Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '163.48.0.0 - 163.48.255.255'

% Abuse contact for '163.48.0.0 - 163.48.255.255' is 'hostmaster@nic.ad.jp'

inetnum:        163.48.0.0 - 163.48.255.255
netname:        KOBESYS-NET
country:        JP
descr:          KOBELCO SYSTEMS CORPORATION
admin-c:        TU18-AP
tech-c:         TU18-AP
status:         ALLOCATED PORTABLE
mnt-by:         MAINT-JPNIC
mnt-irt:        IRT-JPNIC-JP
last-modified:  2015-12-01T22:25:07Z
source:         APNIC

irt:            IRT-JPNIC-JP
address:        Uchikanda OS Bldg 4F, 2-12-6 Uchi-Kanda
address:        Chiyoda-ku, Tokyo 101-0047, japan
e-mail:         hostmaster@nic.ad.jp
abuse-mailbox:  hostmaster@nic.ad.jp
phone:          +81-3-5297-2311
fax-no:         +81-3-5297-2312
admin-c:        JNIC1-AP
tech-c:         JNIC1-AP
auth:           # Filtered
remarks:        hostmaster@nic.ad.jp was validated on 2024-11-27
mnt-by:         MAINT-JPNIC
last-modified:  2025-09-04T01:00:00Z
source:         APNIC

person:         Toshihiko Ueki
address:        KOBELCO SYSTEMS CORPORATI
                Shinko Building Neoest. 5F 2-11-14, Wakinohama-cho, Chuo-ku,
                KOBE-CITY, 651-0072
country:        JP
phone:          +81-78-261-6123
e-mail:         toshi@he.kobelcosys.co.jp
nic-hdl:        TU18-AP
remarks:        ----------
remarks:        imported from ARIN object:
remarks:
remarks:        poc-handle:  TU85-ARIN
remarks:        is-role:     N
remarks:        last-name:   Ueki
remarks:        first-name:  Toshihiko
remarks:        street:      KOBELCO SYSTEMS CORPORATI
                Shinko Building Neoest. 5F 2-11-14, Wakinohama-cho, Chuo-ku,
                KOBE-CITY, 651-0072
remarks:        country:     JP
remarks:        mailbox:     toshi@he.kobelcosys.co.jp
remarks:        bus-phone:   +81-78-261-6123
remarks:        reg-date:    1996-12-26
remarks:        changed:     hostmaster@arin.poc 19981207
remarks:        source:      ARIN
remarks:
remarks:        ----------
notify:         toshi@he.kobelcosys.co.jp
mnt-by:         MNT-ERX-KOBELCOSYSCORP-NON-JP
last-modified:  2008-09-04T07:29:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.48.100.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.48.100.212.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041201 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 13 08:21:33 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 212.100.48.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 212.100.48.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.205.46.250 attackbotsspam
Honeypot attack, port: 23, PTR: wimax-cpe-189-205-46-250.cdgen.static.axtel.net.
2019-07-23 04:54:48
221.212.99.106 attackbots
Automatic report - Banned IP Access
2019-07-23 05:26:43
188.53.200.14 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 15:48:19,562 INFO [shellcode_manager] (188.53.200.14) no match, writing hexdump (824387d01c118b38af10d28a46b8769a :2256376) - MS17010 (EternalBlue)
2019-07-23 05:04:08
27.64.145.15 attack
Honeypot attack, port: 81, PTR: localhost.
2019-07-23 04:49:54
129.45.5.129 attack
Jul 22 15:02:39 mxgate1 postfix/postscreen[7227]: CONNECT from [129.45.5.129]:18406 to [176.31.12.44]:25
Jul 22 15:02:39 mxgate1 postfix/dnsblog[7233]: addr 129.45.5.129 listed by domain zen.spamhaus.org as 127.0.0.4
Jul 22 15:02:39 mxgate1 postfix/dnsblog[7233]: addr 129.45.5.129 listed by domain zen.spamhaus.org as 127.0.0.11
Jul 22 15:02:39 mxgate1 postfix/dnsblog[7797]: addr 129.45.5.129 listed by domain cbl.abuseat.org as 127.0.0.2
Jul 22 15:02:45 mxgate1 postfix/postscreen[7227]: DNSBL rank 3 for [129.45.5.129]:18406
Jul x@x
Jul 22 15:02:46 mxgate1 postfix/postscreen[7227]: HANGUP after 0.29 from [129.45.5.129]:18406 in tests after SMTP handshake
Jul 22 15:02:46 mxgate1 postfix/postscreen[7227]: DISCONNECT [129.45.5.129]:18406


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=129.45.5.129
2019-07-23 05:17:43
190.17.120.88 attackbotsspam
[21/Jul/2019:08:14:46 -0400] "GET / HTTP/1.1" Chrome 51.0 UA
2019-07-23 05:03:46
185.176.27.42 attackspam
firewall-block, port(s): 6341/tcp, 9026/tcp, 9131/tcp, 9198/tcp, 9272/tcp, 9315/tcp, 9935/tcp
2019-07-23 04:48:46
95.38.212.11 attack
Automatic report - Port Scan Attack
2019-07-23 05:28:12
181.210.91.166 attackbots
DATE:2019-07-22_15:11:49, IP:181.210.91.166, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-23 05:21:14
113.116.52.183 attackbotsspam
23/tcp
[2019-07-22]1pkt
2019-07-23 05:11:17
178.90.169.23 attackspambots
Honeypot attack, port: 445, PTR: 178.90.169.23.megaline.telecom.kz.
2019-07-23 04:58:12
144.76.99.215 attackspam
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-07-23 04:53:09
154.120.225.134 attack
Jul 22 16:39:06 unicornsoft sshd\[20379\]: Invalid user bdoherty from 154.120.225.134
Jul 22 16:39:06 unicornsoft sshd\[20379\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.120.225.134
Jul 22 16:39:08 unicornsoft sshd\[20379\]: Failed password for invalid user bdoherty from 154.120.225.134 port 40906 ssh2
2019-07-23 05:17:12
217.115.213.186 attackspambots
TCP src-port=56429   dst-port=25    dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious)   (674)
2019-07-23 05:23:54
85.154.207.23 attack
Automatic report - Port Scan Attack
2019-07-23 04:54:30

Recently Reported IPs

37.240.115.111 48.177.48.98 103.74.21.109 37.10.113.210
180.153.236.61 180.153.236.172 160.61.158.123 2606:4700:10::ac43:126e
2606:4700:10::ac43:1320 2606:4700:10::6816:3037 206.81.162.9 39.98.83.238
163.227.181.118 200.154.184.166 92.51.37.63 2606:4700:10::6814:6054
2606:4700:10::6814:4984 2606:4700:10::6816:948 2606:4700:10::ac43:623 162.216.149.253