Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.105.69.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9047
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.105.69.12.			IN	A

;; AUTHORITY SECTION:
.			564	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:01:31 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 12.69.105.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.69.105.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.70.149.68 attack
Sep 15 14:42:22 statusweb1.srvfarm.net postfix/smtps/smtpd[17730]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 15 14:42:27 statusweb1.srvfarm.net postfix/smtps/smtpd[17730]: lost connection after AUTH from unknown[212.70.149.68]
Sep 15 14:44:19 statusweb1.srvfarm.net postfix/smtps/smtpd[17730]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 15 14:44:25 statusweb1.srvfarm.net postfix/smtps/smtpd[17730]: lost connection after AUTH from unknown[212.70.149.68]
Sep 15 14:46:16 statusweb1.srvfarm.net postfix/smtps/smtpd[17730]: warning: unknown[212.70.149.68]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-09-15 21:05:22
120.31.204.22 attackspambots
Repeated RDP login failures. Last user: Marketing
2020-09-15 21:14:09
46.46.85.97 attackspam
RDP Bruteforce
2020-09-15 21:21:18
45.142.120.89 attackbots
Sep 15 14:50:35 mail postfix/smtpd\[5140\]: warning: unknown\[45.142.120.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 15 14:50:42 mail postfix/smtpd\[5594\]: warning: unknown\[45.142.120.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 15 15:20:51 mail postfix/smtpd\[6602\]: warning: unknown\[45.142.120.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 15 15:21:01 mail postfix/smtpd\[5936\]: warning: unknown\[45.142.120.89\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-15 21:29:45
152.136.116.24 attackspambots
RDP Bruteforce
2020-09-15 21:25:53
124.137.205.59 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-09-15 21:12:04
12.165.80.213 attackbotsspam
Repeated RDP login failures. Last user: Usuario2
2020-09-15 21:22:37
149.210.142.8 attackbots
RDP Bruteforce
2020-09-15 21:26:21
114.99.18.131 attackbotsspam
spam (f2b h2)
2020-09-15 21:15:51
188.213.34.27 attackspam
DNN-trying to access forms
2020-09-15 21:23:41
120.31.229.233 attackspambots
RDP Bruteforce
2020-09-15 21:13:46
84.52.85.204 attackbotsspam
SSH Brute Force
2020-09-15 20:58:37
120.31.202.107 attackspam
RDP Bruteforce
2020-09-15 21:14:22
120.53.117.206 attackspambots
RDP Bruteforce
2020-09-15 21:12:42
106.13.177.231 attackbots
Sep 15 05:17:42 host1 sshd[439229]: Failed password for root from 106.13.177.231 port 56450 ssh2
Sep 15 05:20:49 host1 sshd[439363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.177.231  user=root
Sep 15 05:20:52 host1 sshd[439363]: Failed password for root from 106.13.177.231 port 43530 ssh2
Sep 15 05:20:49 host1 sshd[439363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.177.231  user=root
Sep 15 05:20:52 host1 sshd[439363]: Failed password for root from 106.13.177.231 port 43530 ssh2
...
2020-09-15 21:02:49

Recently Reported IPs

1.105.52.7 1.104.243.240 1.106.164.91 1.106.202.76
1.110.23.118 1.105.116.45 1.106.65.118 1.106.76.87
1.103.249.197 1.105.179.30 1.107.13.37 1.104.35.84
1.104.224.21 1.103.13.52 1.106.91.186 1.103.6.67
1.106.78.171 1.105.85.201 1.108.131.15 1.105.102.85