Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 211.232.220.108


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 211.232.192.0 - 211.232.223.255 (/19)
기관명             : 에스케이브로드밴드주식회사
서비스명           : broadNnet
주소               : 서울특별시 중구 퇴계로 24
우편번호           : 04637
할당일자           : 20201229

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 211.232.192.0 - 211.232.239.255 (/19+/20)
기관명             : 티브로드 전주방송
네트워크 구분      : CUSTOMER
주소               : 전라북도 전주시 완산구 팔달로
우편번호           : 54992
할당내역 등록일    : 20020201

이름               : IP주소 담당자
전화번호           : +82-70-8188-8083
전자우편           : hjyang11@tbroad.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 211.232.192.0 - 211.232.223.255 (/19)
Organization Name  : SK Broadband Co Ltd
Service Name       : broadNnet
Address            : Seoul Jung-gu Toegye-ro 24
Zip Code           : 04637
Registration Date  : 20201229

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 211.232.192.0 - 211.232.239.255 (/19+/20)
Organization Name  : TBROAD Jeonju
Network Type       : CUSTOMER
Address            : Paldal-ro Wansan-gu Jeonju-si Jeollabuk-do Korea
Zip Code           : 54992
Registration Date  : 20020201

Name               : IP Manager
Phone              : +82-70-8188-8083
E-Mail             : hjyang11@tbroad.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.232.220.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10317
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.232.220.108.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 06:43:38 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 108.220.232.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.220.232.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.91.254.253 attack
2019-12-10T01:56:05.419788-07:00 suse-nuc sshd[13535]: Invalid user sysadmin from 138.91.254.253 port 5120
...
2019-12-10 19:25:16
222.186.175.220 attack
2019-11-12 04:40:21,393 fail2ban.actions        [842]: NOTICE  [sshd] Ban 222.186.175.220
2019-11-12 07:58:15,206 fail2ban.actions        [842]: NOTICE  [sshd] Ban 222.186.175.220
2019-11-12 12:57:20,994 fail2ban.actions        [842]: NOTICE  [sshd] Ban 222.186.175.220
...
2019-12-10 18:52:01
104.236.250.88 attackspambots
2019-12-10T09:49:08.960338abusebot.cloudsearch.cf sshd\[31423\]: Invalid user fardan from 104.236.250.88 port 45868
2019-12-10 19:11:03
218.92.0.173 attackspam
$f2bV_matches
2019-12-10 18:57:40
115.248.248.14 attack
Dec 10 11:16:09 MK-Soft-Root2 sshd[6630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.248.248.14 
Dec 10 11:16:11 MK-Soft-Root2 sshd[6630]: Failed password for invalid user oz from 115.248.248.14 port 58220 ssh2
...
2019-12-10 19:08:46
163.172.206.78 attackspam
Dec 10 11:31:57 MK-Soft-VM7 sshd[28783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.206.78 
Dec 10 11:31:58 MK-Soft-VM7 sshd[28783]: Failed password for invalid user Country from 163.172.206.78 port 34226 ssh2
...
2019-12-10 19:21:07
66.249.155.244 attack
Dec 10 11:43:02 MK-Soft-VM5 sshd[868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.249.155.244 
Dec 10 11:43:04 MK-Soft-VM5 sshd[868]: Failed password for invalid user 12345 from 66.249.155.244 port 47776 ssh2
...
2019-12-10 19:30:06
92.222.72.234 attackbotsspam
Dec 10 11:34:59 * sshd[4565]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.72.234
Dec 10 11:35:01 * sshd[4565]: Failed password for invalid user www from 92.222.72.234 port 48782 ssh2
2019-12-10 19:06:27
133.130.90.174 attack
Dec 10 05:42:58 ny01 sshd[28664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.90.174
Dec 10 05:43:00 ny01 sshd[28664]: Failed password for invalid user christene from 133.130.90.174 port 56610 ssh2
Dec 10 05:49:09 ny01 sshd[29296]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.90.174
2019-12-10 18:54:39
106.3.130.53 attack
2019-12-10T08:42:18.704027centos sshd\[23450\]: Invalid user thangasamy from 106.3.130.53 port 50798
2019-12-10T08:42:18.710325centos sshd\[23450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.3.130.53
2019-12-10T08:42:20.898710centos sshd\[23450\]: Failed password for invalid user thangasamy from 106.3.130.53 port 50798 ssh2
2019-12-10 19:23:41
187.72.118.191 attack
Dec 10 10:39:23 *** sshd[23700]: User root from 187.72.118.191 not allowed because not listed in AllowUsers
2019-12-10 18:48:20
51.91.158.136 attackbots
Dec 10 12:05:53 ns381471 sshd[31411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.158.136
Dec 10 12:05:56 ns381471 sshd[31411]: Failed password for invalid user arty from 51.91.158.136 port 40910 ssh2
2019-12-10 19:27:27
92.63.194.148 attack
firewall-block, port(s): 36956/tcp
2019-12-10 19:12:52
123.24.148.120 attackbotsspam
ssh failed login
2019-12-10 19:05:07
103.226.185.24 attackspam
Dec 10 00:30:07 sachi sshd\[24273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.185.24  user=root
Dec 10 00:30:10 sachi sshd\[24273\]: Failed password for root from 103.226.185.24 port 60462 ssh2
Dec 10 00:39:24 sachi sshd\[25208\]: Invalid user escovitz from 103.226.185.24
Dec 10 00:39:24 sachi sshd\[25208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.226.185.24
Dec 10 00:39:26 sachi sshd\[25208\]: Failed password for invalid user escovitz from 103.226.185.24 port 42196 ssh2
2019-12-10 18:50:20

Recently Reported IPs

14.213.27.165 92.223.232.68 82.163.188.50 82.110.141.228
35.203.210.174 31.235.131.7 193.5.117.134 110.77.248.165
2606:4700:10::6816:3479 2606:4700:10::6816:138 2606:4700:10::ac43:2214 2606:4700:10::6816:2644
2606:4700:10::6816:4067 2606:4700:10::6814:4829 2606:4700:10::6814:5678 2606:4700:10::ac43:1228
2606:4700:10::6814:6068 2606:4700:10::ac43:2889 2606:4700:10::6816:1580 2606:4700:10::6814:5217