City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 115.12.246.187
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 115.0.0.0 - 115.15.255.255 (/12)
기관명 : 주식회사 케이티
서비스명 : KORNET
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당일자 : 20080703
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 115.12.246.0 - 115.12.246.255 (/24)
기관명 : (주) 케이티
네트워크 구분 : CUSTOMER
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당내역 등록일 : 20221213
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 115.0.0.0 - 115.15.255.255 (/12)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20080703
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 115.12.246.0 - 115.12.246.255 (/24)
Organization Name : Korea Telecom
Network Type : CUSTOMER
Address : 90 Buljeongro Bundang-Gu Seongnam-Si Gyeonggi-Do
Zip Code : 13606
Registration Date : 20221213
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 115.12.246.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3510
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;115.12.246.187. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032601 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 27 05:21:02 CST 2026
;; MSG SIZE rcvd: 107
Host 187.246.12.115.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 187.246.12.115.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 181.211.12.246 | attackbots | Unauthorized connection attempt from IP address 181.211.12.246 on Port 445(SMB) |
2019-08-08 08:07:24 |
| 42.119.246.161 | attackbots | Honeypot attack, port: 23, PTR: PTR record not found |
2019-08-08 07:34:49 |
| 182.50.132.61 | attackbotsspam | Autoban 182.50.132.61 SQL INJECTION |
2019-08-08 07:56:27 |
| 181.174.83.226 | attackspam | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-08 07:45:55 |
| 37.49.225.224 | attack | Aug 8 00:28:54 vps65 postfix/smtpd\[24371\]: warning: unknown\[37.49.225.224\]: SASL LOGIN authentication failed: authentication failure Aug 8 00:28:57 vps65 postfix/smtpd\[24371\]: warning: unknown\[37.49.225.224\]: SASL LOGIN authentication failed: authentication failure Aug 8 00:28:59 vps65 postfix/smtpd\[24371\]: warning: unknown\[37.49.225.224\]: SASL LOGIN authentication failed: authentication failure ... |
2019-08-08 08:11:55 |
| 144.217.79.233 | attackspambots | Aug 7 23:08:03 SilenceServices sshd[18823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233 Aug 7 23:08:06 SilenceServices sshd[18823]: Failed password for invalid user dredlord from 144.217.79.233 port 49834 ssh2 Aug 7 23:11:59 SilenceServices sshd[20998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.79.233 |
2019-08-08 08:11:22 |
| 103.82.242.93 | attackbotsspam | SQL injection:/index.php?menu_selected=144&sub_menu_selected=1024&country=ESTONIA&language=FR1111111111111'%20UNION%20SELECT%20CHAR(45,120,49,45,81,45),CHAR(45,120,50,45,81,45),CHAR(45,120,51,45,81,45),CHAR(45,120,52,45,81,45),CHAR(45,120,53,45,81,45),CHAR(45,120,54,45,81,45),CHAR(45,120,55,45,81,45),CHAR(45,120,56,45,81,45),CHAR(45,120,57,45,81,45),CHAR(45,120,49,48,45,81,45),CHAR(45,120,49,49,45,81,45),CHAR(45,120,49,50,45,81,45),CHAR(45,120,49,51,45,81,45),CHAR(45,120,49,52,45,81,45),CHAR(45,120,49,53,45,81,45),CHAR(45,120,49,54,45,81,45),CHAR(45,120,49,55,45,81,45),CHAR(45,120,49,56,45,81,45),CHAR(45,120,49,57,45,81,45),CHAR(45,120,50,48,45,81,45),CHAR(45,120,50,49,45,81,45),CHAR(45,120,50,50,45,81,45),CHAR(45,120,50,51,45,81,45),CHAR(45,120,50,52,45,81,45),CHAR(45,120,50,53,45,81,45),CHAR(45,120,50,54,45,81,45),CHAR(45,120,50,55,45,81,45),CHAR(45,120,50,56,45,81,45),CHAR(45,120,50,57,45,81,45),CHAR(45,120,51,48,45,81,45),CHAR(45,120,51,49,45,81,45),CHAR(45,120,51,50,45,81,45),CHAR(45,120,51,51,45,81,45), |
2019-08-08 07:52:28 |
| 181.174.102.66 | attack | Honeypot attack, port: 445, PTR: PTR record not found |
2019-08-08 07:40:34 |
| 91.206.15.28 | attack | scan z |
2019-08-08 08:08:28 |
| 176.31.172.40 | attackbotsspam | 2019-08-08T03:26:42.098479enmeeting.mahidol.ac.th sshd\[11842\]: Invalid user enrique from 176.31.172.40 port 46886 2019-08-08T03:26:42.112967enmeeting.mahidol.ac.th sshd\[11842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.ip-176-31-172.eu 2019-08-08T03:26:44.586668enmeeting.mahidol.ac.th sshd\[11842\]: Failed password for invalid user enrique from 176.31.172.40 port 46886 ssh2 ... |
2019-08-08 07:38:53 |
| 77.132.18.33 | attack | Aug 7 19:33:17 server postfix/smtpd[23727]: NOQUEUE: reject: RCPT from 33.18.132.77.rev.sfr.net[77.132.18.33]: 554 5.7.1 Service unavailable; Client host [77.132.18.33] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/77.132.18.33; from= |
2019-08-08 08:09:28 |
| 177.39.138.234 | attackbots | Unauthorized connection attempt from IP address 177.39.138.234 on Port 445(SMB) |
2019-08-08 08:04:22 |
| 170.246.198.69 | attackspam | Honeypot attack, port: 23, PTR: 170-246-198-069.henet.com.br. |
2019-08-08 07:47:05 |
| 119.145.61.168 | attackbotsspam | Honeypot attack, port: 23, PTR: PTR record not found |
2019-08-08 07:49:21 |
| 203.128.249.42 | attack | Unauthorized connection attempt from IP address 203.128.249.42 on Port 445(SMB) |
2019-08-08 07:57:13 |