City: Songpa-gu
Region: Seoul Special City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 121.133.137.61
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 121.128.0.0 - 121.159.255.255 (/11)
기관명 : 주식회사 케이티
서비스명 : KORNET
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당일자 : 20060417
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 121.133.137.0 - 121.133.137.255 (/24)
기관명 : (주) 케이티
네트워크 구분 : CUSTOMER
주소 : 서울특별시 송파구 가락동
우편번호 : 138160
할당내역 등록일 : 20240829
이름 : IP주소 담당자
전화번호 : +82-2-500-6631
전자우편 : kornet_ip@kt.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 121.128.0.0 - 121.159.255.255 (/11)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20060417
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 121.133.137.0 - 121.133.137.255 (/24)
Organization Name : KT
Network Type : CUSTOMER
Address : Garak-Dong Songpa-Gu Seoulteukbyeol-Si
Zip Code : 138160
Registration Date : 20240829
Name : IP Manager
Phone : +82-2-500-6631
E-Mail : kornet_ip@kt.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.133.137.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.133.137.61. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032401 1800 900 604800 86400
;; Query time: 3 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 12:29:42 CST 2026
;; MSG SIZE rcvd: 107
Host 61.137.133.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 61.137.133.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 89.248.174.216 | attackspambots | 04/12/2020-16:41:29.134552 89.248.174.216 Protocol: 17 ET DROP Dshield Block Listed Source group 1 |
2020-04-13 05:13:31 |
| 46.238.53.245 | attackbotsspam | Bruteforce detected by fail2ban |
2020-04-13 05:36:58 |
| 183.88.216.115 | attackspambots | 'IP reached maximum auth failures for a one day block' |
2020-04-13 05:29:18 |
| 80.82.77.86 | attackbots | Apr 12 22:57:44 debian-2gb-nbg1-2 kernel: \[8984061.085960\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.77.86 DST=195.201.40.59 LEN=49 TOS=0x00 PREC=0x00 TTL=247 ID=54321 PROTO=UDP SPT=42477 DPT=12111 LEN=29 |
2020-04-13 05:19:25 |
| 222.186.180.142 | attackbotsspam | Apr 13 02:12:07 gw1 sshd[24941]: Failed password for root from 222.186.180.142 port 11750 ssh2 Apr 13 02:12:09 gw1 sshd[24941]: Failed password for root from 222.186.180.142 port 11750 ssh2 ... |
2020-04-13 05:23:04 |
| 193.169.252.228 | attackspambots | $f2bV_matches |
2020-04-13 05:32:55 |
| 61.132.226.140 | attackbotsspam | Apr 12 22:27:05 ms-srv sshd[60293]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.132.226.140 Apr 12 22:27:07 ms-srv sshd[60293]: Failed password for invalid user killebrew from 61.132.226.140 port 51390 ssh2 |
2020-04-13 05:36:19 |
| 112.85.42.176 | attack | Apr 12 20:52:52 localhost sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Apr 12 20:52:54 localhost sshd[9235]: Failed password for root from 112.85.42.176 port 43111 ssh2 Apr 12 20:52:58 localhost sshd[9235]: Failed password for root from 112.85.42.176 port 43111 ssh2 Apr 12 20:52:52 localhost sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Apr 12 20:52:54 localhost sshd[9235]: Failed password for root from 112.85.42.176 port 43111 ssh2 Apr 12 20:52:58 localhost sshd[9235]: Failed password for root from 112.85.42.176 port 43111 ssh2 Apr 12 20:52:52 localhost sshd[9235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176 user=root Apr 12 20:52:54 localhost sshd[9235]: Failed password for root from 112.85.42.176 port 43111 ssh2 Apr 12 20:52:58 localhost sshd[9235]: Failed password for ... |
2020-04-13 05:03:37 |
| 103.219.112.31 | attackbotsspam | 7346/tcp 1536/tcp 32255/tcp... [2020-03-29/04-12]51pkt,17pt.(tcp) |
2020-04-13 05:27:46 |
| 188.131.178.32 | attack | 2020-04-12T22:33:36.625933vps751288.ovh.net sshd\[19998\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.178.32 user=root 2020-04-12T22:33:38.659317vps751288.ovh.net sshd\[19998\]: Failed password for root from 188.131.178.32 port 56908 ssh2 2020-04-12T22:37:25.484980vps751288.ovh.net sshd\[20030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.178.32 user=root 2020-04-12T22:37:26.956263vps751288.ovh.net sshd\[20030\]: Failed password for root from 188.131.178.32 port 44152 ssh2 2020-04-12T22:41:19.615670vps751288.ovh.net sshd\[20084\]: Invalid user axel from 188.131.178.32 port 59660 |
2020-04-13 05:18:25 |
| 49.233.90.8 | attackbots | Apr 12 23:00:50 localhost sshd\[19994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8 user=root Apr 12 23:00:52 localhost sshd\[19994\]: Failed password for root from 49.233.90.8 port 50600 ssh2 Apr 12 23:04:55 localhost sshd\[20151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8 user=root Apr 12 23:04:57 localhost sshd\[20151\]: Failed password for root from 49.233.90.8 port 38912 ssh2 Apr 12 23:08:53 localhost sshd\[20434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.90.8 user=root ... |
2020-04-13 05:22:35 |
| 185.238.160.100 | attack | Banned by Fail2Ban. |
2020-04-13 05:29:04 |
| 192.241.237.137 | attack | 435/tcp 7002/tcp 26/tcp... [2020-03-16/04-12]23pkt,21pt.(tcp),1pt.(udp) |
2020-04-13 05:28:48 |
| 106.240.246.194 | attackspam | 20 attempts against mh-ssh on cloud |
2020-04-13 05:04:45 |
| 112.85.42.174 | attackspambots | Apr 12 23:13:25 minden010 sshd[28424]: Failed password for root from 112.85.42.174 port 8419 ssh2 Apr 12 23:13:28 minden010 sshd[28424]: Failed password for root from 112.85.42.174 port 8419 ssh2 Apr 12 23:13:32 minden010 sshd[28424]: Failed password for root from 112.85.42.174 port 8419 ssh2 Apr 12 23:13:35 minden010 sshd[28424]: Failed password for root from 112.85.42.174 port 8419 ssh2 ... |
2020-04-13 05:19:08 |