City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 220.64.53.124
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 220.64.0.0 - 220.64.255.255 (/16)
기관명 : 드림라인(주)
서비스명 : DREAMX
주소 : 서울특별시 구로구 디지털로31길 61
우편번호 : 08375
할당일자 : 20031027
이름 : IP주소 담당자
전화번호 : +82-2-6007-6215
전자우편 : ip@dreamline.co.kr
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 220.64.53.64 - 220.64.53.127 (/26)
기관명 : 컴앤랜탈
네트워크 구분 : CUSTOMER
주소 : 경상남도 창원시 의창구 창원대로 400
우편번호 : 51401
할당내역 등록일 : 20160803
이름 : IP주소 담당자
전화번호 : +82-10-9307-0786
전자우편 : connrental@naver.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 220.64.0.0 - 220.64.255.255 (/16)
Organization Name : DREAMLINE CO.
Service Name : DREAMX
Address : Seoul Guro-gu Digital-ro 31-gil 61
Zip Code : 08375
Registration Date : 20031027
Name : IP Manager
Phone : +82-2-6007-6215
E-Mail : ip@dreamline.co.kr
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 220.64.53.64 - 220.64.53.127 (/26)
Organization Name : ComNRental
Network Type : CUSTOMER
Address : Gyeongsangnam-do Uichang-gu Changwon-si Changwon-daero 400
Zip Code : 51401
Registration Date : 20160803
Name : IP Manager
Phone : +82-10-9307-0786
E-Mail : connrental@naver.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.64.53.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.64.53.124. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 08:39:19 CST 2026
;; MSG SIZE rcvd: 106
Host 124.53.64.220.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 124.53.64.220.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 180.250.140.74 | attack | 2019-12-11T08:15:31.086387abusebot-4.cloudsearch.cf sshd\[15827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.140.74 user=root |
2019-12-11 16:45:57 |
| 139.199.164.21 | attackspambots | Dec 11 08:44:36 sso sshd[4407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.164.21 Dec 11 08:44:37 sso sshd[4407]: Failed password for invalid user guest from 139.199.164.21 port 59554 ssh2 ... |
2019-12-11 16:42:20 |
| 106.13.77.243 | attackbots | Dec 11 07:21:19 ns3042688 sshd\[17404\]: Invalid user smmsp from 106.13.77.243 Dec 11 07:21:19 ns3042688 sshd\[17404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.77.243 Dec 11 07:21:21 ns3042688 sshd\[17404\]: Failed password for invalid user smmsp from 106.13.77.243 port 36398 ssh2 Dec 11 07:28:22 ns3042688 sshd\[20123\]: Invalid user wuellner from 106.13.77.243 Dec 11 07:28:22 ns3042688 sshd\[20123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.77.243 ... |
2019-12-11 17:14:07 |
| 106.13.170.159 | attackbots | Host Scan |
2019-12-11 16:47:04 |
| 192.186.93.110 | attackspam | Dec 11 15:41:34 webhost01 sshd[29872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.186.93.110 Dec 11 15:41:36 webhost01 sshd[29872]: Failed password for invalid user hugo26 from 192.186.93.110 port 41855 ssh2 ... |
2019-12-11 16:43:50 |
| 210.51.161.210 | attackbotsspam | Dec 10 11:42:29 microserver sshd[3997]: Invalid user meins from 210.51.161.210 port 59400 Dec 10 11:42:29 microserver sshd[3997]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210 Dec 10 11:42:32 microserver sshd[3997]: Failed password for invalid user meins from 210.51.161.210 port 59400 ssh2 Dec 10 11:48:39 microserver sshd[5116]: Invalid user sean from 210.51.161.210 port 33858 Dec 10 11:48:39 microserver sshd[5116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210 Dec 10 12:00:47 microserver sshd[7811]: Invalid user holloway from 210.51.161.210 port 39342 Dec 10 12:00:47 microserver sshd[7811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.51.161.210 Dec 10 12:00:49 microserver sshd[7811]: Failed password for invalid user holloway from 210.51.161.210 port 39342 ssh2 Dec 10 12:07:39 microserver sshd[9037]: Invalid user stadelmeier from 210.51.161.210 port |
2019-12-11 16:50:37 |
| 219.166.85.146 | attackspambots | Dec 11 09:44:04 localhost sshd\[17468\]: Invalid user glkariya from 219.166.85.146 port 35598 Dec 11 09:44:04 localhost sshd\[17468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.166.85.146 Dec 11 09:44:06 localhost sshd\[17468\]: Failed password for invalid user glkariya from 219.166.85.146 port 35598 ssh2 |
2019-12-11 16:49:18 |
| 89.101.141.136 | attackspambots | Dec 10 23:54:40 shadeyouvpn sshd[31417]: reveeclipse mapping checking getaddrinfo for 089-101-141136.ntlworld.ie [89.101.141.136] failed - POSSIBLE BREAK-IN ATTEMPT! Dec 10 23:54:40 shadeyouvpn sshd[31417]: Invalid user dr0gatu from 89.101.141.136 Dec 10 23:54:40 shadeyouvpn sshd[31417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.101.141.136 Dec 10 23:54:42 shadeyouvpn sshd[31417]: Failed password for invalid user dr0gatu from 89.101.141.136 port 41462 ssh2 Dec 10 23:54:42 shadeyouvpn sshd[31417]: Received disconnect from 89.101.141.136: 11: Bye Bye [preauth] Dec 10 23:55:16 shadeyouvpn sshd[31736]: reveeclipse mapping checking getaddrinfo for 089-101-141136.ntlworld.ie [89.101.141.136] failed - POSSIBLE BREAK-IN ATTEMPT! Dec 10 23:55:16 shadeyouvpn sshd[31736]: Invalid user drabiswas from 89.101.141.136 Dec 10 23:55:16 shadeyouvpn sshd[31736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........ ------------------------------- |
2019-12-11 17:04:19 |
| 222.186.169.194 | attackspam | Dec 11 09:53:25 amit sshd\[3710\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root Dec 11 09:53:27 amit sshd\[3710\]: Failed password for root from 222.186.169.194 port 57000 ssh2 Dec 11 09:53:44 amit sshd\[3712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.169.194 user=root ... |
2019-12-11 16:58:52 |
| 185.143.223.128 | attackbotsspam | 2019-12-11T09:33:08.675975+01:00 lumpi kernel: [1343133.037964] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=185.143.223.128 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=28631 PROTO=TCP SPT=52556 DPT=10190 WINDOW=1024 RES=0x00 SYN URGP=0 ... |
2019-12-11 16:38:27 |
| 42.200.66.164 | attack | SSH Brute Force, server-1 sshd[22851]: Failed password for invalid user national from 42.200.66.164 port 45798 ssh2 |
2019-12-11 17:15:22 |
| 103.48.180.117 | attack | Dec 11 08:56:30 root sshd[1848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.180.117 Dec 11 08:56:32 root sshd[1848]: Failed password for invalid user schrum from 103.48.180.117 port 19201 ssh2 Dec 11 09:03:08 root sshd[1914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.48.180.117 ... |
2019-12-11 17:11:42 |
| 152.32.72.122 | attackbotsspam | Dec 11 09:26:54 [host] sshd[18463]: Invalid user test from 152.32.72.122 Dec 11 09:26:54 [host] sshd[18463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.32.72.122 Dec 11 09:26:56 [host] sshd[18463]: Failed password for invalid user test from 152.32.72.122 port 6022 ssh2 |
2019-12-11 17:06:26 |
| 54.38.214.191 | attack | 2019-12-11T08:57:00.477910abusebot-5.cloudsearch.cf sshd\[12412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu user=root |
2019-12-11 16:57:44 |
| 109.169.0.103 | attack | Cryptocurrency Fraud Spam Return-Path: |
2019-12-11 16:54:52 |