Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 220.67.113.196


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 220.66.0.0 - 220.67.255.255 (/15)
기관명             : 재단법인 한국교육정보화재단
서비스명           : KREN
주소               : 서울특별시 종로구 대학로 57
우편번호           : 03082
할당일자           : 20030312

이름               : IP주소 담당자
전화번호           : +82-2-882-5363
전자우편           : kindman@kren.kr

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 220.67.112.0 - 220.67.115.255 (/22)
기관명             : 성결대학교
네트워크 구분      : CUSTOMER
주소               : 경기 안양시 만안구
우편번호           : 430018
할당내역 등록일    : 20040421

이름               : IP주소 담당자
전화번호           : +82-31-467-8226
전자우편           : khbae@sungkyul.ac.kr


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 220.66.0.0 - 220.67.255.255 (/15)
Organization Name  : Korean Education Network
Service Name       : KREN
Address            : 57 Daehak-ro, Jongno-gu, Seoul
Zip Code           : 03082
Registration Date  : 20030312

Name               : IP Manager
Phone              : +82-2-882-5363
E-Mail             : kindman@kren.kr

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 220.67.112.0 - 220.67.115.255 (/22)
Organization Name  : Sungkyul University
Network Type       : CUSTOMER
Address            : Manan-gu  Anyang-si  Gyeonggi
Zip Code           : 430018
Registration Date  : 20040421

Name               : IP Manager
Phone              : +82-31-467-8226
E-Mail             : khbae@sungkyul.ac.kr


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.67.113.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26420
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.67.113.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 09:32:30 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 196.113.67.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.113.67.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.30.59 attackspam
Feb 21 14:15:27 auw2 sshd\[9431\]: Invalid user test from 106.12.30.59
Feb 21 14:15:27 auw2 sshd\[9431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.59
Feb 21 14:15:30 auw2 sshd\[9431\]: Failed password for invalid user test from 106.12.30.59 port 44481 ssh2
Feb 21 14:17:34 auw2 sshd\[9609\]: Invalid user deploy from 106.12.30.59
Feb 21 14:17:34 auw2 sshd\[9609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.30.59
2020-02-22 08:20:43
74.199.108.162 attackbotsspam
Feb 21 23:33:04 [host] sshd[23730]: Invalid user z
Feb 21 23:33:04 [host] sshd[23730]: pam_unix(sshd:
Feb 21 23:33:07 [host] sshd[23730]: Failed passwor
2020-02-22 07:57:12
187.45.123.147 attackbots
DATE:2020-02-21 22:26:32, IP:187.45.123.147, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-22 08:29:52
34.84.232.216 attack
Feb 21 22:12:32 venus sshd[12595]: Invalid user sshuser from 34.84.232.216
Feb 21 22:12:32 venus sshd[12595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.84.232.216 
Feb 21 22:12:34 venus sshd[12595]: Failed password for invalid user sshuser from 34.84.232.216 port 37895 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=34.84.232.216
2020-02-22 08:30:25
5.135.101.228 attack
SASL PLAIN auth failed: ruser=...
2020-02-22 08:34:39
109.195.21.86 attackbots
** MIRAI HOST **
Fri Feb 21 14:28:48 2020 - Child process 137628 handling connection
Fri Feb 21 14:28:48 2020 - New connection from: 109.195.21.86:51806
Fri Feb 21 14:28:48 2020 - Sending data to client: [Login: ]
Fri Feb 21 14:28:48 2020 - Got data: admin
Fri Feb 21 14:28:49 2020 - Sending data to client: [Password: ]
Fri Feb 21 14:28:49 2020 - Got data: 54321
Fri Feb 21 14:28:51 2020 - Child 137629 granting shell
Fri Feb 21 14:28:51 2020 - Child 137628 exiting
Fri Feb 21 14:28:51 2020 - Sending data to client: [Logged in]
Fri Feb 21 14:28:51 2020 - Sending data to client: [Welcome to MX990 Embedded Linux]
Fri Feb 21 14:28:51 2020 - Sending data to client: [[root@dvrdvs /]# ]
Fri Feb 21 14:28:52 2020 - Got data: enable
system
shell
sh
Fri Feb 21 14:28:52 2020 - Sending data to client: [Command not found]
Fri Feb 21 14:28:52 2020 - Sending data to client: [[root@dvrdvs /]# ]
Fri Feb 21 14:28:52 2020 - Got data: cat /proc/mounts; /bin/busybox PCOHJ
Fri Feb 21 14:28:52 2020 - Sending data to clien
2020-02-22 08:23:07
121.180.249.244 attack
Automatic report - Port Scan Attack
2020-02-22 08:17:44
130.180.66.98 attack
Invalid user uno85 from 130.180.66.98 port 42088
2020-02-22 08:13:38
206.189.128.215 attackspambots
Invalid user test from 206.189.128.215 port 58710
2020-02-22 08:11:34
189.210.177.177 attack
$f2bV_matches
2020-02-22 08:37:02
148.102.120.215 attack
Unauthorized connection attempt detected from IP address 148.102.120.215 to port 80
2020-02-22 08:38:58
218.92.0.189 attack
Feb 22 01:12:25 legacy sshd[5639]: Failed password for root from 218.92.0.189 port 12546 ssh2
Feb 22 01:12:28 legacy sshd[5639]: Failed password for root from 218.92.0.189 port 12546 ssh2
Feb 22 01:12:30 legacy sshd[5639]: Failed password for root from 218.92.0.189 port 12546 ssh2
...
2020-02-22 08:34:55
106.12.80.138 attackspambots
Feb 22 00:37:24 [host] sshd[25493]: Invalid user s
Feb 22 00:37:24 [host] sshd[25493]: pam_unix(sshd:
Feb 22 00:37:26 [host] sshd[25493]: Failed passwor
2020-02-22 07:59:36
212.237.57.82 attackbotsspam
Invalid user vmail from 212.237.57.82 port 37402
2020-02-22 08:16:28
116.203.250.168 attack
Feb 21 22:11:45 mxgate1 postfix/postscreen[22756]: CONNECT from [116.203.250.168]:56426 to [176.31.12.44]:25
Feb 21 22:11:45 mxgate1 postfix/dnsblog[22771]: addr 116.203.250.168 listed by domain b.barracudacentral.org as 127.0.0.2
Feb 21 22:11:51 mxgate1 postfix/postscreen[22756]: PASS NEW [116.203.250.168]:56426
Feb 21 22:11:51 mxgate1 postfix/smtpd[22757]: connect from static.168.250.203.116.clients.your-server.de[116.203.250.168]
Feb x@x
Feb x@x
Feb x@x
Feb 21 22:11:53 mxgate1 postfix/smtpd[22757]: disconnect from static.168.250.203.116.clients.your-server.de[116.203.250.168] ehlo=1 mail=3 rcpt=0/3 data=0/3 eclipset=2 quhostname=1 commands=7/13
Feb 21 22:14:33 mxgate1 postfix/anvil[22760]: statistics: max message rate 3/60s for (smtpd:116.203.250.168) at Feb 21 22:11:53
Feb 21 22:19:51 mxgate1 postfix/postscreen[22965]: CONNECT from [116.203.250.168]:39977 to [176.31.12.44]:25
Feb 21 22:19:51 mxgate1 postfix/postscreen[22965]: PASS OLD [116.203.250.168]:39977
Feb 21 ........
-------------------------------
2020-02-22 08:37:58

Recently Reported IPs

134.209.241.145 208.92.3.91 183.106.115.61 179.108.30.45
141.244.12.161 59.1.205.149 112.169.84.173 103.31.238.120
114.88.4.253 159.13.39.187 103.6.222.1 103.6.223.1
101.227.69.37 103.20.248.1 103.20.249.1 103.36.132.1
103.36.135.1 168.98.205.133 2606:4700:10::6814:9607 2606:4700:10::6814:7625