Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
[ JPNIC database provides information regarding IP address and ASN. Its use   ]
[ is restricted to network administration purposes. For further information,  ]
[ use 'whois -h whois.nic.ad.jp help'. To only display English output,        ]
[ add '/e' at the end of command, e.g. 'whois -h whois.nic.ad.jp xxx/e'.      ]

Network Information:            
a. [Network Number]             210.129.212.0/24
b. [Network Name]               IDCF-CLOUD
g. [Organization]               IDC Frontier Inc.
m. [Administrative Contact]     DE578JP
n. [Technical Contact]          DE578JP
o. [Abuse]                      
p. [Nameserver]                 ns01.idc.jp
p. [Nameserver]                 ns02.idc.jp
p. [Nameserver]                 ns03.idc.jp
[Assigned Date]                 2012/06/18
[Return Date]                   
[Last Update]                   2012/12/05 07:21:05(JST)
                                
Less Specific Info.
----------
IDC Frontier Inc.
                     [Allocation]                210.129.186.0-210.129.255.255

More Specific Info.
----------
No match!!
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 210.129.212.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;210.129.212.51.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 17:38:30 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 51.212.129.210.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.212.129.210.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.29.54.87 attack
Tried sshing with brute force.
2020-04-01 01:12:38
189.14.207.136 attackbotsspam
Unauthorized connection attempt from IP address 189.14.207.136 on Port 445(SMB)
2020-04-01 01:02:46
103.238.69.77 attackbotsspam
Unauthorized connection attempt from IP address 103.238.69.77 on Port 445(SMB)
2020-04-01 00:36:32
171.34.173.17 attackbots
Brute-force attempt banned
2020-04-01 00:23:46
113.163.216.202 attackspambots
Unauthorized connection attempt from IP address 113.163.216.202 on Port 445(SMB)
2020-04-01 00:53:37
36.81.171.253 attack
Unauthorized connection attempt from IP address 36.81.171.253 on Port 445(SMB)
2020-04-01 00:39:56
123.207.145.66 attack
Invalid user sft from 123.207.145.66 port 57654
2020-04-01 00:50:35
189.84.73.46 attackbotsspam
1585657891 - 03/31/2020 19:31:31 Host: 189.84.73.46/189.84.73.46 Port: 26 TCP Blocked
...
2020-04-01 01:03:46
213.49.159.182 attackspambots
2020-03-31T16:06:30.186426shield sshd\[10062\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-213-49-159-182.dsl.scarlet.be  user=root
2020-03-31T16:06:32.228281shield sshd\[10062\]: Failed password for root from 213.49.159.182 port 60284 ssh2
2020-03-31T16:10:27.778044shield sshd\[11094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-213-49-159-182.dsl.scarlet.be  user=root
2020-03-31T16:10:30.349130shield sshd\[11094\]: Failed password for root from 213.49.159.182 port 44464 ssh2
2020-03-31T16:14:21.280457shield sshd\[11703\]: Invalid user wangzl from 213.49.159.182 port 56892
2020-04-01 00:16:28
200.208.244.62 attackbotsspam
Unauthorized connection attempt from IP address 200.208.244.62 on Port 445(SMB)
2020-04-01 00:13:41
103.216.156.130 attackspambots
Unauthorized connection attempt from IP address 103.216.156.130 on Port 445(SMB)
2020-04-01 00:55:09
1.1.192.166 attackbots
Unauthorized connection attempt from IP address 1.1.192.166 on Port 445(SMB)
2020-04-01 01:08:45
51.68.199.166 attack
(sshd) Failed SSH login from 51.68.199.166 (GB/United Kingdom/166.ip-51-68-199.eu): 5 in the last 3600 secs
2020-04-01 00:27:43
115.42.76.2 attackbots
Unauthorized connection attempt from IP address 115.42.76.2 on Port 445(SMB)
2020-04-01 00:21:44
182.140.235.17 attackspam
03/31/2020-08:31:28.654413 182.140.235.17 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-04-01 01:07:54

Recently Reported IPs

2606:4700:10::6814:9712 122.192.203.93 2606:4700:10::6814:9630 2606:4700:10::6816:1636
2606:4700:10::6816:996 143.198.42.177 188.253.123.159 2606:4700:10::6814:9619
162.14.109.170 212.73.217.80 206.189.222.117 2606:4700:10::6816:204
38.98.22.80 216.162.44.10 20.169.91.108 172.86.69.91
2606:4700:10::6816:1219 164.155.74.93 5.45.99.158 178.172.123.41