Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 220.67.58.33


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 220.66.0.0 - 220.67.255.255 (/15)
기관명             : 재단법인 한국교육정보화재단
서비스명           : KREN
주소               : 서울특별시 종로구 대학로 57
우편번호           : 03082
할당일자           : 20030312

이름               : IP주소 담당자
전화번호           : +82-2-882-5363
전자우편           : kindman@kren.kr

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 220.67.0.0 - 220.67.63.255 (/18)
기관명             : 영남이공대학교
네트워크 구분      : CUSTOMER
주소               : 대구 남구 대명7동
우편번호           : 705037
할당내역 등록일    : 20040421

이름               : IP주소 담당자
전화번호           : +82-53-650-9183
전자우편           : sycho@ync.ac.kr


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 220.66.0.0 - 220.67.255.255 (/15)
Organization Name  : Korean Education Network
Service Name       : KREN
Address            : 57 Daehak-ro, Jongno-gu, Seoul
Zip Code           : 03082
Registration Date  : 20030312

Name               : IP Manager
Phone              : +82-2-882-5363
E-Mail             : kindman@kren.kr

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 220.67.0.0 - 220.67.63.255 (/18)
Organization Name  : Yeungnam College Of Science & Technology
Network Type       : CUSTOMER
Address            : Daemyeong7-dong  Nam-gu  Daegu
Zip Code           : 705037
Registration Date  : 20040421

Name               : IP Manager
Phone              : +82-53-650-9183
E-Mail             : sycho@ync.ac.kr


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.67.58.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.67.58.33.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 05:14:21 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 33.58.67.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 33.58.67.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.243.151.237 attackspam
24.06.2019 04:57:54 Connection to port 5900 blocked by firewall
2019-06-24 14:51:16
177.87.68.151 attack
failed_logins
2019-06-24 14:39:15
2.139.209.78 attackspam
Jun 24 07:17:44 dedicated sshd[6099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78  user=root
Jun 24 07:17:46 dedicated sshd[6099]: Failed password for root from 2.139.209.78 port 49736 ssh2
Jun 24 07:19:06 dedicated sshd[6208]: Invalid user digitalocean from 2.139.209.78 port 56538
Jun 24 07:19:06 dedicated sshd[6208]: Invalid user digitalocean from 2.139.209.78 port 56538
2019-06-24 15:16:31
170.233.172.130 attack
Distributed brute force attack
2019-06-24 14:47:13
93.1.230.187 attack
Jun 24 08:48:02 dev sshd\[16433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.1.230.187  user=root
Jun 24 08:48:04 dev sshd\[16433\]: Failed password for root from 93.1.230.187 port 53732 ssh2
...
2019-06-24 15:18:47
41.47.71.179 attackbots
DATE:2019-06-24 06:54:38, IP:41.47.71.179, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-06-24 15:18:09
178.128.184.62 attackbotsspam
Invalid user admin from 178.128.184.62 port 36206
2019-06-24 14:24:48
198.199.94.14 attackspam
WordPress login Brute force / Web App Attack on client site.
2019-06-24 14:33:15
80.211.3.109 attackbots
ssh failed login
2019-06-24 15:08:49
54.244.129.101 attack
Fail2Ban Ban Triggered
2019-06-24 14:48:44
172.96.170.15 attackbots
NAME : FTL-172 CIDR : 172.96.168.0/22 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Puerto Rico - block certain countries :) IP: 172.96.170.15  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-24 15:07:27
213.30.51.82 attackbots
SMB Server BruteForce Attack
2019-06-24 15:11:12
191.240.24.102 attackbotsspam
Distributed brute force attack
2019-06-24 14:50:29
92.118.37.84 attackspambots
Excessive Port-Scanning
2019-06-24 15:05:52
162.243.145.48 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-06-24 14:30:17

Recently Reported IPs

164.155.74.148 172.197.121.24 116.77.69.173 10.235.8.12
172.217.23.141 2606:4700:10::ac43:2258 122.193.247.208 2606:4700:10::6816:650
2606:4700:10::ac43:995 2606:4700:10::ac43:2496 2606:4700:10::6814:7166 2606:4700:10::6816:4725
2606:4700:10::6814:4585 2606:4700:10::6816:1556 2606:4700:10::ac43:2825 2606:4700:10::6814:5989
109.162.246.66 2606:4700:10::ac43:1111 2606:4700:10::6814:7333 2606:4700:10::6814:4590