City: Seoul
Region: Seoul Special City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 168.93.192.0 - 168.93.255.255
CIDR: 168.93.192.0/18
NetName: ADCIL
NetHandle: NET-168-93-192-0-1
Parent: NET168 (NET-168-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Ace Data Centers II, L.L.C. (ADCIL)
RegDate: 2024-04-17
Updated: 2024-05-30
Comment: https://www.acedatacenter.com/
Comment: Geofeed: https://www.acedatacenter.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/168.93.192.0
OrgName: Ace Data Centers II, L.L.C.
OrgId: ADCIL
Address: 727 North 1550 East
Address: Suite 400
City: Orem
StateProv: UT
PostalCode: 84097
Country: US
RegDate: 2020-03-27
Updated: 2026-04-20
Ref: https://rdap.arin.net/registry/entity/ADCIL
OrgTechHandle: ACEAD-ARIN
OrgTechName: ACE ADMIN
OrgTechPhone: +1-801-900-5673
OrgTechEmail: admin@acedatacenter.com
OrgTechRef: https://rdap.arin.net/registry/entity/ACEAD-ARIN
OrgAbuseHandle: ABUSE8727-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-801-851-5540
OrgAbuseEmail: ipabuse@acedatacenter.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8727-ARIN
OrgTechHandle: LOWRY55-ARIN
OrgTechName: Lowry, Justin
OrgTechPhone: +1-801-735-5256
OrgTechEmail: justin@acedatacenter.com
OrgTechRef: https://rdap.arin.net/registry/entity/LOWRY55-ARIN
RAbuseHandle: ABUSE8727-ARIN
RAbuseName: Abuse
RAbusePhone: +1-801-851-5540
RAbuseEmail: ipabuse@acedatacenter.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8727-ARIN
# end
# start
NetRange: 168.93.224.0 - 168.93.224.255
CIDR: 168.93.224.0/24
NetName: EVOXT
NetHandle: NET-168-93-224-0-1
Parent: ADCIL (NET-168-93-192-0-1)
NetType: Reallocated
OriginAS:
Organization: Evoxt (KR) (EK-29)
RegDate: 2025-11-25
Updated: 2025-11-25
Comment: Geofeed :https://raw.githubusercontent.com/evoxt/geofeed/main/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/168.93.224.0
OrgName: Evoxt (KR)
OrgId: EK-29
Address: 189 Gasan digital 1-ro
City: Seoul
StateProv: Geumcheon-gu
PostalCode: 08503
Country: KR
RegDate: 2025-08-04
Updated: 2025-08-05
Ref: https://rdap.arin.net/registry/entity/EK-29
OrgDNSHandle: KEAC-ARIN
OrgDNSName: KR Evoxt, Abuse Contact
OrgDNSPhone: +601158988860
OrgDNSEmail: abuse@evoxt.com
OrgDNSRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgRoutingHandle: KEAC-ARIN
OrgRoutingName: KR Evoxt, Abuse Contact
OrgRoutingPhone: +601158988860
OrgRoutingEmail: abuse@evoxt.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgNOCHandle: KEAC-ARIN
OrgNOCName: KR Evoxt, Abuse Contact
OrgNOCPhone: +601158988860
OrgNOCEmail: abuse@evoxt.com
OrgNOCRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgTechHandle: KEAC-ARIN
OrgTechName: KR Evoxt, Abuse Contact
OrgTechPhone: +601158988860
OrgTechEmail: abuse@evoxt.com
OrgTechRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgAbuseHandle: KEAC-ARIN
OrgAbuseName: KR Evoxt, Abuse Contact
OrgAbusePhone: +601158988860
OrgAbuseEmail: abuse@evoxt.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.93.224.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17795
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;168.93.224.221. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050400 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 04 21:30:19 CST 2026
;; MSG SIZE rcvd: 107
221.224.93.168.in-addr.arpa domain name pointer 168-93-224-221.aceips.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
221.224.93.168.in-addr.arpa name = 168-93-224-221.aceips.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 185.39.113.76 | attackspambots | Unauthorized connection attempt detected from IP address 185.39.113.76 to port 445 |
2019-12-18 04:25:49 |
| 202.195.225.40 | attackbotsspam | 2019-12-17T16:41:38.897402abusebot-5.cloudsearch.cf sshd\[17654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.195.225.40 user=root 2019-12-17T16:41:41.052435abusebot-5.cloudsearch.cf sshd\[17654\]: Failed password for root from 202.195.225.40 port 38459 ssh2 2019-12-17T16:49:54.063454abusebot-5.cloudsearch.cf sshd\[17684\]: Invalid user zabbix from 202.195.225.40 port 35216 2019-12-17T16:49:54.068976abusebot-5.cloudsearch.cf sshd\[17684\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.195.225.40 |
2019-12-18 04:14:49 |
| 31.209.97.66 | attack | postfix |
2019-12-18 04:10:20 |
| 193.112.72.126 | attack | Dec 17 20:39:15 markkoudstaal sshd[8814]: Failed password for root from 193.112.72.126 port 51596 ssh2 Dec 17 20:45:16 markkoudstaal sshd[9486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.72.126 Dec 17 20:45:18 markkoudstaal sshd[9486]: Failed password for invalid user webmaster from 193.112.72.126 port 42166 ssh2 |
2019-12-18 04:43:55 |
| 96.64.7.59 | attackbots | $f2bV_matches |
2019-12-18 04:28:21 |
| 49.88.112.73 | attackspambots | Dec 17 20:20:03 pi sshd\[10837\]: Failed password for root from 49.88.112.73 port 30976 ssh2 Dec 17 20:20:05 pi sshd\[10837\]: Failed password for root from 49.88.112.73 port 30976 ssh2 Dec 17 20:20:58 pi sshd\[10906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73 user=root Dec 17 20:21:00 pi sshd\[10906\]: Failed password for root from 49.88.112.73 port 46871 ssh2 Dec 17 20:21:02 pi sshd\[10906\]: Failed password for root from 49.88.112.73 port 46871 ssh2 ... |
2019-12-18 04:28:50 |
| 51.254.136.164 | attackspam | Dec 18 01:33:51 gw1 sshd[7299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.136.164 Dec 18 01:33:53 gw1 sshd[7299]: Failed password for invalid user SUPPORT from 51.254.136.164 port 36738 ssh2 ... |
2019-12-18 04:41:18 |
| 139.59.89.178 | attack | Automatic report - Banned IP Access |
2019-12-18 04:13:45 |
| 94.21.206.21 | attack | Automatic report - Port Scan Attack |
2019-12-18 04:07:53 |
| 202.72.243.198 | attack | Dec 17 20:54:52 OPSO sshd\[12215\]: Invalid user jaramillo from 202.72.243.198 port 44046 Dec 17 20:54:52 OPSO sshd\[12215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198 Dec 17 20:54:54 OPSO sshd\[12215\]: Failed password for invalid user jaramillo from 202.72.243.198 port 44046 ssh2 Dec 17 21:01:03 OPSO sshd\[14414\]: Invalid user god from 202.72.243.198 port 56676 Dec 17 21:01:03 OPSO sshd\[14414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.72.243.198 |
2019-12-18 04:18:37 |
| 196.218.130.66 | attackbots | firewall-block, port(s): 23/tcp |
2019-12-18 04:32:29 |
| 5.249.154.206 | attackspam | Dec 17 10:32:15 hpm sshd\[23621\]: Invalid user zoila from 5.249.154.206 Dec 17 10:32:15 hpm sshd\[23621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.154.206 Dec 17 10:32:17 hpm sshd\[23621\]: Failed password for invalid user zoila from 5.249.154.206 port 35786 ssh2 Dec 17 10:37:35 hpm sshd\[24151\]: Invalid user vollmann from 5.249.154.206 Dec 17 10:37:35 hpm sshd\[24151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.154.206 |
2019-12-18 04:39:00 |
| 92.118.37.88 | attack | Unauthorized connection attempt from IP address 92.118.37.88 on Port 3389(RDP) |
2019-12-18 04:14:17 |
| 149.56.23.154 | attackbotsspam | [Aegis] @ 2019-12-17 21:06:13 0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack |
2019-12-18 04:26:12 |
| 49.235.33.73 | attackbotsspam | 2019-12-17T07:20:46.826767-07:00 suse-nuc sshd[19143]: Invalid user lisa from 49.235.33.73 port 54208 ... |
2019-12-18 04:37:44 |