Go
221.160.100.14
is a
Hacker
100 %
Korea, Republic of
Report Abuse
1021attacks reported
795Brute-ForceSSH
78Brute-Force
54SSH
22HackingBrute-ForceSSH
14Web App Attack
13FTP Brute-Force
13HackingBrute-Force
9uncategorized
6Port Scan
2Port ScanSSH
...
1reputation reported
1uncategorized
1abuse reported
1Email Spam
1malware reported
1Malware
from 123 distinct reporters
and 12 distinct sources : BadIPs.com, Blocklist.de, danger.rulez.sk, darklist.de, Emerging Threats, FireHOL, blocklist.net.ua, NormShield.com, NoThink.org, Charles Haley, BBcan177, AbuseIPDB
221.160.100.14 was first signaled at 2019-03-04 03:47 and last record was at 2019-09-01 05:54.
IP

221.160.100.14

Organization
Daewonjeongi(ju)
Localisation
Korea, Republic of
Ch'ungch'ong-bukto, Eumseong-gun
NetRange : First & Last IP
221.160.100.0 - 221.160.100.31
Network CIDR
221.160.100.0/27

Cybercrime IP Feeds

Date UTC Category Sub Categories Source List Source Logs
2019-07-04 10:48 attacks Brute-ForceSSH AbuseIPDB Jul 4 21:48:37 MK-Soft-Root1 sshd\[5261\]: Invalid user scp from 221.160.100.14 port 60258 Jul 4 21:48:37 MK-Soft-Root1 sshd\[5261\]: pam_unix\(sshd:a
2019-07-04 10:23 attacks Brute-ForceSSH AbuseIPDB Jul 4 21:23:23 dev sshd\[18509\]: Invalid user weiguo from 221.160.100.14 port 41952 Jul 4 21:23:23 dev sshd\[18509\]: pam_unix\(sshd:auth\): authenti
2019-07-04 09:11 attacks Brute-ForceSSH AbuseIPDB Jul 4 10:35:22 cac1d2 sshd\[4295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 user=roo
2019-07-04 06:31 attacks Brute-ForceSSH AbuseIPDB Jul 4 17:31:29 core01 sshd\[31574\]: Invalid user qhsupport from 221.160.100.14 port 36090 Jul 4 17:31:29 core01 sshd\[31574\]: pam_unix\(sshd:auth\):
2019-07-04 06:05 attacks Brute-ForceSSH AbuseIPDB 2019-07-04T17:05:02.951738scmdmz1 sshd\[11235\]: Invalid user comercial from 221.160.100.14 port 48418 2019-07-04T17:05:02.955678scmdmz1 sshd\[11235\]
2019-07-04 05:06 attacks Brute-ForceSSH AbuseIPDB Jul 4 16:06:50 bouncer sshd\[8380\]: Invalid user craig from 221.160.100.14 port 50010 Jul 4 16:06:50 bouncer sshd\[8380\]: pam_unix\(sshd:auth\): aut
2019-07-04 05:06 attacks Brute-ForceSSH AbuseIPDB Jul 4 16:06:26 vmd17057 sshd\[30692\]: Invalid user mythic from 221.160.100.14 port 43222 Jul 4 16:06:26 vmd17057 sshd\[30692\]: pam_unix\(sshd:auth\)
2019-07-04 04:30 attacks Brute-ForceSSH AbuseIPDB 2019-07-04T13:30:53.568196abusebot-6.cloudsearch.cf sshd\[6037\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser=
2019-07-04 04:02 attacks HackingBrute-ForceSSH AbuseIPDB Jul 4 14:51:24 XXX sshd[41822]: Invalid user rcribb from 221.160.100.14 port 34754
2019-07-04 02:55 attacks Brute-ForceSSH AbuseIPDB Jul 4 11:55:32 MK-Soft-VM4 sshd\[25031\]: Invalid user pete from 221.160.100.14 port 38104 Jul 4 11:55:32 MK-Soft-VM4 sshd\[25031\]: pam_unix\(sshd:au
2019-07-04 01:12 attacks Brute-ForceEmail SpamExploited Host AbuseIPDB " "
2019-07-04 00:41 attacks Brute-ForceSSH AbuseIPDB Jul 4 11:40:21 vpn01 sshd\[15706\]: Invalid user college from 221.160.100.14 Jul 4 11:40:21 vpn01 sshd\[15706\]: pam_unix\(sshd:auth\): authentication
2019-07-03 23:28 attacks Brute-ForceSSH AbuseIPDB Triggered by Fail2Ban
2019-07-03 22:51 attacks Brute-ForceSSH AbuseIPDB Jul 4 09:51:07 MK-Soft-Root1 sshd\[29862\]: Invalid user test from 221.160.100.14 port 59808 Jul 4 09:51:07 MK-Soft-Root1 sshd\[29862\]: pam_unix\(ssh
2019-07-03 22:48 attacks SSH AbuseIPDB 2019-07-04T14:48:02.178884enmeeting.mahidol.ac.th sshd\[12332\]: User root from 221.160.100.14 not allowed because not listed in AllowUsers 2019-07-04
2019-07-03 22:17 attacks Brute-ForceSSH AbuseIPDB Jul 4 09:17:34 pornomens sshd\[19388\]: Invalid user dead from 221.160.100.14 port 55610 Jul 4 09:17:34 pornomens sshd\[19388\]: pam_unix\(sshd:auth\)
2019-07-03 22:12 attacks Brute-ForceSSH AbuseIPDB 2019-07-04T07:12:31.456625abusebot.cloudsearch.cf sshd\[7934\]: Invalid user web3 from 221.160.100.14 port 44788
2019-07-03 21:57 attacks Brute-Force AbuseIPDB Jul 4 06:57:20 marvibiene sshd[50374]: Invalid user named from 221.160.100.14 port 52640 Jul 4 06:57:20 marvibiene sshd[50374]: pam_unix(sshd:auth): a
2019-07-03 20:09 attacks Brute-ForceSSH AbuseIPDB Jul 4 07:09:53 * sshd[809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 Jul 4 07:09:55 * ss
2019-07-03 19:21 attacks Brute-ForceSSH AbuseIPDB  
2019-07-03 17:20 attacks Brute-ForceSSH AbuseIPDB Jul 4 04:20:36 tuxlinux sshd[13422]: Invalid user bernard from 221.160.100.14 port 45622 Jul 4 04:20:36 tuxlinux sshd[13422]: pam_unix(sshd:auth): aut
2019-07-03 16:58 attacks Brute-ForceSSH AbuseIPDB Jul 4 01:58:04 MK-Soft-VM3 sshd\[10055\]: Invalid user craig from 221.160.100.14 port 55874 Jul 4 01:58:04 MK-Soft-VM3 sshd\[10055\]: pam_unix\(sshd:a
2019-07-03 16:45 attacks Brute-ForceSSH AbuseIPDB  
2019-07-03 16:08 attacks Brute-ForceSSH AbuseIPDB  
2019-07-03 16:07 attacks Web App Attack AbuseIPDB Automatic report - Web App Attack
2019-07-03 15:46 attacks SSH AbuseIPDB Jul 4 02:46:03 [munged] sshd[3395]: Invalid user brood from 221.160.100.14 port 42200 Jul 4 02:46:03 [munged] sshd[3395]: pam_unix(sshd:auth): authent
2019-07-03 15:38 attacks Brute-ForceSSH AbuseIPDB Jul 4 02:37:58 nginx sshd[40042]: Connection from 221.160.100.14 port 54948 on 10.23.102.80 port 22 Jul 4 02:38:01 nginx sshd[40042]: Invalid user lam
2019-07-03 14:39 attacks Brute-ForceSSH AbuseIPDB SSH Bruteforce Attack
2019-07-03 14:22 attacks Brute-ForceSSH AbuseIPDB 2019-07-04T01:22:40.692394scmdmz1 sshd\[22370\]: Invalid user ray from 221.160.100.14 port 42066 2019-07-04T01:22:40.696110scmdmz1 sshd\[22370\]: pam_
2019-07-03 13:35 attacks Brute-ForceSSH AbuseIPDB Jul 4 00:35:17 host sshd\[12376\]: Invalid user vid from 221.160.100.14 port 55328 Jul 4 00:35:17 host sshd\[12376\]: pam_unix\(sshd:auth\): authentic
2019-07-03 13:17 attacks Brute-ForceSSH AbuseIPDB Jul 4 00:17:18 ns3367391 sshd\[15342\]: Invalid user oracle from 221.160.100.14 port 37974 Jul 4 00:17:18 ns3367391 sshd\[15342\]: pam_unix\(sshd:auth
2019-07-03 12:34 attacks Brute-ForceSSH AbuseIPDB Jul 4 00:34:21 srv-4 sshd\[1530\]: Invalid user victor from 221.160.100.14 Jul 4 00:34:21 srv-4 sshd\[1530\]: pam_unix\(sshd:auth\): authentication fa
2019-07-03 11:05 attacks Brute-ForceSSH AbuseIPDB Jul 3 06:02:49 *** sshd[17263]: Failed password for invalid user applmgr from 221.160.100.14 port 57648 ssh2
2019-07-03 10:44 attacks FTP Brute-Force AbuseIPDB FTP Brute-Force reported by Fail2Ban
2019-07-03 10:37 attacks Brute-ForceSSH AbuseIPDB Jul 3 21:37:01 [host] sshd[5563]: Invalid user alva from 221.160.100.14 Jul 3 21:37:01 [host] sshd[5563]: pam_unix(sshd:auth): authentication failure;
2019-07-03 10:27 attacks Brute-ForceSSH AbuseIPDB Jul 3 21:27:48 ncomp sshd[2373]: Invalid user george from 221.160.100.14 Jul 3 21:27:48 ncomp sshd[2373]: pam_unix(sshd:auth): authentication failure;
2019-07-03 06:05 attacks Brute-ForceSSH AbuseIPDB Jul 3 17:05:18 mail sshd\[11037\]: Invalid user sokrayt from 221.160.100.14 Jul 3 17:05:18 mail sshd\[11037\]: pam_unix\(sshd:auth\): authentication f
2019-07-03 06:00 attacks HackingBrute-ForceSSH AbuseIPDB Jul 3 14:12:25 XXX sshd[15181]: Invalid user web1 from 221.160.100.14 port 53864
2019-07-03 05:15 attacks Brute-ForceSSH AbuseIPDB 2019-07-03T14:15:16.074951abusebot-7.cloudsearch.cf sshd\[5170\]: Invalid user web1 from 221.160.100.14 port 50278
2019-07-03 04:05 attacks Brute-ForceSSH AbuseIPDB Jul 3 15:05:12 dev sshd\[21218\]: Invalid user scaner from 221.160.100.14 port 41058 Jul 3 15:05:12 dev sshd\[21218\]: pam_unix\(sshd:auth\): authenti
2019-07-03 03:58 attacks Brute-ForceSSH AbuseIPDB Jul 3 14:58:56 core01 sshd\[7362\]: Invalid user specialk from 221.160.100.14 port 44818 Jul 3 14:58:56 core01 sshd\[7362\]: pam_unix\(sshd:auth\): au
2019-07-03 03:02 attacks Brute-ForceSSH AbuseIPDB Jul 3 14:02:24 core01 sshd\[21856\]: Invalid user kim from 221.160.100.14 port 38282 Jul 3 14:02:24 core01 sshd\[21856\]: pam_unix\(sshd:auth\): authe
2019-07-03 02:22 attacks Brute-ForceSSH AbuseIPDB Jul 3 11:22:03 MK-Soft-VM7 sshd\[14724\]: Invalid user lpd from 221.160.100.14 port 39040 Jul 3 11:22:03 MK-Soft-VM7 sshd\[14724\]: pam_unix\(sshd:aut
2019-07-03 02:00 attacks Brute-ForceSSH AbuseIPDB Jul 3 13:00:17 rpi sshd[24823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14 Jul 3 13:00:19
2019-07-03 01:46 attacks Brute-ForceSSH AbuseIPDB Jul 3 12:46:03 srv206 sshd[28099]: Invalid user mathandazo from 221.160.100.14 Jul 3 12:46:03 srv206 sshd[28099]: pam_unix(sshd:auth): authentication
2019-07-03 01:24 attacks Hacking AbuseIPDB Jul 3 11:49:25 h2177944 sshd\[7418\]: Invalid user fps from 221.160.100.14 port 48292 Jul 3 11:49:25 h2177944 sshd\[7418\]: pam_unix\(sshd:auth\): aut
2019-07-03 00:38 attacks Brute-ForceSSH AbuseIPDB 2019-07-03T09:38:17.481477abusebot-3.cloudsearch.cf sshd\[4369\]: Invalid user virginia from 221.160.100.14 port 38944
2019-07-02 23:10 attacks Brute-ForceSSH AbuseIPDB Jul 3 11:10:33 server01 sshd\[3641\]: Invalid user kkkkk from 221.160.100.14 Jul 3 11:10:33 server01 sshd\[3641\]: pam_unix\(sshd:auth\): authenticati
2019-07-02 21:44 attacks SSH AbuseIPDB  
2019-07-02 19:05 attacks Brute-ForceSSH AbuseIPDB Jul 3 06:05:43 jane sshd\[29441\]: Invalid user lounette from 221.160.100.14 port 34588 Jul 3 06:05:43 jane sshd\[29441\]: pam_unix\(sshd:auth\): auth
2019-03-04 03:47 attacks Port ScanBrute-ForceSSH AbuseIPDB $f2bV_matches
2019-03-04 04:09 attacks Brute-ForceSSH AbuseIPDB 2019-03-04T15:07:05.420003stark.klein-stark.info sshd\[7717\]: Invalid user postgres from 221.160.100.14 port 35828 2019-03-04T15:07:05.425636stark.kl
2019-03-04 05:45 attacks Brute-ForceSSH AbuseIPDB Mar 04 09:32:42 askasleikir sshd[2832]: Failed password for invalid user postgres from 221.160.100.14 port 47150 ssh2
2019-03-04 06:27 attacks SSH AbuseIPDB Mar 4 16:27:56 thevastnessof sshd[13662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.160.100.14
2019-03-04 07:31 attacks Brute-ForceSSH AbuseIPDB Mar 4 18:31:23 jane sshd\[20474\]: Invalid user postgres from 221.160.100.14 port 33918 Mar 4 18:31:23 jane sshd\[20474\]: pam_unix\(sshd:auth\): auth
2019-03-04 08:25 attacks HackingBrute-ForceSSH AbuseIPDB SSH authentication failure x 6 reported by Fail2Ban
2019-03-04 09:11 attacks Brute-ForceSSH AbuseIPDB Mar 4 20:11:16 HiS01 sshd\[18196\]: Invalid user postgres from 221.160.100.14 Mar 4 20:11:16 HiS01 sshd\[18196\]: pam_unix\(sshd:auth\): authenticatio
2019-03-04 09:39 attacks Brute-ForceSSH AbuseIPDB $f2bV_matches
2019-03-04 10:07 attacks Brute-ForceSSH AbuseIPDB ssh failed login
2019-03-04 10:43 attacks FTP Brute-ForceHacking AbuseIPDB Mar 4 15:55:30 shenron sshd[21576]: Invalid user postgres from 221.160.100.14 Mar 4 15:55:30 shenron sshd[21576]: pam_unix(sshd:auth): authentication
2019-03-29 18:19 attacks bi_any_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_sshd_0_1d BadIPs.com  
2019-03-29 18:20 attacks SSH bi_ssh_0_1d BadIPs.com  
2019-03-29 18:21 attacks blocklist_de Blocklist.de  
2019-03-29 18:21 attacks SSH blocklist_de_ssh Blocklist.de  
2019-03-29 18:22 attacks Brute-Force bruteforceblocker danger.rulez.sk  
2019-03-29 18:23 attacks darklist_de darklist.de  
2019-03-29 18:24 attacks et_compromised Emerging Threats  
2019-03-29 18:27 attacks firehol_level2 FireHOL  
2019-03-29 18:27 attacks firehol_level3 FireHOL  
2019-05-28 23:18 reputation bds_atif  
2019-05-28 23:20 abuse Email Spam blocklist_net_ua blocklist.net.ua  
2019-05-28 23:31 attacks firehol_level4 FireHOL  
2019-05-30 09:29 attacks Bad Web Bot bi_badbots_0_1d BadIPs.com  
2019-05-30 09:29 attacks Brute-Force bi_bruteforce_0_1d BadIPs.com  
2019-05-30 09:43 attacks Brute-Force normshield_all_bruteforce NormShield.com  
2019-05-30 09:43 attacks Brute-Force normshield_high_bruteforce NormShield.com  
2019-06-03 23:00 attacks SSH nt_ssh_7d NoThink.org  
2019-06-08 17:28 attacks bi_default_0_1d BadIPs.com  
2019-06-08 17:29 attacks bi_unknown_0_1d BadIPs.com  
2019-08-29 09:00 attacks SSH haley_ssh Charles Haley  
2019-09-01 05:52 attacks Brute-ForceFTP Brute-Force bi_ftp_0_1d BadIPs.com  
2019-09-01 05:54 attacks Brute-ForceFTP Brute-Force bi_proftpd_0_1d BadIPs.com  
2019-03-29 18:18 malware Malware bbcan177_ms3 BBcan177  
only last 50 and first 10 AbuseIPDB logs are shown

Threats Categories :

abuse
IPs used to spam forum, boards, blogs or smtp servers, automated web scripts or scrappers (bad bots)
anonymizer
Onion Router IP addresses. TOR network IPs, TOR exit points, socks or ssl proxy.
attacks
bruteforce ssh/ftp/system account, IPs that have been detected by fail2ban, ports scan, vulnerabilities scan, DDoS.
malware
Addresses that have been identified distributing malware, form-grabber and stealer, Viruses, Worms, Trojans, Ransomware, Adware, Spyware

Whois

query : 221.160.100.14

조회하신 IPv4주소는 한국인터넷진흥원으로부터 아래의 관리대행자에게 할당되었으며, 할당 정보는 다음과 같습니다.

[ 네트워크 할당 정보 ]
IPv4주소 : 221.144.0.0 - 221.168.255.255 (/12+/13+/16)
기관명 : 주식회사 케이티
서비스명 : KORNET
주소 : 경기도 성남시 분당구 불정로 90
우편번호 : 13606
할당일자 : 20030418

이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com

조회하신 IPv4주소는 위의 관리대행자로부터 아래의 사용자에게 할당되었으며, 할당 정보는 다음과 같습니다.
--------------------------------------------------------------------------------

[ 네트워크 할당 정보 ]
IPv4주소 : 221.160.100.0 - 221.160.100.31 (/27)
기관명 : 대원전기(주)
네트워크 구분 : CUSTOMER
주소 : 충청북도 증평군 증평읍
우편번호 : 368-906
할당내역 등록일 : 20150317

이름 : IP주소 담당자
전화번호 : +82-2-500-6630
전자우편 : kornet_ip@kt.com

KRNIC is not an ISP but a National Internet Registry similar to APNIC.

[ Network Information ]
IPv4 Address : 221.144.0.0 - 221.168.255.255 (/12+/13+/16)
Organization Name : Korea Telecom
Service Name : KORNET
Address : Gyeonggi-do Bundang-gu, Seongnam-si Buljeong-ro 90
Zip Code : 13606
Registration Date : 20030418

Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com

--------------------------------------------------------------------------------

More specific assignment information is as follows.

[ Network Information ]
IPv4 Address : 221.160.100.0 - 221.160.100.31 (/27)
Organization Name : Daewonjeongi(ju)
Network Type : CUSTOMER
Address : Jeungpyeong-Eup Jeungpyeong-Gun Chungcheongbuk-Do
Zip Code : 368-906
Registration Date : 20150317

Name : IP Manager
Phone : +82-2-500-6630
E-Mail : kornet_ip@kt.com

'19.11월 KISA의 인터넷주소센터 나주 이전으로 WHOIS 검색 서비스의 IP주소가 변경될 예정입니다. 동 서비스 이용시 도메인(whois.kisa.or.kr)을 이용하여 접속하시기 바랍니다.

- KISA/KRNIC WHOIS Service -
most specific ip range is highlighted
Updated : 2019-08-31