City: Songpa-gu
Region: Seoul Special City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
query : 211.180.253.250
# KOREAN(UTF8)
조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.
[ 네트워크 할당 정보 ]
IPv4주소 : 211.180.0.0 - 211.181.255.255 (/15)
기관명 : (주)엘지유플러스
서비스명 : BORANET
주소 : 서울특별시 용산구 한강대로 32
우편번호 : 04389
할당일자 : 20030402
이름 : IP주소 담당자
전화번호 : +82-2-1-01
전자우편 : ipadm@lguplus.co.kr
조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------
[ 네트워크 할당 정보 ]
IPv4주소 : 211.180.253.128 - 211.180.253.255 (/25)
기관명 : LG유플러스
네트워크 구분 : CUSTOMER
주소 : 경기도 안양시 만안구 덕천로 37
우편번호 : 14088
할당내역 등록일 : 20140418
이름 : IP주소 담당자
전화번호 : +82-2-2089-7750
전자우편 : b8273338@user.bora.net
# ENGLISH
KRNIC is not an ISP but a National Internet Registry similar to APNIC.
[ Network Information ]
IPv4 Address : 211.180.0.0 - 211.181.255.255 (/15)
Organization Name : LG DACOM Corporation
Service Name : BORANET
Address : Seoul Yongsan-gu Hangang-daero 32
Zip Code : 04389
Registration Date : 20030402
Name : IP Manager
Phone : +82-2-1-01
E-Mail : ipadm@lguplus.co.kr
--------------------------------------------------------------------------------
More specific assignment information is as follows.
[ Network Information ]
IPv4 Address : 211.180.253.128 - 211.180.253.255 (/25)
Organization Name : LG Uplus
Network Type : CUSTOMER
Address : Gyeonggi-do Manan-gu, Anyang-si Deokcheon-ro 37
Zip Code : 14088
Registration Date : 20140418
Name : IP Manager
Phone : +82-2-2089-7750
E-Mail : b8273338@user.bora.net
- KISA/KRNIC WHOIS Service -
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.180.253.250
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;211.180.253.250. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 18:01:05 CST 2026
;; MSG SIZE rcvd: 108
Host 250.253.180.211.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 250.253.180.211.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 61.223.61.249 | attackspambots | 445/tcp [2019-06-21]1pkt |
2019-06-22 08:52:55 |
| 77.247.108.77 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-06-22 08:24:44 |
| 189.112.183.125 | attack | 445/tcp [2019-06-21]1pkt |
2019-06-22 08:31:08 |
| 79.107.139.67 | attack | Request: "GET / HTTP/1.1" |
2019-06-22 08:25:44 |
| 156.194.107.97 | attackbotsspam | Jun 21 21:41:21 dev sshd\[23736\]: Invalid user admin from 156.194.107.97 port 40597 Jun 21 21:41:21 dev sshd\[23736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.194.107.97 Jun 21 21:41:23 dev sshd\[23736\]: Failed password for invalid user admin from 156.194.107.97 port 40597 ssh2 |
2019-06-22 08:18:55 |
| 213.25.135.10 | attackbots | NAME : SIEC-SYLWESTER-NYLEC CIDR : 213.25.135.0/24 DDoS attack Poland - block certain countries :) IP: 213.25.135.10 Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN - data recovery https://help-dysk.pl |
2019-06-22 08:20:36 |
| 196.52.43.92 | attackspam | " " |
2019-06-22 09:04:45 |
| 170.246.206.4 | attackspambots | 21.06.2019 21:41:14 - Login Fail on hMailserver Detected by ELinOX-hMail-A2F |
2019-06-22 08:31:37 |
| 103.89.253.125 | attackspam | Request: "GET / HTTP/1.1" |
2019-06-22 08:18:34 |
| 195.142.115.111 | attackspam | Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" Bad Bot Bad Request: "GET / HTTP/1.1" Agent: "Mozilla/5.0 zgrab/0.x" |
2019-06-22 08:33:28 |
| 187.108.70.78 | attackspam | Request: "GET / HTTP/1.1" |
2019-06-22 09:05:13 |
| 185.234.219.239 | attackspam | Request: "GET /db/ HTTP/1.1" Request: "GET /admin/ HTTP/1.1" Request: "GET /pma/ HTTP/1.1" Request: "GET /myadmin/ HTTP/1.1" Request: "GET /db/ HTTP/1.1" Request: "GET /db/ HTTP/1.1" Request: "GET /admin/ HTTP/1.1" Request: "GET /admin/ HTTP/1.1" Request: "GET /pma/ HTTP/1.1" Request: "GET /pma/ HTTP/1.1" Request: "GET /myadmin/ HTTP/1.1" Request: "GET /myadmin/ HTTP/1.1" Request: "GET /phpmyadmin/ HTTP/1.1" Request: "GET /dbadmin/ HTTP/1.1" Request: "GET /dbadmin/ HTTP/1.1" Request: "GET /backup/ HTTP/1.1" Request: "GET /backup/ HTTP/1.1" Request: "GET /phpMyAdmin/ HTTP/1.1" Request: "GET /phpMyAdmin/ HTTP/1.1" |
2019-06-22 08:39:07 |
| 217.182.71.54 | attackbots | Jun 21 21:39:06 lnxded63 sshd[14287]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54 Jun 21 21:39:08 lnxded63 sshd[14287]: Failed password for invalid user openbravo from 217.182.71.54 port 45757 ssh2 Jun 21 21:41:25 lnxded63 sshd[14478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.71.54 |
2019-06-22 08:15:44 |
| 92.118.160.37 | attackbots | Portscan or hack attempt detected by psad/fwsnort |
2019-06-22 08:15:16 |
| 89.248.174.167 | attackspam | Port scan attempt detected by AWS-CCS, CTS, India |
2019-06-22 09:08:35 |