Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seongbuk-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 121.160.73.75


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 121.160.0.0 - 121.191.255.255 (/11)
기관명             : 주식회사 케이티
서비스명           : KORNET
주소               : 경기도 성남시 분당구 불정로 90
우편번호           : 13606
할당일자           : 20061106

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 121.160.73.0 - 121.160.73.127 (/25)
기관명             : 한국건강증진개발원
네트워크 구분      : CUSTOMER
주소               : 서울특별시 광진구 능동로 400
우편번호           : 04933
할당내역 등록일    : 20231120

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 121.160.0.0 - 121.191.255.255 (/11)
Organization Name  : Korea Telecom
Service Name       : KORNET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code           : 13606
Registration Date  : 20061106

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 121.160.73.0 - 121.160.73.127 (/25)
Organization Name  : Hangukgeongangjeungjingaebalwon
Network Type       : CUSTOMER
Address            : 400 Neungdongro Gwangjin-Gu Seoulteukbyeol-Si
Zip Code           : 04933
Registration Date  : 20231120

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.160.73.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42749
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.160.73.75.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:21:09 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 75.73.160.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 75.73.160.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.55.195.191 attackbotsspam
Feb 24 00:30:13 olgosrv01 sshd[20455]: Did not receive identification string from 45.55.195.191
Feb 24 00:31:51 olgosrv01 sshd[20592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.195.191  user=r.r
Feb 24 00:31:52 olgosrv01 sshd[20592]: Failed password for r.r from 45.55.195.191 port 58866 ssh2
Feb 24 00:31:52 olgosrv01 sshd[20592]: Received disconnect from 45.55.195.191: 11: Normal Shutdown, Thank you for playing [preauth]
Feb 24 00:33:00 olgosrv01 sshd[20674]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.195.191  user=r.r
Feb 24 00:33:01 olgosrv01 sshd[20674]: Failed password for r.r from 45.55.195.191 port 39192 ssh2
Feb 24 00:33:01 olgosrv01 sshd[20674]: Received disconnect from 45.55.195.191: 11: Normal Shutdown, Thank you for playing [preauth]
Feb 24 00:34:00 olgosrv01 sshd[20720]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost........
-------------------------------
2020-02-25 03:50:01
80.82.78.100 attackbotsspam
80.82.78.100 was recorded 26 times by 13 hosts attempting to connect to the following ports: 1030,1051,1045. Incident counter (4h, 24h, all-time): 26, 115, 19599
2020-02-25 04:07:51
195.175.57.182 attackspam
Feb 24 14:22:21 debian-2gb-nbg1-2 kernel: \[4809741.858457\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.175.57.182 DST=195.201.40.59 LEN=52 TOS=0x00 PREC=0x00 TTL=110 ID=3572 DF PROTO=TCP SPT=52445 DPT=1433 WINDOW=8192 RES=0x00 SYN URGP=0
2020-02-25 04:13:19
168.0.103.207 attack
Email rejected due to spam filtering
2020-02-25 03:44:19
82.213.210.91 attackspambots
" "
2020-02-25 03:43:51
178.138.35.75 attackbotsspam
Email rejected due to spam filtering
2020-02-25 03:39:11
159.69.183.149 attackspambots
Unauthorized access to web resources
2020-02-25 03:52:59
124.156.64.236 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-25 04:05:32
188.119.103.39 attackspam
188.119.103.39 has been banned for [spam]
...
2020-02-25 03:37:48
106.13.92.226 attackbotsspam
2020-02-24T14:05:45.544270vt1.awoom.xyz sshd[12055]: Invalid user mc from 106.13.92.226 port 52042
2020-02-24T14:05:45.548102vt1.awoom.xyz sshd[12055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.92.226
2020-02-24T14:05:45.544270vt1.awoom.xyz sshd[12055]: Invalid user mc from 106.13.92.226 port 52042
2020-02-24T14:05:47.666105vt1.awoom.xyz sshd[12055]: Failed password for invalid user mc from 106.13.92.226 port 52042 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.92.226
2020-02-25 03:55:48
178.124.170.186 attackbots
Trying ports that it shouldn't be.
2020-02-25 04:10:10
106.13.3.80 attackbots
2020-02-24T14:14:09.482226vt1.awoom.xyz sshd[15768]: Invalid user dc from 106.13.3.80 port 42366
2020-02-24T14:14:09.485208vt1.awoom.xyz sshd[15768]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.3.80
2020-02-24T14:14:09.482226vt1.awoom.xyz sshd[15768]: Invalid user dc from 106.13.3.80 port 42366
2020-02-24T14:14:11.125990vt1.awoom.xyz sshd[15768]: Failed password for invalid user dc from 106.13.3.80 port 42366 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.3.80
2020-02-25 04:13:49
198.108.67.111 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-25 03:29:15
77.108.9.18 attackbots
Attempted to connect 2 times to port 22 TCP
2020-02-25 03:38:21
1.53.112.91 attack
1582550634 - 02/24/2020 14:23:54 Host: 1.53.112.91/1.53.112.91 Port: 445 TCP Blocked
2020-02-25 03:32:07

Recently Reported IPs

119.93.12.223 129.46.42.145 114.170.171.243 107.80.174.117
192.71.171.180 220.103.180.243 189.124.22.175 148.60.121.63
139.170.148.54 157.65.71.96 103.28.224.162 103.131.219.97
10.87.231.118 10.80.168.235 212.117.78.120 19.249.194.52
193.124.146.204 110.78.154.225 2606:4700:10::6816:1034 2606:4700:10::6814:5424