Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Dobong-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b'query : 121.129.137.231


# KOREAN(UTF8)

xecxa1xb0xedx9ax8cxedx95x98xecx8bxa0 IPv4xecxa3xbcxecx86x8cxebx8ax94 xedx95x9cxeaxb5xadxecx9dxb8xedx84xb0xebx84xb7xecxa7x84xedx9dxa5xecx9bx90xecx9cxbcxebxa1x9cxebxb6x80xedx84xb0 xecx95x84xebx9ex98xecx9dx98 xeaxb4x80xebxa6xacxebx8cx80xedx96x89xecx9ex90xecx97x90xeaxb2x8c xedx95xa0xebx8bxb9xebx90x98xecx97x88xecx9cxbcxebxa9xb0, xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4xebx8ax94 xebx8bxa4xecx9dx8cxeaxb3xbc xeaxb0x99xecx8axb5xebx8bx88xebx8bxa4.

[ xebx84xa4xedx8axb8xecx9bx8cxedx81xac xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4 ]
IPv4xecxa3xbcxecx86x8c           : 121.128.0.0 - 121.159.255.255 (/11)
xeaxb8xb0xeaxb4x80xebxaax85             : xecxa3xbcxecx8bx9dxedx9ax8cxecx82xac xecxbcx80xecx9dxb4xedx8bxb0
xecx84x9cxebxb9x84xecx8axa4xebxaax85           : KORNET
xecxa3xbcxecx86x8c               : xeaxb2xbdxeaxb8xb0xebx8fx84 xecx84xb1xebx82xa8xecx8bx9c xebxb6x84xebx8bxb9xeaxb5xac xebxb6x88xecxa0x95xebxa1x9c 90
xecx9axb0xedx8exb8xebxb2x88xedx98xb8           : 13606
xedx95xa0xebx8bxb9xecx9dxbcxecx9ex90           : 20060417

xecx9dxb4xebxa6x84               : IPxecxa3xbcxecx86x8c xebx8bxb4xebx8bxb9xecx9ex90
xecxa0x84xedx99x94xebxb2x88xedx98xb8           : +82-2-500-6630
xecxa0x84xecx9ex90xecx9axb0xedx8exb8           : kornet_ip@kt.com

xecxa1xb0xedx9ax8cxedx95x98xecx8bxa0 IPv4xecxa3xbcxecx86x8cxebx8ax94 xecx9cx84xecx9dx98 xeaxb4x80xebxa6xacxebx8cx80xedx96x89xecx9ex90xebxa1x9cxebxb6x80xedx84xb0 xecx95x84xebx9ex98xecx9dx98 xecx82xacxecx9axa9xecx9ex90xecx97x90xeaxb2x8c xedx95xa0xebx8bxb9xebx90x98xecx97x88xecx9cxbcxebxa9xb0, xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4xebx8ax94 xebx8bxa4xecx9dx8cxeaxb3xbc xeaxb0x99xecx8axb5xebx8bx88xebx8bxa4.
--------------------------------------------------------------------------------


[ xebx84xa4xedx8axb8xecx9bx8cxedx81xac xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4 ]
IPv4xecxa3xbcxecx86x8c           : 121.129.137.0 - 121.129.137.255 (/24)
xeaxb8xb0xeaxb4x80xebxaax85             : (xecxa3xbc) xecxbcx80xecx9dxb4xedx8bxb0
xebx84xa4xedx8axb8xecx9bx8cxedx81xac xeaxb5xacxebxb6x84      : CUSTOMER
xecxa3xbcxecx86x8c               : xeaxb2xbdxeaxb8xb0xebx8fx84 xecx84xb1xebx82xa8xecx8bx9c xebxb6x84xebx8bxb9xeaxb5xac xebxb6x88xecxa0x95xebxa1x9c 90
xecx9axb0xedx8exb8xebxb2x88xedx98xb8           : 13606
xedx95xa0xebx8bxb9xebx82xb4xecx97xad xebx93xb1xebxa1x9dxecx9dxbc    : 20200205

xecx9dxb4xebxa6x84               : IPxecxa3xbcxecx86x8c xebx8bxb4xebx8bxb9xecx9ex90
xecxa0x84xedx99x94xebxb2x88xedx98xb8           : +82-2-500-6630
xecxa0x84xecx9ex90xecx9axb0xedx8exb8           : kornet_ip@kt.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 121.128.0.0 - 121.159.255.255 (/11)
Organization Name  : Korea Telecom
Service Name       : KORNET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code           : 13606
Registration Date  : 20060417

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 121.129.137.0 - 121.129.137.255 (/24)
Organization Name  : Korea Telecom
Network Type       : CUSTOMER
Address            : 90 Buljeongro Bundang-Gu Seongnam-Si Gyeonggi-Do
Zip Code           : 13606
Registration Date  : 20200205

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com


- KISA/KRNIC WHOIS Service -'
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.129.137.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.129.137.231.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 22:15:57 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 231.137.129.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 231.137.129.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.74.5.123 attackbotsspam
ICMP MP Probe, Scan -
2019-10-03 23:25:57
142.93.201.168 attackbots
Oct  3 16:31:41 nextcloud sshd\[31832\]: Invalid user ftpuser from 142.93.201.168
Oct  3 16:31:41 nextcloud sshd\[31832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.201.168
Oct  3 16:31:44 nextcloud sshd\[31832\]: Failed password for invalid user ftpuser from 142.93.201.168 port 42378 ssh2
...
2019-10-03 23:29:27
179.185.89.64 attackspam
Oct  3 05:20:37 web9 sshd\[6243\]: Invalid user attack from 179.185.89.64
Oct  3 05:20:37 web9 sshd\[6243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.64
Oct  3 05:20:39 web9 sshd\[6243\]: Failed password for invalid user attack from 179.185.89.64 port 10278 ssh2
Oct  3 05:26:01 web9 sshd\[7129\]: Invalid user web1 from 179.185.89.64
Oct  3 05:26:01 web9 sshd\[7129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.64
2019-10-03 23:42:40
61.194.0.217 attackspambots
Oct  3 17:33:57 bouncer sshd\[17075\]: Invalid user us from 61.194.0.217 port 36119
Oct  3 17:33:57 bouncer sshd\[17075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.194.0.217 
Oct  3 17:33:59 bouncer sshd\[17075\]: Failed password for invalid user us from 61.194.0.217 port 36119 ssh2
...
2019-10-04 00:04:42
94.23.41.222 attack
Oct  3 05:34:19 wbs sshd\[29862\]: Invalid user kvernevik from 94.23.41.222
Oct  3 05:34:19 wbs sshd\[29862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns323499.ip-94-23-41.eu
Oct  3 05:34:21 wbs sshd\[29862\]: Failed password for invalid user kvernevik from 94.23.41.222 port 36395 ssh2
Oct  3 05:38:27 wbs sshd\[30201\]: Invalid user plaidhorse from 94.23.41.222
Oct  3 05:38:27 wbs sshd\[30201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns323499.ip-94-23-41.eu
2019-10-03 23:48:31
201.55.199.143 attackbots
2019-10-03T15:10:33.581322abusebot-2.cloudsearch.cf sshd\[6353\]: Invalid user kitti from 201.55.199.143 port 33582
2019-10-03 23:58:05
68.251.142.26 attackbotsspam
Oct  3 14:47:41 MK-Soft-Root1 sshd[9431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.251.142.26 
Oct  3 14:47:43 MK-Soft-Root1 sshd[9431]: Failed password for invalid user dev from 68.251.142.26 port 21570 ssh2
...
2019-10-03 23:29:53
222.186.180.147 attackspam
[ssh] SSH attack
2019-10-03 23:20:38
163.172.207.104 attackbotsspam
\[2019-10-03 11:32:56\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T11:32:56.008-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="35011972592277524",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/56167",ACLName="no_extension_match"
\[2019-10-03 11:37:37\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T11:37:37.517-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="36011972592277524",SessionID="0x7f1e1c2dd6d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/54619",ACLName="no_extension_match"
\[2019-10-03 11:41:49\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T11:41:49.762-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="37011972592277524",SessionID="0x7f1e1c3735b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/65353",ACL
2019-10-04 00:01:22
83.30.31.97 attackspambots
Automatic report - SSH Brute-Force Attack
2019-10-03 23:31:41
185.143.221.186 attackspam
10/03/2019-11:01:39.914385 185.143.221.186 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-03 23:45:21
51.38.37.128 attack
Oct  3 17:38:31 OPSO sshd\[24566\]: Invalid user 12345678 from 51.38.37.128 port 52424
Oct  3 17:38:31 OPSO sshd\[24566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.128
Oct  3 17:38:33 OPSO sshd\[24566\]: Failed password for invalid user 12345678 from 51.38.37.128 port 52424 ssh2
Oct  3 17:42:16 OPSO sshd\[25485\]: Invalid user password from 51.38.37.128 port 44400
Oct  3 17:42:16 OPSO sshd\[25485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.128
2019-10-03 23:53:37
106.75.141.160 attackbotsspam
Oct  3 05:29:59 sachi sshd\[6960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160  user=root
Oct  3 05:30:01 sachi sshd\[6960\]: Failed password for root from 106.75.141.160 port 50152 ssh2
Oct  3 05:35:45 sachi sshd\[7411\]: Invalid user zabbix from 106.75.141.160
Oct  3 05:35:45 sachi sshd\[7411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160
Oct  3 05:35:47 sachi sshd\[7411\]: Failed password for invalid user zabbix from 106.75.141.160 port 56688 ssh2
2019-10-03 23:38:09
139.199.193.202 attack
Oct  3 05:40:49 kapalua sshd\[16944\]: Invalid user admin from 139.199.193.202
Oct  3 05:40:49 kapalua sshd\[16944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202
Oct  3 05:40:51 kapalua sshd\[16944\]: Failed password for invalid user admin from 139.199.193.202 port 46874 ssh2
Oct  3 05:46:53 kapalua sshd\[17527\]: Invalid user carolina from 139.199.193.202
Oct  3 05:46:53 kapalua sshd\[17527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202
2019-10-03 23:54:48
110.53.234.0 attackbots
ICMP MP Probe, Scan -
2019-10-03 23:22:17

Recently Reported IPs

137.118.201.35 57.141.2.56 12.172.72.20 192.168.66.1
103.137.215.85 141.223.126.34 128.119.193.16 172.235.36.197
89.21.67.177 69.5.169.53 69.5.169.48 69.5.169.34
207.211.179.220 10.21.204.108 10.100.7.167 190.202.19.89
43.164.197.117 2606:4700:10::6816:3626 2606:4700:10::6816:2600 2606:4700:10::ac43:821