City: Eumseong-gun
Region: Chungcheongbuk-do
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 121.191.162.149
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 121.160.0.0 - 121.191.255.255 (/11)
기관명 : 주식회사 케이티
서비스명 : KORNET
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당일자 : 20061106
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 121.191.162.0 - 121.191.162.255 (/24)
기관명 : 서울올림픽기념 국민체육진흥공단
네트워크 구분 : CUSTOMER
주소 : 충청북도 제천시 고암동
우편번호 : 390-090
할당내역 등록일 : 20150317
이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 121.160.0.0 - 121.191.255.255 (/11)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20061106
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 121.191.162.0 - 121.191.162.255 (/24)
Organization Name : Seoulolrimpikginyeom gukmincheyukjinheunggongdan
Network Type : CUSTOMER
Address : Goam-Dong Jecheon-Si Chungcheongbuk-Do
Zip Code : 390-090
Registration Date : 20150317
Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.191.162.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.191.162.149. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400
;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:27:07 CST 2026
;; MSG SIZE rcvd: 108
Host 149.162.191.121.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 149.162.191.121.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 82.177.87.98 | attackbots | Brute force attack stopped by firewall |
2020-04-05 10:53:44 |
| 35.200.165.32 | attackbots | SSH bruteforce (Triggered fail2ban) |
2020-04-05 10:27:29 |
| 41.215.4.178 | attackbotsspam | Brute force attack stopped by firewall |
2020-04-05 10:41:24 |
| 200.6.169.250 | attackspambots | Brute force attack stopped by firewall |
2020-04-05 11:07:01 |
| 114.67.77.148 | attackbotsspam | Invalid user bjq from 114.67.77.148 port 41660 |
2020-04-05 10:39:35 |
| 222.186.173.142 | attackbotsspam | Multiple SSH login attempts. |
2020-04-05 10:46:14 |
| 64.139.79.35 | attack | Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018 |
2020-04-05 10:59:06 |
| 103.37.82.118 | attack | Brute force attack stopped by firewall |
2020-04-05 11:01:38 |
| 51.254.32.133 | attackspambots | $f2bV_matches |
2020-04-05 10:49:19 |
| 111.230.157.219 | attackspambots | fail2ban -- 111.230.157.219 ... |
2020-04-05 10:40:01 |
| 123.113.191.130 | attackspam | Apr 5 02:05:39 124388 sshd[25357]: Failed password for games from 123.113.191.130 port 44604 ssh2 Apr 5 02:08:53 124388 sshd[25516]: Invalid user zimbra from 123.113.191.130 port 36390 Apr 5 02:08:53 124388 sshd[25516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.113.191.130 Apr 5 02:08:53 124388 sshd[25516]: Invalid user zimbra from 123.113.191.130 port 36390 Apr 5 02:08:56 124388 sshd[25516]: Failed password for invalid user zimbra from 123.113.191.130 port 36390 ssh2 |
2020-04-05 10:51:19 |
| 46.32.78.150 | attackspambots | Brute force attack stopped by firewall |
2020-04-05 11:08:33 |
| 45.7.138.40 | attackspambots | SSH Brute-Forcing (server2) |
2020-04-05 10:29:57 |
| 193.252.189.177 | attackspam | Apr 5 03:21:05 vpn01 sshd[28807]: Failed password for root from 193.252.189.177 port 43658 ssh2 ... |
2020-04-05 10:38:30 |
| 190.152.180.90 | attack | Brute force attack stopped by firewall |
2020-04-05 11:03:49 |