Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '49.56.0.0 - 49.63.255.255'

% Abuse contact for '49.56.0.0 - 49.63.255.255' is 'irt@nic.or.kr'

inetnum:        49.56.0.0 - 49.63.255.255
netname:        KORNET
descr:          Korea Telecom
admin-c:        IM667-AP
tech-c:         IM667-AP
country:        KR
status:         ALLOCATED PORTABLE
mnt-by:         MNT-KRNIC-AP
mnt-irt:        IRT-KRNIC-KR
last-modified:  2017-02-03T02:21:54Z
source:         APNIC

irt:            IRT-KRNIC-KR
address:        9, Jinheung-gil, Naju-si, Jeollanam-do
e-mail:         irt@nic.or.kr
abuse-mailbox:  irt@nic.or.kr
admin-c:        IM574-AP
tech-c:         IM574-AP
auth:           # Filtered
remarks:        irt@nic.or.kr was validated on 2020-04-09
mnt-by:         MNT-KRNIC-AP
last-modified:  2025-09-04T01:00:01Z
source:         APNIC

person:         IP Manager
address:        Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
country:        KR
phone:          +82-2-500-6630
e-mail:         kornet_ip@kt.com
nic-hdl:        IM667-AP
mnt-by:         MNT-KRNIC-AP
last-modified:  2017-03-28T06:37:04Z
source:         APNIC

% Information related to '49.56.0.0 - 49.63.255.255'

inetnum:        49.56.0.0 - 49.63.255.255
netname:        KORNET-KR
descr:          Korea Telecom
country:        KR
admin-c:        IA9-KR
tech-c:         IM9-KR
status:         ALLOCATED PORTABLE
mnt-by:         MNT-KRNIC-AP
mnt-irt:        IRT-KRNIC-KR
changed:        hostmaster@nic.or.kr 20240912
remarks:        This information has been partially mirrored by APNIC from
remarks:        KRNIC. To obtain more specific information, please use the
remarks:        KRNIC whois server at whois.kisa.or.kr.
source:         KRNIC

person:         IP Manager
address:        Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
address:        KT Head Office
country:        KR
phone:          +82-2-500-6630
e-mail:         kornet_ip@kt.com
nic-hdl:        IA9-KR
mnt-by:         MNT-KRNIC-AP
changed:        hostmaster@nic.or.kr 20240912
remarks:        This information has been partially mirrored by APNIC from
remarks:        KRNIC. To obtain more specific information, please use the
remarks:        KRNIC whois server at whois.kisa.or.kr.
source:         KRNIC

person:         IP Manager
address:        Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
address:        KT Head Office
country:        KR
phone:          +82-2-500-6630
e-mail:         kornet_ip@kt.com
nic-hdl:        IM9-KR
mnt-by:         MNT-KRNIC-AP
changed:        hostmaster@nic.or.kr 20240912
remarks:        This information has been partially mirrored by APNIC from
remarks:        KRNIC. To obtain more specific information, please use the
remarks:        KRNIC whois server at whois.kisa.or.kr.
source:         KRNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.60.118.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16197
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.60.118.205.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041001 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 11 03:08:14 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 205.118.60.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 205.118.60.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.179.234.98 attack
Dec 24 17:07:41 lnxmysql61 sshd[10333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.234.98
Dec 24 17:07:41 lnxmysql61 sshd[10333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.234.98
2019-12-25 00:35:01
45.136.108.119 attackspam
Dec 24 16:34:55 debian-2gb-nbg1-2 kernel: \[854435.095665\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.119 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=23800 PROTO=TCP SPT=44131 DPT=438 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-25 01:03:23
96.5.232.111 attackspam
Dec 24 15:02:55 XXX sshd[25605]: Invalid user staff from 96.5.232.111 port 48164
2019-12-25 00:32:28
192.228.100.238 attack
Unauthorized connection attempt detected from IP address 192.228.100.238 to port 22
2019-12-25 01:13:07
92.118.160.53 attack
8082/tcp 2323/tcp 8888/tcp...
[2019-10-24/12-24]117pkt,63pt.(tcp),8pt.(udp)
2019-12-25 00:51:20
159.203.201.143 attackbots
1414/tcp 8443/tcp 2083/tcp...
[2019-10-25/12-24]64pkt,56pt.(tcp),2pt.(udp)
2019-12-25 00:49:15
59.80.31.23 attackbots
Unauthorized connection attempt detected from IP address 59.80.31.23 to port 600
2019-12-25 00:36:00
77.242.16.68 attackbotsspam
445/tcp 1433/tcp...
[2019-10-28/12-24]10pkt,2pt.(tcp)
2019-12-25 00:34:20
159.203.201.250 attack
6379/tcp 5631/tcp 29330/tcp...
[2019-10-25/12-24]51pkt,46pt.(tcp),2pt.(udp)
2019-12-25 00:45:20
61.102.209.14 attackbots
1433/tcp 1433/tcp 1433/tcp...
[2019-12-07/24]5pkt,1pt.(tcp)
2019-12-25 01:12:50
222.186.175.167 attackspam
Dec 24 17:50:28 localhost sshd[27144]: Failed none for root from 222.186.175.167 port 43174 ssh2
Dec 24 17:50:30 localhost sshd[27144]: Failed password for root from 222.186.175.167 port 43174 ssh2
Dec 24 17:50:33 localhost sshd[27144]: Failed password for root from 222.186.175.167 port 43174 ssh2
2019-12-25 00:52:03
23.225.183.234 attack
404 NOT FOUND
2019-12-25 00:48:01
118.243.20.203 attackbotsspam
Dec 24 17:57:23 lnxmysql61 sshd[16253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.243.20.203
2019-12-25 01:11:29
192.162.67.154 attack
Dec 24 16:34:55 jane sshd[4690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.162.67.154 
Dec 24 16:34:57 jane sshd[4690]: Failed password for invalid user admin from 192.162.67.154 port 34418 ssh2
...
2019-12-25 01:00:29
128.199.44.102 attackspam
2019-12-24T16:32:43.238302vps751288.ovh.net sshd\[19634\]: Invalid user mysql from 128.199.44.102 port 37176
2019-12-24T16:32:43.250210vps751288.ovh.net sshd\[19634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.44.102
2019-12-24T16:32:45.250893vps751288.ovh.net sshd\[19634\]: Failed password for invalid user mysql from 128.199.44.102 port 37176 ssh2
2019-12-24T16:34:40.996305vps751288.ovh.net sshd\[19638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.44.102  user=root
2019-12-24T16:34:42.726068vps751288.ovh.net sshd\[19638\]: Failed password for root from 128.199.44.102 port 46579 ssh2
2019-12-25 01:12:19

Recently Reported IPs

186.55.7.178 45.230.74.42 2606:4700:10::6814:9922 2606:4700:10::6814:6834
2606:4700:10::ac43:2586 2606:4700:10::6816:556 2606:4700:10::6814:8812 2606:4700:10::6814:4458
164.155.74.139 197.36.59.203 199.7.230.241 91.230.168.143
195.184.76.197 161.102.40.32 152.108.255.10 120.171.54.136
110.77.187.63 2606:4700:10::6814:7456 2606:4700:10::6816:57 2606:4700:10::6816:1876