Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Songpa-gu

Region: Seoul Special City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
query : 211.180.253.250


# KOREAN(UTF8)

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소           : 211.180.0.0 - 211.181.255.255 (/15)
기관명             : (주)엘지유플러스
서비스명           : BORANET
주소               : 서울특별시 용산구 한강대로 32
우편번호           : 04389
할당일자           : 20030402

이름               : IP주소 담당자
전화번호           : +82-2-1-01
전자우편           : ipadm@lguplus.co.kr

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------


[ 네트워크 할당 정보 ]
IPv4주소           : 211.180.253.128 - 211.180.253.255 (/25)
기관명             : LG유플러스
네트워크 구분      : CUSTOMER
주소               : 경기도 안양시 만안구 덕천로 37
우편번호           : 14088
할당내역 등록일    : 20140418

이름               : IP주소 담당자
전화번호           : +82-2-2089-7750
전자우편           : b8273338@user.bora.net


# ENGLISH

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address       : 211.180.0.0 - 211.181.255.255 (/15)
Organization Name  : LG DACOM Corporation
Service Name       : BORANET
Address            : Seoul Yongsan-gu Hangang-daero 32
Zip Code           : 04389
Registration Date  : 20030402

Name               : IP Manager
Phone              : +82-2-1-01
E-Mail             : ipadm@lguplus.co.kr

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address       : 211.180.253.128 - 211.180.253.255 (/25)
Organization Name  : LG Uplus
Network Type       : CUSTOMER
Address            : Gyeonggi-do Manan-gu, Anyang-si Deokcheon-ro 37
Zip Code           : 14088
Registration Date  : 20140418

Name               : IP Manager
Phone              : +82-2-2089-7750
E-Mail             : b8273338@user.bora.net


- KISA/KRNIC WHOIS Service -
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.180.253.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.180.253.250.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 18:01:05 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 250.253.180.211.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 250.253.180.211.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
61.223.61.249 attackspambots
445/tcp
[2019-06-21]1pkt
2019-06-22 08:52:55
77.247.108.77 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 08:24:44
189.112.183.125 attack
445/tcp
[2019-06-21]1pkt
2019-06-22 08:31:08
79.107.139.67 attack
Request: "GET / HTTP/1.1"
2019-06-22 08:25:44
156.194.107.97 attackbotsspam
Jun 21 21:41:21 dev sshd\[23736\]: Invalid user admin from 156.194.107.97 port 40597
Jun 21 21:41:21 dev sshd\[23736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.194.107.97
Jun 21 21:41:23 dev sshd\[23736\]: Failed password for invalid user admin from 156.194.107.97 port 40597 ssh2
2019-06-22 08:18:55
213.25.135.10 attackbots
NAME : SIEC-SYLWESTER-NYLEC CIDR : 213.25.135.0/24 DDoS attack Poland - block certain countries :) IP: 213.25.135.10  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 08:20:36
196.52.43.92 attackspam
" "
2019-06-22 09:04:45
170.246.206.4 attackspambots
21.06.2019 21:41:14 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-06-22 08:31:37
103.89.253.125 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 08:18:34
195.142.115.111 attackspam
Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x"
2019-06-22 08:33:28
187.108.70.78 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 09:05:13
185.234.219.239 attackspam
Request: "GET /db/ HTTP/1.1" Request: "GET /admin/ HTTP/1.1" Request: "GET /pma/ HTTP/1.1" Request: "GET /myadmin/ HTTP/1.1" Request: "GET /db/ HTTP/1.1" Request: "GET /db/ HTTP/1.1" Request: "GET /admin/ HTTP/1.1" Request: "GET /admin/ HTTP/1.1" Request: "GET /pma/ HTTP/1.1" Request: "GET /pma/ HTTP/1.1" Request: "GET /myadmin/ HTTP/1.1" Request: "GET /myadmin/ HTTP/1.1" Request: "GET /phpmyadmin/ HTTP/1.1" Request: "GET /dbadmin/ HTTP/1.1" Request: "GET /dbadmin/ HTTP/1.1" Request: "GET /backup/ HTTP/1.1" Request: "GET /backup/ HTTP/1.1" Request: "GET /phpMyAdmin/ HTTP/1.1" Request: "GET /phpMyAdmin/ HTTP/1.1"
2019-06-22 08:39:07
217.182.71.54 attackbots
Jun 21 21:39:06 lnxded63 sshd[14287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54
Jun 21 21:39:08 lnxded63 sshd[14287]: Failed password for invalid user openbravo from 217.182.71.54 port 45757 ssh2
Jun 21 21:41:25 lnxded63 sshd[14478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54
2019-06-22 08:15:44
92.118.160.37 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-06-22 08:15:16
89.248.174.167 attackspam
Port scan attempt detected by AWS-CCS, CTS, India
2019-06-22 09:08:35

Recently Reported IPs

52.200.238.15 52.30.206.37 31.187.78.40 206.81.25.52
46.101.97.117 167.71.46.204 159.65.114.238 64.226.77.211
35.240.92.5 164.90.214.16 164.90.161.49 157.230.106.255
107.170.72.113 13.127.76.23 10.2.7.104 192.168.0.214
154.234.141.42 92.118.112.178 34.62.234.69 191.234.200.215