Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 203.242.123.55


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 203.242.120.0 - 203.242.127.255 (/21)
기관명             : SK(주)
서비스명           : SK-NET
주소               : 경기도 성남시 분당구 성남대로343번길 9
우편번호           : 13558
할당일자           : 20000606

이름               : IP주소 담당자
전화번호           : +82-2-6400-4592
전자우편           : sk-net@sk.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 203.242.120.0 - 203.242.127.255 (/21)
기관명             : 에스케이씨
네트워크 구분      : CUSTOMER
주소               : 경기도 수원시 장안구 장안로 309번길 84
우편번호           : 16336
할당내역 등록일    : 20180115

이름               : IP주소 담당자
전화번호           : +82-2-6400-4297
전자우편           : burstsun@sk.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 203.242.120.0 - 203.242.127.255 (/21)
Organization Name  : SK Co.,
Service Name       : SK-NET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Seongnam-daero 343beon-gil 9
Zip Code           : 13558
Registration Date  : 20000606

Name               : IP Manager
Phone              : +82-2-6400-4592
E-Mail             : sk-net@sk.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 203.242.120.0 - 203.242.127.255 (/21)
Organization Name  : SKC
Network Type       : CUSTOMER
Address            : 84 Jangan-ro 309beon-gil Jangan-gu Suwon-si Gyeonggi-do
Zip Code           : 16336
Registration Date  : 20180115

Name               : IP Manager
Phone              : +82-2-6400-4297
E-Mail             : burstsun@sk.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.242.123.55
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33242
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.242.123.55.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025120201 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 03 03:16:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 55.123.242.203.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 203.242.123.55.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.142 attackspam
Sep 20 21:00:12 mavik sshd[20920]: Failed password for root from 61.177.172.142 port 5423 ssh2
Sep 20 21:00:16 mavik sshd[20920]: Failed password for root from 61.177.172.142 port 5423 ssh2
Sep 20 21:00:19 mavik sshd[20920]: Failed password for root from 61.177.172.142 port 5423 ssh2
Sep 20 21:00:22 mavik sshd[20920]: Failed password for root from 61.177.172.142 port 5423 ssh2
Sep 20 21:00:25 mavik sshd[20920]: Failed password for root from 61.177.172.142 port 5423 ssh2
...
2020-09-21 04:02:38
184.105.139.105 attackbots
Port scan denied
2020-09-21 03:32:22
70.185.144.101 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-21 03:53:40
184.105.247.212 attackbots
Tried our host z.
2020-09-21 03:38:53
141.105.104.175 attackbots
Fail2Ban automatic report:
SSH suspicious user names:
Sep 20 19:04:10 serw sshd[23861]: Connection closed by invalid user admin 141.105.104.175 port 41940 [preauth]
2020-09-21 03:59:58
116.96.128.192 attackspam
Automatic Fail2ban report - Trying login SSH
2020-09-21 03:46:18
58.61.145.26 attackspam
SMTP Bruteforce attempt
2020-09-21 03:34:04
218.92.0.184 attackbots
Sep 20 20:47:17 mavik sshd[20476]: Failed password for root from 218.92.0.184 port 16043 ssh2
Sep 20 20:47:20 mavik sshd[20476]: Failed password for root from 218.92.0.184 port 16043 ssh2
Sep 20 20:47:23 mavik sshd[20476]: Failed password for root from 218.92.0.184 port 16043 ssh2
Sep 20 20:47:26 mavik sshd[20476]: Failed password for root from 218.92.0.184 port 16043 ssh2
Sep 20 20:47:29 mavik sshd[20476]: Failed password for root from 218.92.0.184 port 16043 ssh2
...
2020-09-21 03:59:10
108.41.179.72 attackspam
Sep 20 19:04:09 vps639187 sshd\[29893\]: Invalid user pi from 108.41.179.72 port 41445
Sep 20 19:04:09 vps639187 sshd\[29893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.41.179.72
Sep 20 19:04:12 vps639187 sshd\[29893\]: Failed password for invalid user pi from 108.41.179.72 port 41445 ssh2
...
2020-09-21 03:54:47
102.65.90.61 attackbots
Sep 20 16:01:33 roki-contabo sshd\[24714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.65.90.61  user=root
Sep 20 16:01:35 roki-contabo sshd\[24714\]: Failed password for root from 102.65.90.61 port 55900 ssh2
Sep 20 21:04:55 roki-contabo sshd\[27398\]: Invalid user admin from 102.65.90.61
Sep 20 21:04:55 roki-contabo sshd\[27398\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.65.90.61
Sep 20 21:04:57 roki-contabo sshd\[27398\]: Failed password for invalid user admin from 102.65.90.61 port 58504 ssh2
...
2020-09-21 04:00:11
121.116.98.130 attackspambots
20 attempts against mh-ssh on sonic
2020-09-21 04:01:17
42.101.44.20 attackspambots
Found on   CINS badguys     / proto=6  .  srcport=58446  .  dstport=6379  .     (3559)
2020-09-21 03:41:23
74.102.28.162 attackspam
 TCP (SYN) 74.102.28.162:8477 -> port 23, len 44
2020-09-21 03:31:20
101.93.240.20 attackspam
Sep 20 20:35:43 OPSO sshd\[30712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.93.240.20  user=root
Sep 20 20:35:45 OPSO sshd\[30712\]: Failed password for root from 101.93.240.20 port 38442 ssh2
Sep 20 20:39:45 OPSO sshd\[31388\]: Invalid user info from 101.93.240.20 port 43344
Sep 20 20:39:45 OPSO sshd\[31388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.93.240.20
Sep 20 20:39:47 OPSO sshd\[31388\]: Failed password for invalid user info from 101.93.240.20 port 43344 ssh2
2020-09-21 04:04:22
39.53.115.234 attackbots
39.53.115.234 - [20/Sep/2020:21:57:31 +0300] "POST /xmlrpc.php HTTP/1.1" 404 564 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
39.53.115.234 - [20/Sep/2020:21:58:33 +0300] "POST /xmlrpc.php HTTP/1.1" 404 564 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-09-21 04:05:18

Recently Reported IPs

103.242.215.138 40.124.173.171 128.1.44.106 14.205.104.200
97.149.179.88 97.149.179.248 97.149.179.27 98.94.64.78
44.212.70.191 159.75.166.146 35.172.190.251 180.153.236.246
157.245.247.18 128.14.226.191 17.246.19.56 17.246.19.157
190.149.90.177 10.3.3.87 180.153.236.27 180.153.236.171