.121 attack
Wordpress malicious attack:[sshd]
2020-06-13 19:30:17
54.37.136.213 attackspam
(sshd) Failed SSH login from 54.37.136.213 (PL/Poland/mail.devrows.com): 5 in the last 3600 secs
2020-06-13 19:22:05
221.156.126.1 attack
Brute-force attempt banned
2020-06-13 19:51:37
35.231.211.161 attackspambots
Jun 13 07:52:04 OPSO sshd\[25834\]: Invalid user se from 35.231.211.161 port 50270
Jun 13 07:52:04 OPSO sshd\[25834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161
Jun 13 07:52:06 OPSO sshd\[25834\]: Failed password for invalid user se from 35.231.211.161 port 50270 ssh2
Jun 13 07:55:28 OPSO sshd\[26408\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.231.211.161  user=root
Jun 13 07:55:30 OPSO sshd\[26408\]: Failed password for root from 35.231.211.161 port 52316 ssh2
2020-06-13 19:12:25
125.45.12.133 attack
Invalid user admin from 125.45.12.133 port 48134
2020-06-13 19:11:05
93.95.240.245 attack
Automatic report BANNED IP
2020-06-13 19:14:34
109.195.148.73 attack
Jun 11 23:12:27 h1946882 sshd[17123]: reveeclipse mapping checking getaddri=
nfo for dynamicip-109-195-148-73.pppoe.ufa.ertelecom.ru [109.195.148.73=
] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 11 23:12:27 h1946882 sshd[17123]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D109.=
195.148.73  user=3Dr.r
Jun 11 23:12:29 h1946882 sshd[17123]: Failed password for r.r from 109=
.195.148.73 port 39512 ssh2
Jun 11 23:12:29 h1946882 sshd[17123]: Received disconnect from 109.195.=
148.73: 11: Bye Bye [preauth]
Jun 11 23:24:06 h1946882 sshd[17272]: reveeclipse mapping checking getaddri=
nfo for dynamicip-109-195-148-73.pppoe.ufa.ertelecom.ru [109.195.148.73=
] failed - POSSIBLE BREAK-IN ATTEMPT!
Jun 11 23:24:06 h1946882 sshd[17272]: pam_unix(sshd:auth): authenticati=
on failure; logname=3D uid=3D0 euid=3D0 tty=3Dssh ruser=3D rhost=3D109.=
195.148.73=20
Jun 11 23:24:08 h1946882 sshd[17272]: Failed password for invalid user =
nm ........
-------------------------------
2020-06-13 19:36:28
222.186.175.217 attackspambots
2020-06-13T11:37:40.291743shield sshd\[3194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.217  user=root
2020-06-13T11:37:42.209151shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13T11:37:45.441421shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13T11:37:48.418313shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13T11:37:51.806667shield sshd\[3194\]: Failed password for root from 222.186.175.217 port 15476 ssh2
2020-06-13 19:43:46
178.128.144.227 attackspam
Jun 13 09:51:49 ip-172-31-61-156 sshd[4324]: Failed password for invalid user team3 from 178.128.144.227 port 43940 ssh2
Jun 13 09:54:51 ip-172-31-61-156 sshd[4446]: Invalid user ofbiz from 178.128.144.227
Jun 13 09:54:51 ip-172-31-61-156 sshd[4446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227
Jun 13 09:54:51 ip-172-31-61-156 sshd[4446]: Invalid user ofbiz from 178.128.144.227
Jun 13 09:54:52 ip-172-31-61-156 sshd[4446]: Failed password for invalid user ofbiz from 178.128.144.227 port 44998 ssh2
...
2020-06-13 19:41:38
46.148.21.32 attackbots
Jun 13 01:24:05 mockhub sshd[9485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.148.21.32
Jun 13 01:24:07 mockhub sshd[9485]: Failed password for invalid user admin from 46.148.21.32 port 38444 ssh2
...
2020-06-13 19:20:02
197.156.65.138 attackbotsspam
Jun 12 19:45:53 hpm sshd\[7263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.65.138  user=root
Jun 12 19:45:56 hpm sshd\[7263\]: Failed password for root from 197.156.65.138 port 41710 ssh2
Jun 12 19:50:20 hpm sshd\[7834\]: Invalid user apache from 197.156.65.138
Jun 12 19:50:20 hpm sshd\[7834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.156.65.138
Jun 12 19:50:22 hpm sshd\[7834\]: Failed password for invalid user apache from 197.156.65.138 port 44856 ssh2
2020-06-13 19:27:04
45.141.84.30 attack
Jun 13 13:32:12 debian-2gb-nbg1-2 kernel: \[14306649.642199\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.141.84.30 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=47596 PROTO=TCP SPT=50749 DPT=2127 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-13 19:47:03
49.232.95.250 attackspambots
leo_www
2020-06-13 19:17:59

最近上报的IP列表

55.234.162.118 113.222.78.73 10.10.1.95 64.72.118.62
130.247.248.85 12.250.214.123 110.78.156.183 2606:4700:10::6814:7403
2606:4700:10::6814:7893 2606:4700:10::6816:3850 2606:4700:10::6816:4132 2606:4700:10::ac43:2003
2606:4700:10::ac43:2543 2606:4700:10::6816:3397 2606:4700:10::6816:4615 2606:4700:10::6814:6954
170.245.1.89 180.93.243.46 134.209.241.145 220.67.113.196