Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jungnang-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 218.234.139.133


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 218.234.0.0 - 218.235.255.255 (/15)
기관명             : 에스케이브로드밴드주식회사
서비스명           : broadNnet
주소               : 서울특별시 중구 퇴계로 24
우편번호           : 04637
할당일자           : 20020527

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 218.234.139.0 - 218.234.139.255 (/24)
기관명             : 에스케이브로드밴드주식회사
네트워크 구분      : CUSTOMER
주소               : 서울특별시 중구 퇴계로
우편번호           : 04637
할당내역 등록일    : 20130205

이름               : IP주소 담당자
전화번호           : +82-80-828-2106
전자우편           : ip-adm@skbroadband.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 218.234.0.0 - 218.235.255.255 (/15)
Organization Name  : SK Broadband Co Ltd
Service Name       : broadNnet
Address            : Seoul Jung-gu Toegye-ro 24
Zip Code           : 04637
Registration Date  : 20020527

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 218.234.139.0 - 218.234.139.255 (/24)
Organization Name  : SK Broadband Co Ltd
Network Type       : CUSTOMER
Address            : Seoul Jung-gu Toegye-ro
Zip Code           : 04637
Registration Date  : 20130205

Name               : IP Manager
Phone              : +82-80-828-2106
E-Mail             : ip-adm@skbroadband.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.234.139.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45491
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.234.139.133.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:22:47 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 133.139.234.218.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.139.234.218.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
158.69.160.191 attack
Dec 12 13:58:40 srv206 sshd[13654]: Invalid user vonderweidt from 158.69.160.191
Dec 12 13:58:40 srv206 sshd[13654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip191.ip-158-69-160.net
Dec 12 13:58:40 srv206 sshd[13654]: Invalid user vonderweidt from 158.69.160.191
Dec 12 13:58:42 srv206 sshd[13654]: Failed password for invalid user vonderweidt from 158.69.160.191 port 54662 ssh2
...
2019-12-12 21:25:14
178.124.161.75 attackspam
Automatic report: SSH brute force attempt
2019-12-12 21:32:07
200.27.3.37 attack
Dec 12 14:14:19 server sshd\[17779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.3.37  user=root
Dec 12 14:14:20 server sshd\[17779\]: Failed password for root from 200.27.3.37 port 34808 ssh2
Dec 12 14:24:59 server sshd\[20946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.3.37  user=root
Dec 12 14:25:01 server sshd\[20946\]: Failed password for root from 200.27.3.37 port 49429 ssh2
Dec 12 14:34:13 server sshd\[23812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.27.3.37  user=mysql
...
2019-12-12 21:36:42
180.182.245.83 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-12 21:41:16
49.234.51.56 attackspam
$f2bV_matches
2019-12-12 21:55:22
167.99.234.170 attack
Dec 12 14:03:08 sd-53420 sshd\[13566\]: Invalid user bonghwanews from 167.99.234.170
Dec 12 14:03:08 sd-53420 sshd\[13566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.234.170
Dec 12 14:03:10 sd-53420 sshd\[13566\]: Failed password for invalid user bonghwanews from 167.99.234.170 port 36426 ssh2
Dec 12 14:08:44 sd-53420 sshd\[13873\]: Invalid user barb from 167.99.234.170
Dec 12 14:08:44 sd-53420 sshd\[13873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.234.170
...
2019-12-12 21:26:58
122.51.57.78 attack
Invalid user flattard from 122.51.57.78 port 47816
2019-12-12 21:51:51
106.12.12.7 attackspambots
Dec 12 09:27:16 124388 sshd[5562]: Failed password for invalid user sezen from 106.12.12.7 port 35384 ssh2
Dec 12 09:31:46 124388 sshd[5602]: Invalid user home from 106.12.12.7 port 47654
Dec 12 09:31:46 124388 sshd[5602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.12.7
Dec 12 09:31:46 124388 sshd[5602]: Invalid user home from 106.12.12.7 port 47654
Dec 12 09:31:48 124388 sshd[5602]: Failed password for invalid user home from 106.12.12.7 port 47654 ssh2
2019-12-12 21:25:56
222.247.248.165 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-12 21:45:49
193.112.108.135 attackbotsspam
Invalid user liguori from 193.112.108.135 port 43510
2019-12-12 22:06:54
106.13.138.238 attackbots
Dec 12 09:37:12 mail1 sshd\[21640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.238  user=root
Dec 12 09:37:14 mail1 sshd\[21640\]: Failed password for root from 106.13.138.238 port 50676 ssh2
Dec 12 10:05:52 mail1 sshd\[2224\]: Invalid user wyndham from 106.13.138.238 port 39016
Dec 12 10:05:52 mail1 sshd\[2224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.138.238
Dec 12 10:05:54 mail1 sshd\[2224\]: Failed password for invalid user wyndham from 106.13.138.238 port 39016 ssh2
...
2019-12-12 22:02:34
149.56.96.78 attack
$f2bV_matches
2019-12-12 21:53:18
118.254.229.171 attackbotsspam
Automatic report - Port Scan Attack
2019-12-12 21:54:24
201.174.182.159 attackbots
Invalid user host from 201.174.182.159 port 52395
2019-12-12 22:06:36
119.29.134.163 attack
Dec 12 09:56:43 vps691689 sshd[29651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.134.163
Dec 12 09:56:46 vps691689 sshd[29651]: Failed password for invalid user fuller from 119.29.134.163 port 43210 ssh2
Dec 12 10:04:28 vps691689 sshd[29924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.134.163
...
2019-12-12 22:03:10

Recently Reported IPs

109.143.125.17 121.191.162.149 19.168.218.252 60.3.36.100
59.26.129.97 217.68.75.232 160.210.131.166 113.160.196.163
134.214.57.86 47.242.58.79 103.115.63.38 52.96.3.178
185.96.194.104 15.115.69.9 139.20.145.184 125.138.52.163
103.144.173.41 211.239.108.27 193.242.107.70 121.230.89.101