City: Gangnam-gu
Region: Seoul Special City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 121.134.176.103
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 121.128.0.0 - 121.159.255.255 (/11)
기관명 : 주식회사 케이티
서비스명 : KORNET
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당일자 : 20060417
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 121.134.176.0 - 121.134.176.255 (/24)
기관명 : (주) 케이티
네트워크 구분 : CUSTOMER
주소 : 서울특별시 강남구 도곡동
우편번호 : 135270
할당내역 등록일 : 20240829
이름 : IP주소 담당자
전화번호 : +82-2-500-6631
전자우편 : kornet_ip@kt.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 121.128.0.0 - 121.159.255.255 (/11)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20060417
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 121.134.176.0 - 121.134.176.255 (/24)
Organization Name : KT
Network Type : CUSTOMER
Address : Dogok-Dong Gangnam-Gu Seoulteukbyeol-Si
Zip Code : 135270
Registration Date : 20240829
Name : IP Manager
Phone : +82-2-500-6631
E-Mail : kornet_ip@kt.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.134.176.103
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19963
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.134.176.103. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032500 1800 900 604800 86400
;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 25 16:03:35 CST 2026
;; MSG SIZE rcvd: 108
Host 103.176.134.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 103.176.134.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.177.172.128 | attackbots | Jan 24 17:12:42 MK-Soft-VM7 sshd[8774]: Failed password for root from 61.177.172.128 port 16104 ssh2 Jan 24 17:12:46 MK-Soft-VM7 sshd[8774]: Failed password for root from 61.177.172.128 port 16104 ssh2 ... |
2020-01-25 00:31:18 |
| 122.179.159.7 | attackbotsspam | Unauthorized connection attempt from IP address 122.179.159.7 on Port 445(SMB) |
2020-01-25 00:51:02 |
| 14.204.104.6 | attackbots | Port scan on 1 port(s): 23 |
2020-01-25 00:09:06 |
| 52.184.160.48 | attackbots | Too many connections or unauthorized access detected from Arctic banned ip |
2020-01-25 00:17:45 |
| 54.37.230.141 | attackbotsspam | Unauthorized connection attempt detected from IP address 54.37.230.141 to port 2220 [J] |
2020-01-25 00:28:12 |
| 123.207.237.31 | attack | Unauthorized connection attempt detected from IP address 123.207.237.31 to port 2220 [J] |
2020-01-25 00:40:04 |
| 51.91.102.173 | attack | Invalid user midgear from 51.91.102.173 port 45110 |
2020-01-25 00:27:44 |
| 84.203.33.126 | attackbots | Unauthorized connection attempt detected from IP address 84.203.33.126 to port 8080 |
2020-01-25 00:12:00 |
| 41.34.170.218 | attack | Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM - |
2020-01-25 00:46:58 |
| 80.90.169.242 | attackspam | Unauthorised access (Jan 24) SRC=80.90.169.242 LEN=48 TTL=113 ID=21698 DF TCP DPT=445 WINDOW=8192 SYN |
2020-01-25 00:17:30 |
| 222.186.190.2 | attackspam | Jan 24 17:05:44 eventyay sshd[22166]: Failed password for root from 222.186.190.2 port 27360 ssh2 Jan 24 17:05:56 eventyay sshd[22166]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 27360 ssh2 [preauth] Jan 24 17:06:02 eventyay sshd[22168]: Failed password for root from 222.186.190.2 port 52182 ssh2 ... |
2020-01-25 00:23:14 |
| 198.8.81.92 | attackspambots | Brute force VPN server |
2020-01-25 00:29:40 |
| 3.231.222.198 | attack | Jan 24 17:10:12 meumeu sshd[7539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.231.222.198 Jan 24 17:10:14 meumeu sshd[7539]: Failed password for invalid user ubuntu from 3.231.222.198 port 40682 ssh2 Jan 24 17:15:55 meumeu sshd[8351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=3.231.222.198 ... |
2020-01-25 00:26:22 |
| 46.100.107.72 | attackspam | port scan and connect, tcp 1433 (ms-sql-s) |
2020-01-25 00:41:03 |
| 63.81.87.193 | attackspambots | Jan 24 14:38:05 grey postfix/smtpd\[26261\]: NOQUEUE: reject: RCPT from pets.jcnovel.com\[63.81.87.193\]: 554 5.7.1 Service unavailable\; Client host \[63.81.87.193\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.81.87.193\]\; from=\ |
2020-01-25 00:44:30 |