Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Eumseong-gun

Region: Chungcheongbuk-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 121.191.162.149


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 121.160.0.0 - 121.191.255.255 (/11)
기관명             : 주식회사 케이티
서비스명           : KORNET
주소               : 경기도 성남시 분당구 불정로 90
우편번호           : 13606
할당일자           : 20061106

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 121.191.162.0 - 121.191.162.255 (/24)
기관명             : 서울올림픽기념 국민체육진흥공단
네트워크 구분      : CUSTOMER
주소               : 충청북도 제천시 고암동
우편번호           : 390-090
할당내역 등록일    : 20150317

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 121.160.0.0 - 121.191.255.255 (/11)
Organization Name  : Korea Telecom
Service Name       : KORNET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code           : 13606
Registration Date  : 20061106

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 121.191.162.0 - 121.191.162.255 (/24)
Organization Name  : Seoulolrimpikginyeom gukmincheyukjinheunggongdan
Network Type       : CUSTOMER
Address            : Goam-Dong Jecheon-Si Chungcheongbuk-Do
Zip Code           : 390-090
Registration Date  : 20150317

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.191.162.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.191.162.149.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:27:07 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 149.162.191.121.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.162.191.121.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
82.177.87.98 attackbots
Brute force attack stopped by firewall
2020-04-05 10:53:44
35.200.165.32 attackbots
SSH bruteforce (Triggered fail2ban)
2020-04-05 10:27:29
41.215.4.178 attackbotsspam
Brute force attack stopped by firewall
2020-04-05 10:41:24
200.6.169.250 attackspambots
Brute force attack stopped by firewall
2020-04-05 11:07:01
114.67.77.148 attackbotsspam
Invalid user bjq from 114.67.77.148 port 41660
2020-04-05 10:39:35
222.186.173.142 attackbotsspam
Multiple SSH login attempts.
2020-04-05 10:46:14
64.139.79.35 attack
Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018
2020-04-05 10:59:06
103.37.82.118 attack
Brute force attack stopped by firewall
2020-04-05 11:01:38
51.254.32.133 attackspambots
$f2bV_matches
2020-04-05 10:49:19
111.230.157.219 attackspambots
fail2ban -- 111.230.157.219
...
2020-04-05 10:40:01
123.113.191.130 attackspam
Apr  5 02:05:39 124388 sshd[25357]: Failed password for games from 123.113.191.130 port 44604 ssh2
Apr  5 02:08:53 124388 sshd[25516]: Invalid user zimbra from 123.113.191.130 port 36390
Apr  5 02:08:53 124388 sshd[25516]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.113.191.130
Apr  5 02:08:53 124388 sshd[25516]: Invalid user zimbra from 123.113.191.130 port 36390
Apr  5 02:08:56 124388 sshd[25516]: Failed password for invalid user zimbra from 123.113.191.130 port 36390 ssh2
2020-04-05 10:51:19
46.32.78.150 attackspambots
Brute force attack stopped by firewall
2020-04-05 11:08:33
45.7.138.40 attackspambots
SSH Brute-Forcing (server2)
2020-04-05 10:29:57
193.252.189.177 attackspam
Apr  5 03:21:05 vpn01 sshd[28807]: Failed password for root from 193.252.189.177 port 43658 ssh2
...
2020-04-05 10:38:30
190.152.180.90 attack
Brute force attack stopped by firewall
2020-04-05 11:03:49

Recently Reported IPs

218.234.139.133 19.168.218.252 60.3.36.100 59.26.129.97
217.68.75.232 160.210.131.166 113.160.196.163 134.214.57.86
47.242.58.79 103.115.63.38 52.96.3.178 185.96.194.104
15.115.69.9 139.20.145.184 125.138.52.163 103.144.173.41
211.239.108.27 193.242.107.70 121.230.89.101 2606:4700:10::ac43:1982