Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Goyang-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 211.202.33.195


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 211.200.0.0 - 211.203.255.255 (/14)
기관명             : 에스케이브로드밴드주식회사
서비스명           : broadNnet
주소               : 서울특별시 중구 퇴계로 24
우편번호           : 04637
할당일자           : 20000823

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 211.202.33.0 - 211.202.33.255 (/24)
기관명             : 에스케이브로드밴드주식회사
네트워크 구분      : CUSTOMER
주소               : 서울특별시 중구 퇴계로
우편번호           : 04637
할당내역 등록일    : 20061214

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 211.200.0.0 - 211.203.255.255 (/14)
Organization Name  : SK Broadband Co Ltd
Service Name       : broadNnet
Address            : Seoul Jung-gu Toegye-ro 24
Zip Code           : 04637
Registration Date  : 20000823

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 211.202.33.0 - 211.202.33.255 (/24)
Organization Name  : SK Broadband Co Ltd
Network Type       : CUSTOMER
Address            : Seoul Jung-gu Toegye-ro
Zip Code           : 04637
Registration Date  : 20061214

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.202.33.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26122
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.202.33.195.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032301 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 02:28:16 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 195.33.202.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 195.33.202.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
152.136.27.247 attackspambots
Mar 20 01:14:38 web9 sshd\[13287\]: Invalid user ertu from 152.136.27.247
Mar 20 01:14:38 web9 sshd\[13287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.27.247
Mar 20 01:14:39 web9 sshd\[13287\]: Failed password for invalid user ertu from 152.136.27.247 port 50678 ssh2
Mar 20 01:16:00 web9 sshd\[13480\]: Invalid user amadeus from 152.136.27.247
Mar 20 01:16:00 web9 sshd\[13480\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.27.247
2020-03-20 19:35:13
2001:1478:1100:4000:a242:3fff:fe34:176a attackbotsspam
20 attempts against mh-misbehave-ban on web2
2020-03-20 19:28:07
14.48.43.156 attack
2020-03-20T03:50:55.750547beta postfix/smtpd[26922]: NOQUEUE: reject: RCPT from unknown[14.48.43.156]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [14.48.43.156]; from= to= proto=ESMTP helo=<[14.48.43.156]>
2020-03-20T03:51:22.477255beta postfix/smtpd[26922]: NOQUEUE: reject: RCPT from unknown[14.48.43.156]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [14.48.43.156]; from= to= proto=ESMTP helo=<[14.48.43.156]>
2020-03-20T03:51:42.634274beta postfix/smtpd[26969]: NOQUEUE: reject: RCPT from unknown[14.48.43.156]: 450 4.7.1 Client host rejected: cannot find your reverse hostname, [14.48.43.156]; from= to= proto=ESMTP helo=<[14.48.43.156]>
...
2020-03-20 19:22:34
106.13.52.83 attackbotsspam
Mar 20 08:51:01 gw1 sshd[18619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.52.83
Mar 20 08:51:03 gw1 sshd[18619]: Failed password for invalid user gopher from 106.13.52.83 port 56580 ssh2
...
2020-03-20 19:45:57
1.71.129.108 attackbots
$f2bV_matches
2020-03-20 19:35:34
37.49.224.127 attackspam
Email rejected due to spam filtering
2020-03-20 19:25:14
81.4.122.79 attackbots
2020-03-19 UTC: (4x) - root(4x)
2020-03-20 19:40:54
139.199.115.210 attackspam
2020-03-20T10:48:35.510878abusebot-2.cloudsearch.cf sshd[20021]: Invalid user reanne from 139.199.115.210 port 61261
2020-03-20T10:48:35.517438abusebot-2.cloudsearch.cf sshd[20021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.115.210
2020-03-20T10:48:35.510878abusebot-2.cloudsearch.cf sshd[20021]: Invalid user reanne from 139.199.115.210 port 61261
2020-03-20T10:48:37.180903abusebot-2.cloudsearch.cf sshd[20021]: Failed password for invalid user reanne from 139.199.115.210 port 61261 ssh2
2020-03-20T10:53:50.868836abusebot-2.cloudsearch.cf sshd[20295]: Invalid user jcoffey from 139.199.115.210 port 48736
2020-03-20T10:53:50.876913abusebot-2.cloudsearch.cf sshd[20295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.115.210
2020-03-20T10:53:50.868836abusebot-2.cloudsearch.cf sshd[20295]: Invalid user jcoffey from 139.199.115.210 port 48736
2020-03-20T10:53:53.117433abusebot-2.cloudsearch.c
...
2020-03-20 19:52:30
118.97.147.204 attackbots
Unauthorized connection attempt detected from IP address 118.97.147.204 to port 445
2020-03-20 19:39:08
190.53.31.172 attackspam
" "
2020-03-20 20:06:27
164.132.47.139 attackbots
Mar 20 06:14:43 askasleikir sshd[54884]: Failed password for invalid user jatten from 164.132.47.139 port 55918 ssh2
Mar 20 06:03:27 askasleikir sshd[53750]: Failed password for invalid user mit from 164.132.47.139 port 52658 ssh2
2020-03-20 20:08:46
94.177.215.195 attackbots
Mar 20 17:14:09 areeb-Workstation sshd[13104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.215.195 
Mar 20 17:14:12 areeb-Workstation sshd[13104]: Failed password for invalid user sinusbot from 94.177.215.195 port 36166 ssh2
...
2020-03-20 19:59:36
222.112.30.116 attack
$f2bV_matches
2020-03-20 19:31:29
54.36.230.130 attackbots
Lines containing failures of 54.36.230.130
Mar 19 14:49:26 zabbix sshd[80253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.230.130  user=r.r
Mar 19 14:49:28 zabbix sshd[80253]: Failed password for r.r from 54.36.230.130 port 36162 ssh2
Mar 19 14:49:28 zabbix sshd[80253]: Received disconnect from 54.36.230.130 port 36162:11: Bye Bye [preauth]
Mar 19 14:49:28 zabbix sshd[80253]: Disconnected from authenticating user r.r 54.36.230.130 port 36162 [preauth]
Mar 19 14:53:42 zabbix sshd[80659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.230.130  user=r.r
Mar 19 14:53:44 zabbix sshd[80659]: Failed password for r.r from 54.36.230.130 port 59684 ssh2
Mar 19 14:53:44 zabbix sshd[80659]: Received disconnect from 54.36.230.130 port 59684:11: Bye Bye [preauth]
Mar 19 14:53:44 zabbix sshd[80659]: Disconnected from authenticating user r.r 54.36.230.130 port 59684 [preauth]
Mar 19 14:55:5........
------------------------------
2020-03-20 19:34:15
103.44.98.18 attackbotsspam
Unauthorized connection attempt detected from IP address 103.44.98.18 to port 445
2020-03-20 19:31:09

Recently Reported IPs

10.238.145.175 212.175.41.126 103.136.182.83 107.18.119.194
221.138.188.176 198.110.10.253 10.33.66.7 219.131.229.238
219.131.229.217 47.96.116.183 157.173.100.236 46.187.208.49
2606:4700:10::6814:9291 2606:4700:10::6816:3508 2606:4700:10::6816:2704 2606:4700:10::6814:8501
2606:4700:10::6814:9715 2606:4700:10::6814:5014 2606:4700:10::6814:5399 2606:4700:10::ac43:2541