Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 203.242.106.212


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 203.242.96.0 - 203.242.111.255 (/20)
기관명             : 삼성에스디에스(주)
서비스명           : SAMSUNGSDS
주소               : 서울특별시 송파구 올림픽로35길 125
우편번호           : 05510
할당일자           : 19950719

이름               : IP주소 담당자
전화번호           : +82-2-509-0026
전자우편           : ipmanager@samsung.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 203.242.96.0 - 203.242.111.255 (/20)
기관명             : 삼성에스디에스(주)
네트워크 구분      : INFRA
주소               : 서울특별시 송파구 올림픽로35길 125
우편번호           : 05510
할당내역 등록일    : 20070209

이름               : IP주소 담당자
전화번호           : +82-70-7015-6598
전자우편           : ipmanager@samsung.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 203.242.96.0 - 203.242.111.255 (/20)
Organization Name  : SamsungSDS Inc.
Service Name       : SAMSUNGSDS
Address            : Seoul Songpa-gu Olympic-ro 35-gil 125
Zip Code           : 05510
Registration Date  : 19950719

Name               : IP Manager
Phone              : +82-2-509-0026
E-Mail             : ipmanager@samsung.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 203.242.96.0 - 203.242.111.255 (/20)
Organization Name  : SamsungSDS Inc.
Network Type       : INFRA
Address            : Olympic-ro 35-gil Songpa-gu Seoul
Zip Code           : 05510
Registration Date  : 20070209

Name               : IP Manager
Phone              : +82-70-7015-6598
E-Mail             : ipmanager@samsung.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.242.106.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.242.106.212.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 13:15:50 CST 2026
;; MSG SIZE  rcvd: 108
Host info
212.106.242.203.in-addr.arpa domain name pointer u212.gpu11.samsung.co.kr.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.106.242.203.in-addr.arpa	name = u212.gpu11.samsung.co.kr.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.250.71.202 attack
1579841576 - 01/24/2020 05:52:56 Host: 88.250.71.202/88.250.71.202 Port: 445 TCP Blocked
2020-01-24 19:25:59
220.135.144.211 attackspam
Unauthorized connection attempt detected from IP address 220.135.144.211 to port 23 [J]
2020-01-24 19:08:37
218.92.0.191 attackspambots
Jan 24 12:12:43 dcd-gentoo sshd[3959]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 24 12:12:46 dcd-gentoo sshd[3959]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 24 12:12:43 dcd-gentoo sshd[3959]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 24 12:12:46 dcd-gentoo sshd[3959]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 24 12:12:43 dcd-gentoo sshd[3959]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Jan 24 12:12:46 dcd-gentoo sshd[3959]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Jan 24 12:12:46 dcd-gentoo sshd[3959]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 18484 ssh2
...
2020-01-24 19:16:26
190.8.80.42 attackspambots
5x Failed Password
2020-01-24 19:22:45
111.230.209.21 attack
Unauthorized connection attempt detected from IP address 111.230.209.21 to port 2220 [J]
2020-01-24 19:24:24
185.85.239.195 attackbots
Automatic report - Banned IP Access
2020-01-24 19:09:09
222.186.180.6 attackbots
$f2bV_matches
2020-01-24 19:07:05
81.22.45.100 attackbots
firewall-block, port(s): 7022/tcp
2020-01-24 19:26:26
60.250.243.186 attackspam
Unauthorized connection attempt detected from IP address 60.250.243.186 to port 2220 [J]
2020-01-24 19:03:19
112.85.42.174 attackspam
Jan 24 01:01:18 web9 sshd\[3568\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan 24 01:01:20 web9 sshd\[3568\]: Failed password for root from 112.85.42.174 port 14885 ssh2
Jan 24 01:01:37 web9 sshd\[3594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan 24 01:01:39 web9 sshd\[3594\]: Failed password for root from 112.85.42.174 port 48209 ssh2
Jan 24 01:01:49 web9 sshd\[3594\]: Failed password for root from 112.85.42.174 port 48209 ssh2
2020-01-24 19:05:46
110.49.101.58 attackspam
Automatic report - Banned IP Access
2020-01-24 19:10:24
122.114.72.155 attack
Jan 24 10:41:04 pkdns2 sshd\[38134\]: Invalid user alarm from 122.114.72.155Jan 24 10:41:05 pkdns2 sshd\[38134\]: Failed password for invalid user alarm from 122.114.72.155 port 35190 ssh2Jan 24 10:44:36 pkdns2 sshd\[38292\]: Invalid user deployer from 122.114.72.155Jan 24 10:44:38 pkdns2 sshd\[38292\]: Failed password for invalid user deployer from 122.114.72.155 port 44880 ssh2Jan 24 10:47:59 pkdns2 sshd\[38488\]: Invalid user student from 122.114.72.155Jan 24 10:48:01 pkdns2 sshd\[38488\]: Failed password for invalid user student from 122.114.72.155 port 54902 ssh2
...
2020-01-24 19:33:52
37.70.132.170 attackbots
Unauthorized connection attempt detected from IP address 37.70.132.170 to port 2220 [J]
2020-01-24 19:51:12
70.71.148.228 attack
SSH Brute-Forcing (server2)
2020-01-24 19:04:45
116.196.94.108 attackspam
20 attempts against mh-ssh on echoip
2020-01-24 19:31:06

Recently Reported IPs

65.102.164.10 180.153.236.194 91.92.41.58 84.52.77.248
222.109.132.215 2606:4700:10::6814:6042 2606:4700:10::6816:3586 2606:4700:10::ac43:2483
122.192.203.75 2606:4700:10::6814:8503 2606:4700:10::6816:2810 2606:4700:10::6814:5905
2606:4700:10::ac43:2359 2606:4700:10::6814:8201 62.84.177.202 121.167.53.3
202.81.109.200 101.4.116.93 141.11.134.1 101.4.117.82