Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: SK Broadband Co Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.245.99.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13738
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;1.245.99.62.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 03 00:52:09 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 62.99.245.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 62.99.245.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.76.91 attackspambots
Aug 10 21:20:33 xtremcommunity sshd\[9742\]: Invalid user ria from 106.12.76.91 port 55398
Aug 10 21:20:33 xtremcommunity sshd\[9742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.91
Aug 10 21:20:35 xtremcommunity sshd\[9742\]: Failed password for invalid user ria from 106.12.76.91 port 55398 ssh2
Aug 10 21:25:43 xtremcommunity sshd\[9937\]: Invalid user minecraft from 106.12.76.91 port 48988
Aug 10 21:25:43 xtremcommunity sshd\[9937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.76.91
...
2019-08-11 12:59:33
113.14.133.102 attackspambots
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x
2019-08-11 x@x

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.14.133.102
2019-08-11 14:00:53
20.188.103.183 attackspambots
Aug 11 00:04:06 server sshd[38867]: Failed password for invalid user martinez from 20.188.103.183 port 41966 ssh2
Aug 11 00:17:09 server sshd[40851]: Failed password for invalid user transfer from 20.188.103.183 port 52448 ssh2
Aug 11 00:22:56 server sshd[41405]: Failed password for invalid user laptop from 20.188.103.183 port 48858 ssh2
2019-08-11 13:23:37
178.128.171.243 attack
Aug 11 06:12:37 vps65 sshd\[4160\]: Invalid user sille from 178.128.171.243 port 37474
Aug 11 06:12:37 vps65 sshd\[4160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.171.243
...
2019-08-11 13:00:53
201.51.90.134 attackbots
Automatic report - Port Scan Attack
2019-08-11 13:26:36
128.199.178.188 attackbotsspam
Aug 11 01:13:10 debian sshd\[10530\]: Invalid user murp from 128.199.178.188 port 34064
Aug 11 01:13:10 debian sshd\[10530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.178.188
Aug 11 01:13:13 debian sshd\[10530\]: Failed password for invalid user murp from 128.199.178.188 port 34064 ssh2
...
2019-08-11 13:16:59
14.146.92.254 attackbots
Aug 11 00:23:29 MainVPS sshd[19364]: Invalid user nexthink from 14.146.92.254 port 54294
Aug 11 00:23:34 MainVPS sshd[19364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.146.92.254
Aug 11 00:23:29 MainVPS sshd[19364]: Invalid user nexthink from 14.146.92.254 port 54294
Aug 11 00:23:36 MainVPS sshd[19364]: Failed password for invalid user nexthink from 14.146.92.254 port 54294 ssh2
Aug 11 00:23:53 MainVPS sshd[19395]: Invalid user plexuser from 14.146.92.254 port 54825
...
2019-08-11 13:00:27
144.138.102.124 attackspam
Aug 11 02:16:08 www sshd\[151108\]: Invalid user ubuntu from 144.138.102.124
Aug 11 02:16:08 www sshd\[151108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.138.102.124
Aug 11 02:16:10 www sshd\[151108\]: Failed password for invalid user ubuntu from 144.138.102.124 port 51698 ssh2
...
2019-08-11 13:44:51
41.233.112.84 attackbots
Aug 10 23:34:49 m3061 sshd[32319]: reveeclipse mapping checking getaddrinfo for host-41.233.112.84.tedata.net [41.233.112.84] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 10 23:34:49 m3061 sshd[32319]: Invalid user admin from 41.233.112.84
Aug 10 23:34:49 m3061 sshd[32319]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.233.112.84


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.233.112.84
2019-08-11 13:58:11
94.179.59.229 attackspam
Unauthorised access (Aug 11) SRC=94.179.59.229 LEN=52 TTL=122 ID=748 DF TCP DPT=445 WINDOW=8192 SYN
2019-08-11 13:37:12
119.75.44.106 attackbotsspam
brute force RDP attempt on non standard port
2019-08-11 13:26:01
222.72.138.208 attackspam
Aug 11 01:35:53 lnxweb62 sshd[12913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.72.138.208
2019-08-11 13:51:23
89.41.173.191 attackspambots
2019-08-11T00:21:42.1482171240 sshd\[20387\]: Invalid user support from 89.41.173.191 port 40847
2019-08-11T00:21:42.1556591240 sshd\[20387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.41.173.191
2019-08-11T00:21:44.3338181240 sshd\[20387\]: Failed password for invalid user support from 89.41.173.191 port 40847 ssh2
...
2019-08-11 13:50:07
104.197.122.218 attackspambots
2019-08-11T00:11:03.146484hz01.yumiweb.com sshd\[11418\]: Invalid user warehouse from 104.197.122.218 port 50368
2019-08-11T00:16:26.731638hz01.yumiweb.com sshd\[11429\]: Invalid user warehouse from 104.197.122.218 port 54016
2019-08-11T00:21:47.372170hz01.yumiweb.com sshd\[11443\]: Invalid user web from 104.197.122.218 port 57664
...
2019-08-11 13:49:38
188.166.149.3 attack
[ssh] SSH attack
2019-08-11 13:45:51

Recently Reported IPs

47.15.238.131 27.228.224.230 194.242.21.6 182.118.144.68
121.110.178.208 251.124.58.190 205.82.124.26 51.98.154.195
125.155.251.60 182.36.185.161 99.80.90.41 64.197.70.31
36.76.46.90 107.170.119.161 85.155.62.102 182.37.9.116
178.17.177.36 237.120.146.110 56.172.249.156 75.174.167.74