City: Dobong-gu
Region: Seoul Special City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b'query : 121.129.137.231
# KOREAN(UTF8)
xecxa1xb0xedx9ax8cxedx95x98xecx8bxa0 IPv4xecxa3xbcxecx86x8cxebx8ax94 xedx95x9cxeaxb5xadxecx9dxb8xedx84xb0xebx84xb7xecxa7x84xedx9dxa5xecx9bx90xecx9cxbcxebxa1x9cxebxb6x80xedx84xb0 xecx95x84xebx9ex98xecx9dx98 xeaxb4x80xebxa6xacxebx8cx80xedx96x89xecx9ex90xecx97x90xeaxb2x8c xedx95xa0xebx8bxb9xebx90x98xecx97x88xecx9cxbcxebxa9xb0, xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4xebx8ax94 xebx8bxa4xecx9dx8cxeaxb3xbc xeaxb0x99xecx8axb5xebx8bx88xebx8bxa4.
[ xebx84xa4xedx8axb8xecx9bx8cxedx81xac xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4 ]
IPv4xecxa3xbcxecx86x8c : 121.128.0.0 - 121.159.255.255 (/11)
xeaxb8xb0xeaxb4x80xebxaax85 : xecxa3xbcxecx8bx9dxedx9ax8cxecx82xac xecxbcx80xecx9dxb4xedx8bxb0
xecx84x9cxebxb9x84xecx8axa4xebxaax85 : KORNET
xecxa3xbcxecx86x8c : xeaxb2xbdxeaxb8xb0xebx8fx84 xecx84xb1xebx82xa8xecx8bx9c xebxb6x84xebx8bxb9xeaxb5xac xebxb6x88xecxa0x95xebxa1x9c 90
xecx9axb0xedx8exb8xebxb2x88xedx98xb8 : 13606
xedx95xa0xebx8bxb9xecx9dxbcxecx9ex90 : 20060417
xecx9dxb4xebxa6x84 : IPxecxa3xbcxecx86x8c xebx8bxb4xebx8bxb9xecx9ex90
xecxa0x84xedx99x94xebxb2x88xedx98xb8 : +82-2-500-6630
xecxa0x84xecx9ex90xecx9axb0xedx8exb8 : kornet_ip@kt.com
xecxa1xb0xedx9ax8cxedx95x98xecx8bxa0 IPv4xecxa3xbcxecx86x8cxebx8ax94 xecx9cx84xecx9dx98 xeaxb4x80xebxa6xacxebx8cx80xedx96x89xecx9ex90xebxa1x9cxebxb6x80xedx84xb0 xecx95x84xebx9ex98xecx9dx98 xecx82xacxecx9axa9xecx9ex90xecx97x90xeaxb2x8c xedx95xa0xebx8bxb9xebx90x98xecx97x88xecx9cxbcxebxa9xb0, xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4xebx8ax94 xebx8bxa4xecx9dx8cxeaxb3xbc xeaxb0x99xecx8axb5xebx8bx88xebx8bxa4.
--------------------------------------------------------------------------------
[ xebx84xa4xedx8axb8xecx9bx8cxedx81xac xedx95xa0xebx8bxb9 xecxa0x95xebxb3xb4 ]
IPv4xecxa3xbcxecx86x8c : 121.129.137.0 - 121.129.137.255 (/24)
xeaxb8xb0xeaxb4x80xebxaax85 : (xecxa3xbc) xecxbcx80xecx9dxb4xedx8bxb0
xebx84xa4xedx8axb8xecx9bx8cxedx81xac xeaxb5xacxebxb6x84 : CUSTOMER
xecxa3xbcxecx86x8c : xeaxb2xbdxeaxb8xb0xebx8fx84 xecx84xb1xebx82xa8xecx8bx9c xebxb6x84xebx8bxb9xeaxb5xac xebxb6x88xecxa0x95xebxa1x9c 90
xecx9axb0xedx8exb8xebxb2x88xedx98xb8 : 13606
xedx95xa0xebx8bxb9xebx82xb4xecx97xad xebx93xb1xebxa1x9dxecx9dxbc : 20200205
xecx9dxb4xebxa6x84 : IPxecxa3xbcxecx86x8c xebx8bxb4xebx8bxb9xecx9ex90
xecxa0x84xedx99x94xebxb2x88xedx98xb8 : +82-2-500-6630
xecxa0x84xecx9ex90xecx9axb0xedx8exb8 : kornet_ip@kt.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 121.128.0.0 - 121.159.255.255 (/11)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20060417
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 121.129.137.0 - 121.129.137.255 (/24)
Organization Name : Korea Telecom
Network Type : CUSTOMER
Address : 90 Buljeongro Bundang-Gu Seongnam-Si Gyeonggi-Do
Zip Code : 13606
Registration Date : 20200205
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
- KISA/KRNIC WHOIS Service -'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.129.137.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58658
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.129.137.231. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 22:15:57 CST 2026
;; MSG SIZE rcvd: 108
Host 231.137.129.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 231.137.129.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 109.74.5.123 | attackbotsspam | ICMP MP Probe, Scan - |
2019-10-03 23:25:57 |
| 142.93.201.168 | attackbots | Oct 3 16:31:41 nextcloud sshd\[31832\]: Invalid user ftpuser from 142.93.201.168 Oct 3 16:31:41 nextcloud sshd\[31832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.201.168 Oct 3 16:31:44 nextcloud sshd\[31832\]: Failed password for invalid user ftpuser from 142.93.201.168 port 42378 ssh2 ... |
2019-10-03 23:29:27 |
| 179.185.89.64 | attackspam | Oct 3 05:20:37 web9 sshd\[6243\]: Invalid user attack from 179.185.89.64 Oct 3 05:20:37 web9 sshd\[6243\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.64 Oct 3 05:20:39 web9 sshd\[6243\]: Failed password for invalid user attack from 179.185.89.64 port 10278 ssh2 Oct 3 05:26:01 web9 sshd\[7129\]: Invalid user web1 from 179.185.89.64 Oct 3 05:26:01 web9 sshd\[7129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.185.89.64 |
2019-10-03 23:42:40 |
| 61.194.0.217 | attackspambots | Oct 3 17:33:57 bouncer sshd\[17075\]: Invalid user us from 61.194.0.217 port 36119 Oct 3 17:33:57 bouncer sshd\[17075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.194.0.217 Oct 3 17:33:59 bouncer sshd\[17075\]: Failed password for invalid user us from 61.194.0.217 port 36119 ssh2 ... |
2019-10-04 00:04:42 |
| 94.23.41.222 | attack | Oct 3 05:34:19 wbs sshd\[29862\]: Invalid user kvernevik from 94.23.41.222 Oct 3 05:34:19 wbs sshd\[29862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns323499.ip-94-23-41.eu Oct 3 05:34:21 wbs sshd\[29862\]: Failed password for invalid user kvernevik from 94.23.41.222 port 36395 ssh2 Oct 3 05:38:27 wbs sshd\[30201\]: Invalid user plaidhorse from 94.23.41.222 Oct 3 05:38:27 wbs sshd\[30201\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns323499.ip-94-23-41.eu |
2019-10-03 23:48:31 |
| 201.55.199.143 | attackbots | 2019-10-03T15:10:33.581322abusebot-2.cloudsearch.cf sshd\[6353\]: Invalid user kitti from 201.55.199.143 port 33582 |
2019-10-03 23:58:05 |
| 68.251.142.26 | attackbotsspam | Oct 3 14:47:41 MK-Soft-Root1 sshd[9431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.251.142.26 Oct 3 14:47:43 MK-Soft-Root1 sshd[9431]: Failed password for invalid user dev from 68.251.142.26 port 21570 ssh2 ... |
2019-10-03 23:29:53 |
| 222.186.180.147 | attackspam | [ssh] SSH attack |
2019-10-03 23:20:38 |
| 163.172.207.104 | attackbotsspam | \[2019-10-03 11:32:56\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T11:32:56.008-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="35011972592277524",SessionID="0x7f1e1c2bed58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/56167",ACLName="no_extension_match" \[2019-10-03 11:37:37\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T11:37:37.517-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="36011972592277524",SessionID="0x7f1e1c2dd6d8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/54619",ACLName="no_extension_match" \[2019-10-03 11:41:49\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T11:41:49.762-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="37011972592277524",SessionID="0x7f1e1c3735b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/65353",ACL |
2019-10-04 00:01:22 |
| 83.30.31.97 | attackspambots | Automatic report - SSH Brute-Force Attack |
2019-10-03 23:31:41 |
| 185.143.221.186 | attackspam | 10/03/2019-11:01:39.914385 185.143.221.186 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2019-10-03 23:45:21 |
| 51.38.37.128 | attack | Oct 3 17:38:31 OPSO sshd\[24566\]: Invalid user 12345678 from 51.38.37.128 port 52424 Oct 3 17:38:31 OPSO sshd\[24566\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.128 Oct 3 17:38:33 OPSO sshd\[24566\]: Failed password for invalid user 12345678 from 51.38.37.128 port 52424 ssh2 Oct 3 17:42:16 OPSO sshd\[25485\]: Invalid user password from 51.38.37.128 port 44400 Oct 3 17:42:16 OPSO sshd\[25485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.37.128 |
2019-10-03 23:53:37 |
| 106.75.141.160 | attackbotsspam | Oct 3 05:29:59 sachi sshd\[6960\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160 user=root Oct 3 05:30:01 sachi sshd\[6960\]: Failed password for root from 106.75.141.160 port 50152 ssh2 Oct 3 05:35:45 sachi sshd\[7411\]: Invalid user zabbix from 106.75.141.160 Oct 3 05:35:45 sachi sshd\[7411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.160 Oct 3 05:35:47 sachi sshd\[7411\]: Failed password for invalid user zabbix from 106.75.141.160 port 56688 ssh2 |
2019-10-03 23:38:09 |
| 139.199.193.202 | attack | Oct 3 05:40:49 kapalua sshd\[16944\]: Invalid user admin from 139.199.193.202 Oct 3 05:40:49 kapalua sshd\[16944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202 Oct 3 05:40:51 kapalua sshd\[16944\]: Failed password for invalid user admin from 139.199.193.202 port 46874 ssh2 Oct 3 05:46:53 kapalua sshd\[17527\]: Invalid user carolina from 139.199.193.202 Oct 3 05:46:53 kapalua sshd\[17527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202 |
2019-10-03 23:54:48 |
| 110.53.234.0 | attackbots | ICMP MP Probe, Scan - |
2019-10-03 23:22:17 |