City: Yongsan-gu
Region: Seoul Special City
Country: South Korea
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '61.32.0.0 - 61.39.255.255'
% Abuse contact for '61.32.0.0 - 61.39.255.255' is 'irt@nic.or.kr'
inetnum: 61.32.0.0 - 61.39.255.255
netname: BORANET
descr: LG DACOM Corporation
admin-c: IM646-AP
tech-c: IM646-AP
country: KR
status: ALLOCATED PORTABLE
mnt-by: MNT-KRNIC-AP
mnt-irt: IRT-KRNIC-KR
last-modified: 2017-02-03T00:55:02Z
source: APNIC
irt: IRT-KRNIC-KR
address: 9, Jinheung-gil, Naju-si, Jeollanam-do
e-mail: irt@nic.or.kr
abuse-mailbox: irt@nic.or.kr
admin-c: IM574-AP
tech-c: IM574-AP
auth: # Filtered
remarks: irt@nic.or.kr was validated on 2020-04-09
mnt-by: MNT-KRNIC-AP
last-modified: 2025-09-04T01:00:01Z
source: APNIC
person: IP Manager
address: Seoul Yongsan-gu Hangang-daero 32
country: KR
phone: +82-2-1-01
e-mail: ipadm@lguplus.co.kr
nic-hdl: IM646-AP
mnt-by: MNT-KRNIC-AP
last-modified: 2021-10-05T05:20:03Z
source: APNIC
% Information related to '61.32.0.0 - 61.39.255.255'
inetnum: 61.32.0.0 - 61.39.255.255
netname: BORANET-KR
descr: LG DACOM Corporation
country: KR
admin-c: IA5-KR
tech-c: IA5-KR
status: ALLOCATED PORTABLE
mnt-by: MNT-KRNIC-AP
mnt-irt: IRT-KRNIC-KR
changed: hostmaster@nic.or.kr 20240912
remarks: This information has been partially mirrored by APNIC from
remarks: KRNIC. To obtain more specific information, please use the
remarks: KRNIC whois server at whois.kisa.or.kr.
source: KRNIC
person: IP Manager
address: Seoul Yongsan-gu Hangang-daero 32
address: LG UPLUS
country: KR
phone: +82-2-1-01
e-mail: ipadm@lguplus.co.kr
nic-hdl: IA5-KR
mnt-by: MNT-KRNIC-AP
changed: hostmaster@nic.or.kr 20240912
remarks: This information has been partially mirrored by APNIC from
remarks: KRNIC. To obtain more specific information, please use the
remarks: KRNIC whois server at whois.kisa.or.kr.
source: KRNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 61.33.62.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;61.33.62.231. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 04:30:09 CST 2026
;; MSG SIZE rcvd: 105
Host 231.62.33.61.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 231.62.33.61.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.128.217.168 | attackbots | Failed password for invalid user jrx from 178.128.217.168 port 54012 ssh2 |
2020-05-24 18:22:31 |
| 116.112.64.98 | attack | 20 attempts against mh-ssh on echoip |
2020-05-24 18:32:25 |
| 209.222.101.41 | attackspam | 05/24/2020-06:20:10.673128 209.222.101.41 Protocol: 6 ET SCAN NMAP -sS window 1024 |
2020-05-24 18:40:07 |
| 14.160.24.32 | attackbots | 2020-05-24T07:44:47.804567ollin.zadara.org sshd[5413]: Invalid user enp from 14.160.24.32 port 48872 2020-05-24T07:44:49.227302ollin.zadara.org sshd[5413]: Failed password for invalid user enp from 14.160.24.32 port 48872 ssh2 ... |
2020-05-24 18:15:32 |
| 45.254.26.19 | attack | 2020-05-23 UTC: (9x) - 1234(2x),admin,guest,root(3x),super,telnet |
2020-05-24 18:17:28 |
| 85.209.0.102 | attack |
|
2020-05-24 18:27:10 |
| 49.235.46.16 | attackbotsspam | Repeated brute force against a port |
2020-05-24 18:22:14 |
| 60.191.141.80 | attack | May 21 08:13:08 cumulus sshd[8266]: Invalid user wwc from 60.191.141.80 port 40092 May 21 08:13:08 cumulus sshd[8266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.191.141.80 May 21 08:13:10 cumulus sshd[8266]: Failed password for invalid user wwc from 60.191.141.80 port 40092 ssh2 May 21 08:13:12 cumulus sshd[8266]: Received disconnect from 60.191.141.80 port 40092:11: Bye Bye [preauth] May 21 08:13:12 cumulus sshd[8266]: Disconnected from 60.191.141.80 port 40092 [preauth] May 21 08:21:00 cumulus sshd[8845]: Invalid user wwc from 60.191.141.80 port 45146 May 21 08:21:00 cumulus sshd[8845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.191.141.80 May 21 08:21:02 cumulus sshd[8845]: Failed password for invalid user wwc from 60.191.141.80 port 45146 ssh2 May 21 08:21:02 cumulus sshd[8845]: Received disconnect from 60.191.141.80 port 45146:11: Bye Bye [preauth] May 21 08:21:02 cumul........ ------------------------------- |
2020-05-24 18:08:37 |
| 121.227.152.235 | attackbots | May 24 11:15:51 ovpn sshd\[31420\]: Invalid user ynw from 121.227.152.235 May 24 11:15:51 ovpn sshd\[31420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.152.235 May 24 11:15:53 ovpn sshd\[31420\]: Failed password for invalid user ynw from 121.227.152.235 port 31012 ssh2 May 24 11:31:23 ovpn sshd\[2749\]: Invalid user cs from 121.227.152.235 May 24 11:31:23 ovpn sshd\[2749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.227.152.235 |
2020-05-24 18:36:16 |
| 37.49.225.166 | attack |
|
2020-05-24 18:43:34 |
| 103.207.39.104 | attack | May 24 12:17:56 srv01 postfix/smtpd\[2828\]: warning: unknown\[103.207.39.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 24 12:17:56 srv01 postfix/smtpd\[768\]: warning: unknown\[103.207.39.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 24 12:17:57 srv01 postfix/smtpd\[2143\]: warning: unknown\[103.207.39.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 24 12:17:59 srv01 postfix/smtpd\[2828\]: warning: unknown\[103.207.39.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 May 24 12:17:59 srv01 postfix/smtpd\[768\]: warning: unknown\[103.207.39.104\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6 ... |
2020-05-24 18:24:55 |
| 109.195.198.27 | attackbotsspam | Invalid user nxf from 109.195.198.27 port 37838 |
2020-05-24 18:04:09 |
| 45.142.195.15 | attack | Rude login attack (748 tries in 1d) |
2020-05-24 18:31:53 |
| 54.38.241.162 | attackbots | May 24 08:51:42 pkdns2 sshd\[46897\]: Invalid user rvi from 54.38.241.162May 24 08:51:44 pkdns2 sshd\[46897\]: Failed password for invalid user rvi from 54.38.241.162 port 40200 ssh2May 24 08:55:06 pkdns2 sshd\[47046\]: Invalid user evg from 54.38.241.162May 24 08:55:08 pkdns2 sshd\[47046\]: Failed password for invalid user evg from 54.38.241.162 port 51058 ssh2May 24 08:58:45 pkdns2 sshd\[47176\]: Invalid user deo from 54.38.241.162May 24 08:58:47 pkdns2 sshd\[47176\]: Failed password for invalid user deo from 54.38.241.162 port 33698 ssh2 ... |
2020-05-24 18:39:52 |
| 112.200.60.124 | attackbots | 1590292009 - 05/24/2020 05:46:49 Host: 112.200.60.124/112.200.60.124 Port: 445 TCP Blocked |
2020-05-24 18:26:48 |