City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 220.67.58.33
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 220.66.0.0 - 220.67.255.255 (/15)
기관명 : 재단법인 한국교육정보화재단
서비스명 : KREN
주소 : 서울특별시 종로구 대학로 57
우편번호 : 03082
할당일자 : 20030312
이름 : IP주소 담당자
전화번호 : +82-2-882-5363
전자우편 : kindman@kren.kr
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 220.67.0.0 - 220.67.63.255 (/18)
기관명 : 영남이공대학교
네트워크 구분 : CUSTOMER
주소 : 대구 남구 대명7동
우편번호 : 705037
할당내역 등록일 : 20040421
이름 : IP주소 담당자
전화번호 : +82-53-650-9183
전자우편 : sycho@ync.ac.kr
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 220.66.0.0 - 220.67.255.255 (/15)
Organization Name : Korean Education Network
Service Name : KREN
Address : 57 Daehak-ro, Jongno-gu, Seoul
Zip Code : 03082
Registration Date : 20030312
Name : IP Manager
Phone : +82-2-882-5363
E-Mail : kindman@kren.kr
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 220.67.0.0 - 220.67.63.255 (/18)
Organization Name : Yeungnam College Of Science & Technology
Network Type : CUSTOMER
Address : Daemyeong7-dong Nam-gu Daegu
Zip Code : 705037
Registration Date : 20040421
Name : IP Manager
Phone : +82-53-650-9183
E-Mail : sycho@ync.ac.kr
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.67.58.33
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;220.67.58.33. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400
;; Query time: 4 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 05:14:21 CST 2026
;; MSG SIZE rcvd: 105
Host 33.58.67.220.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 33.58.67.220.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 162.243.151.237 | attackspam | 24.06.2019 04:57:54 Connection to port 5900 blocked by firewall |
2019-06-24 14:51:16 |
| 177.87.68.151 | attack | failed_logins |
2019-06-24 14:39:15 |
| 2.139.209.78 | attackspam | Jun 24 07:17:44 dedicated sshd[6099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.139.209.78 user=root Jun 24 07:17:46 dedicated sshd[6099]: Failed password for root from 2.139.209.78 port 49736 ssh2 Jun 24 07:19:06 dedicated sshd[6208]: Invalid user digitalocean from 2.139.209.78 port 56538 Jun 24 07:19:06 dedicated sshd[6208]: Invalid user digitalocean from 2.139.209.78 port 56538 |
2019-06-24 15:16:31 |
| 170.233.172.130 | attack | Distributed brute force attack |
2019-06-24 14:47:13 |
| 93.1.230.187 | attack | Jun 24 08:48:02 dev sshd\[16433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.1.230.187 user=root Jun 24 08:48:04 dev sshd\[16433\]: Failed password for root from 93.1.230.187 port 53732 ssh2 ... |
2019-06-24 15:18:47 |
| 41.47.71.179 | attackbots | DATE:2019-06-24 06:54:38, IP:41.47.71.179, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis) |
2019-06-24 15:18:09 |
| 178.128.184.62 | attackbotsspam | Invalid user admin from 178.128.184.62 port 36206 |
2019-06-24 14:24:48 |
| 198.199.94.14 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2019-06-24 14:33:15 |
| 80.211.3.109 | attackbots | ssh failed login |
2019-06-24 15:08:49 |
| 54.244.129.101 | attack | Fail2Ban Ban Triggered |
2019-06-24 14:48:44 |
| 172.96.170.15 | attackbots | NAME : FTL-172 CIDR : 172.96.168.0/22 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack USA - Puerto Rico - block certain countries :) IP: 172.96.170.15 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-24 15:07:27 |
| 213.30.51.82 | attackbots | SMB Server BruteForce Attack |
2019-06-24 15:11:12 |
| 191.240.24.102 | attackbotsspam | Distributed brute force attack |
2019-06-24 14:50:29 |
| 92.118.37.84 | attackspambots | Excessive Port-Scanning |
2019-06-24 15:05:52 |
| 162.243.145.48 | attackspam | Portscan or hack attempt detected by psad/fwsnort |
2019-06-24 14:30:17 |