City: unknown
Region: unknown
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 118.48.249.229
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 118.32.0.0 - 118.63.255.255 (/11)
기관명 : 주식회사 케이티
서비스명 : KORNET
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당일자 : 20070803
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 118.48.249.128 - 118.48.249.255 (/25)
기관명 : (주) 케이티
네트워크 구분 : CUSTOMER
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당내역 등록일 : 20220504
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 118.32.0.0 - 118.63.255.255 (/11)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20070803
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 118.48.249.128 - 118.48.249.255 (/25)
Organization Name : Korea Telecom
Network Type : CUSTOMER
Address : 90 Buljeongro Bundang-Gu Seongnam-Si Gyeonggi-Do
Zip Code : 13606
Registration Date : 20220504
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.48.249.229
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;118.48.249.229. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025102301 1800 900 604800 86400
;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 24 05:59:06 CST 2025
;; MSG SIZE rcvd: 107
Host 229.249.48.118.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 229.249.48.118.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 49.235.138.2 | attackbotsspam | Lines containing failures of 49.235.138.2 Dec 9 15:39:25 majoron sshd[21934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.2 user=r.r Dec 9 15:39:27 majoron sshd[21934]: Failed password for r.r from 49.235.138.2 port 38738 ssh2 Dec 9 15:39:30 majoron sshd[21934]: Received disconnect from 49.235.138.2 port 38738:11: Bye Bye [preauth] Dec 9 15:39:30 majoron sshd[21934]: Disconnected from authenticating user r.r 49.235.138.2 port 38738 [preauth] Dec 9 15:53:36 majoron sshd[22160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.138.2 user=r.r ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=49.235.138.2 |
2019-12-10 00:12:40 |
| 3.9.159.138 | attackbots | GET /`/etc/passwd` GET /etc/passwd |
2019-12-10 00:09:06 |
| 49.234.87.24 | attack | Dec 9 15:56:21 h2177944 sshd\[4704\]: Invalid user stvold from 49.234.87.24 port 42976 Dec 9 15:56:21 h2177944 sshd\[4704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.87.24 Dec 9 15:56:23 h2177944 sshd\[4704\]: Failed password for invalid user stvold from 49.234.87.24 port 42976 ssh2 Dec 9 16:04:25 h2177944 sshd\[5466\]: Invalid user admin from 49.234.87.24 port 40892 Dec 9 16:04:25 h2177944 sshd\[5466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.87.24 ... |
2019-12-10 00:01:27 |
| 91.121.115.148 | attackbots | Dec 9 18:04:28 hosting sshd[10975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns318847.ip-91-121-115.eu user=rpc Dec 9 18:04:30 hosting sshd[10975]: Failed password for rpc from 91.121.115.148 port 60630 ssh2 ... |
2019-12-09 23:55:10 |
| 162.243.10.64 | attackspam | Dec 9 05:48:06 wbs sshd\[23720\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64 user=root Dec 9 05:48:08 wbs sshd\[23720\]: Failed password for root from 162.243.10.64 port 56736 ssh2 Dec 9 05:53:28 wbs sshd\[24203\]: Invalid user gore from 162.243.10.64 Dec 9 05:53:28 wbs sshd\[24203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.10.64 Dec 9 05:53:30 wbs sshd\[24203\]: Failed password for invalid user gore from 162.243.10.64 port 37014 ssh2 |
2019-12-09 23:58:48 |
| 165.22.182.168 | attackbotsspam | Nov 7 10:33:48 odroid64 sshd\[32219\]: Invalid user serverpilot from 165.22.182.168 Nov 7 10:33:48 odroid64 sshd\[32219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168 ... |
2019-12-09 23:54:08 |
| 112.17.160.200 | attackbots | Dec 9 16:04:15 ns41 sshd[9059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.17.160.200 |
2019-12-10 00:17:20 |
| 128.193.5.229 | attackspam | If you don`t pay me 1000 dollars worth in Bit-Coin, I will send your masturbation video and search history to all your contacts. Received: from smtp-vp03.sig.oregonstate.edu ([128.193.5.229]:54982) |
2019-12-10 00:30:24 |
| 185.209.0.91 | attackspam | 1575907627 - 12/09/2019 17:07:07 Host: 185.209.0.91/185.209.0.91 Port: 15 TCP Blocked |
2019-12-10 00:13:47 |
| 183.82.96.58 | attack | 2019-12-09T17:09:56.124569 sshd[11804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.96.58 user=root 2019-12-09T17:09:58.449583 sshd[11804]: Failed password for root from 183.82.96.58 port 5964 ssh2 2019-12-09T17:16:53.903558 sshd[11933]: Invalid user soxy from 183.82.96.58 port 4856 2019-12-09T17:16:53.918403 sshd[11933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.96.58 2019-12-09T17:16:53.903558 sshd[11933]: Invalid user soxy from 183.82.96.58 port 4856 2019-12-09T17:16:55.822084 sshd[11933]: Failed password for invalid user soxy from 183.82.96.58 port 4856 ssh2 ... |
2019-12-10 00:27:29 |
| 45.82.153.140 | attackbots | 2019-12-09 16:46:03 dovecot_login authenticator failed for \(\[45.82.153.140\]\) \[45.82.153.140\]: 535 Incorrect authentication data \(set_id=giorgio@opso.it\) 2019-12-09 16:46:13 dovecot_login authenticator failed for \(\[45.82.153.140\]\) \[45.82.153.140\]: 535 Incorrect authentication data 2019-12-09 16:46:24 dovecot_login authenticator failed for \(\[45.82.153.140\]\) \[45.82.153.140\]: 535 Incorrect authentication data 2019-12-09 16:46:40 dovecot_login authenticator failed for \(\[45.82.153.140\]\) \[45.82.153.140\]: 535 Incorrect authentication data 2019-12-09 16:46:48 dovecot_login authenticator failed for \(\[45.82.153.140\]\) \[45.82.153.140\]: 535 Incorrect authentication data |
2019-12-10 00:01:48 |
| 187.111.210.160 | attack | Lines containing failures of 187.111.210.160 Dec 9 15:54:02 hvs sshd[180531]: error: maximum authentication attempts exceeded for r.r from 187.111.210.160 port 38156 ssh2 [preauth] Dec 9 15:54:02 hvs sshd[180531]: Disconnecting authenticating user r.r 187.111.210.160 port 38156: Too many authentication failures [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=187.111.210.160 |
2019-12-10 00:19:20 |
| 139.199.158.14 | attackbots | Dec 9 15:20:00 game-panel sshd[8460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14 Dec 9 15:20:02 game-panel sshd[8460]: Failed password for invalid user calado from 139.199.158.14 port 47096 ssh2 Dec 9 15:27:56 game-panel sshd[8843]: Failed password for root from 139.199.158.14 port 47866 ssh2 |
2019-12-10 00:09:42 |
| 81.213.214.225 | attackbots | Dec 9 06:04:00 wbs sshd\[25245\]: Invalid user mcfeely from 81.213.214.225 Dec 9 06:04:00 wbs sshd\[25245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.213.214.225 Dec 9 06:04:03 wbs sshd\[25245\]: Failed password for invalid user mcfeely from 81.213.214.225 port 46305 ssh2 Dec 9 06:12:42 wbs sshd\[26286\]: Invalid user alesha from 81.213.214.225 Dec 9 06:12:42 wbs sshd\[26286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.213.214.225 |
2019-12-10 00:28:59 |
| 167.160.19.250 | attack | nginx-botsearch jail |
2019-12-10 00:14:57 |