Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yongin-si

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 210.183.249.138


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 210.183.128.0 - 210.183.255.255 (/17)
기관명             : 주식회사 케이티
서비스명           : KORNET
주소               : 경기도 성남시 분당구 불정로 90
우편번호           : 13606
할당일자           : 19990220

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 210.183.249.128 - 210.183.249.191 (/26)
기관명             : (주) 케이티
네트워크 구분      : CUSTOMER
주소               : 경기도 성남시 분당구 불정로 90
우편번호           : 13606
할당내역 등록일    : 20250721

이름               : IP주소 담당자
전화번호           : +82-2-500-6630
전자우편           : kornet_ip@kt.com


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 210.183.128.0 - 210.183.255.255 (/17)
Organization Name  : Korea Telecom
Service Name       : KORNET
Address            : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code           : 13606
Registration Date  : 19990220

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 210.183.249.128 - 210.183.249.191 (/26)
Organization Name  : Korea Telecom
Network Type       : CUSTOMER
Address            : 90 Buljeongro Bundang-Gu Seongnam-Si Gyeonggi-Do
Zip Code           : 13606
Registration Date  : 20250721

Name               : IP Manager
Phone              : +82-2-500-6630
E-Mail             : kornet_ip@kt.com


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.183.249.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42648
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;210.183.249.138.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032302 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 12:03:04 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 138.249.183.210.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 138.249.183.210.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.176.204.91 attackbotsspam
Nov 27 10:46:39 ny01 sshd[9116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
Nov 27 10:46:41 ny01 sshd[9116]: Failed password for invalid user round from 220.176.204.91 port 9413 ssh2
Nov 27 10:51:24 ny01 sshd[9531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
2019-11-28 00:01:38
35.204.136.228 attack
11/27/2019-15:54:44.503919 35.204.136.228 Protocol: 6 ET POLICY Cleartext WordPress Login
2019-11-27 23:36:02
196.52.43.97 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-27 23:28:59
196.52.43.66 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 00:04:08
185.209.0.92 attack
11/27/2019-09:56:55.844378 185.209.0.92 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-27 23:30:56
196.52.43.65 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 00:06:26
196.52.43.91 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-27 23:45:05
129.211.24.187 attack
Nov 27 15:49:37 v22019058497090703 sshd[1992]: Failed password for root from 129.211.24.187 port 47707 ssh2
Nov 27 15:54:27 v22019058497090703 sshd[2541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.24.187
Nov 27 15:54:30 v22019058497090703 sshd[2541]: Failed password for invalid user fagelund from 129.211.24.187 port 33705 ssh2
...
2019-11-27 23:47:45
140.143.66.239 attackbotsspam
Nov 27 11:54:22 vps46666688 sshd[29182]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.66.239
Nov 27 11:54:24 vps46666688 sshd[29182]: Failed password for invalid user devil from 140.143.66.239 port 50424 ssh2
...
2019-11-27 23:55:10
1.1.244.12 attackspambots
UTC: 2019-11-26 port: 23/tcp
2019-11-27 23:29:29
216.218.206.69 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-27 23:43:29
171.100.220.233 attack
UTC: 2019-11-26 port: 23/tcp
2019-11-27 23:59:46
139.199.66.206 attackbots
Nov 27 15:54:55 vpn01 sshd[28034]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.66.206
Nov 27 15:54:57 vpn01 sshd[28034]: Failed password for invalid user sheilamaui from 139.199.66.206 port 39306 ssh2
...
2019-11-27 23:27:33
91.121.4.127 attack
$f2bV_matches
2019-11-27 23:23:50
99.160.178.81 attackbotsspam
UTC: 2019-11-26 port: 23/tcp
2019-11-27 23:51:20

Recently Reported IPs

2606:4700:10::6816:3838 38.174.115.167 38.174.115.117 21.203.8.184
134.209.22.96 116.56.161.14 54.72.126.190 35.203.210.206
167.190.119.253 157.230.110.125 10.212.36.80 144.116.13.5
128.210.195.67 201.214.146.153 2606:4700:10::6816:2901 2606:4700:10::6814:9012
2606:4700:10::ac43:1974 2606:4700:10::6816:1076 2606:4700:10::ac43:1612 2606:4700:10::6816:1634