Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dongjak-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '118.91.0.0 - 118.91.63.255'

% Abuse contact for '118.91.0.0 - 118.91.63.255' is 'irt@nic.or.kr'

inetnum:        118.91.0.0 - 118.91.63.255
netname:        HCN
descr:          kt HCN Co.,Ltd.
country:        KR
admin-c:        IM699-AP
tech-c:         IM699-AP
status:         ASSIGNED PORTABLE
mnt-by:         MNT-KRNIC-AP
mnt-irt:        IRT-KRNIC-KR
last-modified:  2025-12-02T01:02:06Z
source:         APNIC

irt:            IRT-KRNIC-KR
address:        9, Jinheung-gil, Naju-si, Jeollanam-do
e-mail:         irt@nic.or.kr
abuse-mailbox:  irt@nic.or.kr
admin-c:        IM574-AP
tech-c:         IM574-AP
auth:           # Filtered
remarks:        irt@nic.or.kr was validated on 2020-04-09
mnt-by:         MNT-KRNIC-AP
last-modified:  2025-09-04T01:00:01Z
source:         APNIC

person:         IP Manager
address:        Seoul Mapo-gu Maebongsan-ro 75
country:        KR
phone:          +82-2-1877-8000
e-mail:         hcn_ipadm@kthcn.co.kr
nic-hdl:        IM699-AP
mnt-by:         MNT-KRNIC-AP
last-modified:  2025-09-22T00:20:02Z
source:         APNIC

% Information related to '118.91.0.0 - 118.91.63.255'

inetnum:        118.91.0.0 - 118.91.63.255
netname:        HCN-KR
descr:          kt HCN Co.,Ltd.
country:        KR
admin-c:        IA82-KR
tech-c:         IM82-KR
status:         ALLOCATED PORTABLE
mnt-by:         MNT-KRNIC-AP
mnt-irt:        IRT-KRNIC-KR
remarks:        This information has been partially mirrored by APNIC from
remarks:        KRNIC. To obtain more specific information, please use the
remarks:        KRNIC whois server at whois.kisa.or.kr.
source:         KRNIC

person:         IP Manager
address:        Seoul Mapo-gu Maebongsan-ro 75
address:        HCN
country:        KR
phone:          +82-2-1877-8000
e-mail:         hcn_ipadm@kthcn.co.kr
nic-hdl:        IA82-KR
mnt-by:         MNT-KRNIC-AP
remarks:        This information has been partially mirrored by APNIC from
remarks:        KRNIC. To obtain more specific information, please use the
remarks:        KRNIC whois server at whois.kisa.or.kr.
source:         KRNIC

person:         IP Manager
address:        Seoul Mapo-gu Maebongsan-ro 75
address:        HCN
country:        KR
phone:          +82-2-1877-8000
e-mail:         hcn_ipadm@kthcn.co.kr
nic-hdl:        IM82-KR
mnt-by:         MNT-KRNIC-AP
remarks:        This information has been partially mirrored by APNIC from
remarks:        KRNIC. To obtain more specific information, please use the
remarks:        KRNIC whois server at whois.kisa.or.kr.
source:         KRNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.91.0.115
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.91.0.115.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030800 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 15:45:03 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 115.0.91.118.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 115.0.91.118.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.144.183.188 attackbots
Sep 29 18:34:04 ncomp sshd[7309]: Invalid user tests from 192.144.183.188 port 54362
Sep 29 18:34:04 ncomp sshd[7309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.183.188
Sep 29 18:34:04 ncomp sshd[7309]: Invalid user tests from 192.144.183.188 port 54362
Sep 29 18:34:06 ncomp sshd[7309]: Failed password for invalid user tests from 192.144.183.188 port 54362 ssh2
2020-09-30 06:45:34
42.194.211.37 attackbots
Tried sshing with brute force.
2020-09-30 07:06:45
42.224.170.12 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-30 08:14:43
128.199.156.25 attackbots
Lines containing failures of 128.199.156.25
Sep 28 16:18:56 neweola sshd[6939]: Invalid user appserver from 128.199.156.25 port 51358
Sep 28 16:18:56 neweola sshd[6939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.156.25 
Sep 28 16:18:57 neweola sshd[6939]: Failed password for invalid user appserver from 128.199.156.25 port 51358 ssh2
Sep 28 16:18:58 neweola sshd[6939]: Received disconnect from 128.199.156.25 port 51358:11: Bye Bye [preauth]
Sep 28 16:18:58 neweola sshd[6939]: Disconnected from invalid user appserver 128.199.156.25 port 51358 [preauth]
Sep 28 16:35:39 neweola sshd[7413]: Invalid user webmaster from 128.199.156.25 port 41520
Sep 28 16:35:39 neweola sshd[7413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.156.25 
Sep 28 16:35:41 neweola sshd[7413]: Failed password for invalid user webmaster from 128.199.156.25 port 41520 ssh2
Sep 28 16:35:43 neweola sshd[........
------------------------------
2020-09-30 06:54:51
182.189.83.220 attackbots
Brute-force attempt banned
2020-09-30 06:47:50
27.154.66.175 attackspambots
Invalid user tf2 from 27.154.66.175 port 22834
2020-09-30 06:48:42
186.95.199.156 attackbotsspam
Unauthorized connection attempt from IP address 186.95.199.156 on Port 445(SMB)
2020-09-30 07:17:29
94.57.252.147 attack
2020-09-29T17:33:40.683365abusebot.cloudsearch.cf sshd[3012]: Invalid user pascal from 94.57.252.147 port 60224
2020-09-29T17:33:40.688476abusebot.cloudsearch.cf sshd[3012]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.57.252.147
2020-09-29T17:33:40.683365abusebot.cloudsearch.cf sshd[3012]: Invalid user pascal from 94.57.252.147 port 60224
2020-09-29T17:33:43.205713abusebot.cloudsearch.cf sshd[3012]: Failed password for invalid user pascal from 94.57.252.147 port 60224 ssh2
2020-09-29T17:41:16.637007abusebot.cloudsearch.cf sshd[3046]: Invalid user oracle from 94.57.252.147 port 45962
2020-09-29T17:41:16.642652abusebot.cloudsearch.cf sshd[3046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.57.252.147
2020-09-29T17:41:16.637007abusebot.cloudsearch.cf sshd[3046]: Invalid user oracle from 94.57.252.147 port 45962
2020-09-29T17:41:18.758636abusebot.cloudsearch.cf sshd[3046]: Failed password for inval
...
2020-09-30 08:08:57
51.105.5.16 attack
Time:     Tue Sep 29 19:46:02 2020 +0000
IP:       51.105.5.16 (GB/United Kingdom/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 29 19:37:36 29-1 sshd[31741]: Invalid user cpanel from 51.105.5.16 port 59156
Sep 29 19:37:38 29-1 sshd[31741]: Failed password for invalid user cpanel from 51.105.5.16 port 59156 ssh2
Sep 29 19:42:20 29-1 sshd[32405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.105.5.16  user=root
Sep 29 19:42:22 29-1 sshd[32405]: Failed password for root from 51.105.5.16 port 54330 ssh2
Sep 29 19:46:02 29-1 sshd[491]: Invalid user qq from 51.105.5.16 port 37166
2020-09-30 08:08:34
49.88.112.72 attack
Sep 30 01:33:32 pkdns2 sshd\[55398\]: Failed password for root from 49.88.112.72 port 34970 ssh2Sep 30 01:37:09 pkdns2 sshd\[55558\]: Failed password for root from 49.88.112.72 port 16188 ssh2Sep 30 01:38:02 pkdns2 sshd\[55563\]: Failed password for root from 49.88.112.72 port 10970 ssh2Sep 30 01:38:04 pkdns2 sshd\[55563\]: Failed password for root from 49.88.112.72 port 10970 ssh2Sep 30 01:38:06 pkdns2 sshd\[55563\]: Failed password for root from 49.88.112.72 port 10970 ssh2Sep 30 01:38:58 pkdns2 sshd\[55590\]: Failed password for root from 49.88.112.72 port 14624 ssh2
...
2020-09-30 06:58:53
103.208.137.2 attackbots
2020-09-29T17:13:25.915913linuxbox-skyline sshd[219983]: Invalid user zimeip from 103.208.137.2 port 49160
...
2020-09-30 07:14:10
106.13.184.234 attack
DATE:2020-09-30 00:11:26, IP:106.13.184.234, PORT:ssh SSH brute force auth (docker-dc)
2020-09-30 07:18:01
185.132.53.14 attackbotsspam
The sucker tried to brute force my teeny tiny SSH server
2020-09-30 08:20:09
58.221.72.170 attack
2020-09-29T14:04:10.320790beta postfix/smtpd[13478]: warning: unknown[58.221.72.170]: SASL LOGIN authentication failed: authentication failure
2020-09-29T14:04:16.894043beta postfix/smtpd[13478]: warning: unknown[58.221.72.170]: SASL LOGIN authentication failed: authentication failure
2020-09-29T14:04:33.211898beta postfix/smtpd[13478]: warning: unknown[58.221.72.170]: SASL LOGIN authentication failed: authentication failure
...
2020-09-30 06:43:50
154.221.28.224 attack
Sep 30 01:39:36 root sshd[30561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.28.224  user=root
Sep 30 01:39:38 root sshd[30561]: Failed password for root from 154.221.28.224 port 47348 ssh2
...
2020-09-30 06:51:53

Recently Reported IPs

183.191.125.135 124.117.193.134 121.29.149.152 116.167.203.103
36.155.184.139 112.109.233.21 87.121.84.18 129.212.188.167
174.136.206.85 10.86.4.25 34.76.111.153 111.19.132.237
44.217.150.136 104.131.177.14 188.166.127.231 61.172.227.22
38.85.249.222 18.205.63.110 122.226.127.177 14.212.103.74