Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Totigi (Tochigi)

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
[ JPNIC database provides information regarding IP address and ASN. Its use   ]
[ is restricted to network administration purposes. For further information,  ]
[ use 'whois -h whois.nic.ad.jp help'. To only display English output,        ]
[ add '/e' at the end of command, e.g. 'whois -h whois.nic.ad.jp xxx/e'.      ]

Network Information:            
a. [Network Number]             211.121.192.0/18
b. [Network Name]               ODN
g. [Organization]               Open Data Network(JAPAN TELECOM CO.,LTD.)
m. [Administrative Contact]     JP00035900
n. [Technical Contact]          JP00035900
o. [Abuse]                      
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.192.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.192.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.193.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.193.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.194.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.194.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.195.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.195.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.196.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.196.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.197.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.197.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.200.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.200.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.201.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.201.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.202.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.202.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.203.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.203.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.204.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.204.0/24
p. [Nameserver]                 ns1.dhs.jtidc.jp/211.121.207.0/24
p. [Nameserver]                 ns2.dhs.jtidc.jp/211.121.207.0/24
p. [Nameserver]                 ns2.odn.ne.jp/211.121.198.0-211.121.199.255
p. [Nameserver]                 ns4.odn.ne.jp/211.121.198.0-211.121.199.255
p. [Nameserver]                 ns2.odn.ne.jp/211.121.205.0-211.121.206.255
p. [Nameserver]                 ns4.odn.ne.jp/211.121.205.0-211.121.206.255
p. [Nameserver]                 ns2.odn.ne.jp/211.121.208.0-211.121.255.255
p. [Nameserver]                 ns4.odn.ne.jp/211.121.208.0-211.121.255.255
[Assigned Date]                 2000/06/27
[Return Date]                   
[Last Update]                   2013/08/07 16:20:04(JST)
                                
Less Specific Info.
----------
SoftBank Corp.
                     [Allocation]                               211.121.0.0/16

More Specific Info.
----------
No match!!
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 211.121.247.232
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;211.121.247.232.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026012300 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 24 01:30:16 CST 2026
;; MSG SIZE  rcvd: 108
Host info
232.247.121.211.in-addr.arpa domain name pointer HDOfx-103p7-232.ppp11.odn.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
232.247.121.211.in-addr.arpa	name = HDOfx-103p7-232.ppp11.odn.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.21.66.6 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2019-08-27 03:08:56
31.129.185.250 attackspambots
Unauthorized connection attempt from IP address 31.129.185.250 on Port 445(SMB)
2019-08-27 03:20:52
200.94.150.22 attackspam
Unauthorized connection attempt from IP address 200.94.150.22 on Port 445(SMB)
2019-08-27 03:35:12
95.254.96.222 attackbotsspam
Unauthorized connection attempt from IP address 95.254.96.222 on Port 445(SMB)
2019-08-27 03:09:20
41.130.216.145 attack
Unauthorized connection attempt from IP address 41.130.216.145 on Port 445(SMB)
2019-08-27 03:19:05
199.87.154.255 attack
Reported by AbuseIPDB proxy server.
2019-08-27 03:06:38
165.22.182.168 attackspam
Aug 26 04:53:26 php2 sshd\[2994\]: Invalid user vincintz from 165.22.182.168
Aug 26 04:53:26 php2 sshd\[2994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168
Aug 26 04:53:27 php2 sshd\[2994\]: Failed password for invalid user vincintz from 165.22.182.168 port 44638 ssh2
Aug 26 04:57:35 php2 sshd\[3349\]: Invalid user nagios from 165.22.182.168
Aug 26 04:57:35 php2 sshd\[3349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.182.168
2019-08-27 03:03:34
45.80.64.246 attackspambots
ssh intrusion attempt
2019-08-27 03:18:34
49.151.192.223 attackspam
Unauthorized connection attempt from IP address 49.151.192.223 on Port 445(SMB)
2019-08-27 03:47:42
103.224.167.88 attackbots
Caught in portsentry honeypot
2019-08-27 03:52:15
93.51.232.116 attackbotsspam
Unauthorized connection attempt from IP address 93.51.232.116 on Port 445(SMB)
2019-08-27 03:13:07
183.88.1.189 attack
Unauthorized connection attempt from IP address 183.88.1.189 on Port 445(SMB)
2019-08-27 03:30:44
153.36.242.143 attackspam
Aug 26 09:12:49 php1 sshd\[29487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Aug 26 09:12:51 php1 sshd\[29487\]: Failed password for root from 153.36.242.143 port 52060 ssh2
Aug 26 09:12:57 php1 sshd\[29497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
Aug 26 09:13:00 php1 sshd\[29497\]: Failed password for root from 153.36.242.143 port 33239 ssh2
Aug 26 09:13:09 php1 sshd\[29512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.36.242.143  user=root
2019-08-27 03:16:55
80.210.21.156 attack
Unauthorized connection attempt from IP address 80.210.21.156 on Port 445(SMB)
2019-08-27 03:44:53
180.249.202.26 attackbots
Unauthorized connection attempt from IP address 180.249.202.26 on Port 445(SMB)
2019-08-27 03:46:00

Recently Reported IPs

138.68.45.44 192.241.159.109 159.65.217.21 216.180.246.165
204.48.23.79 159.65.223.227 157.245.240.222 27.46.125.162
165.227.90.199 1.12.229.45 180.153.236.169 103.17.242.173
151.242.152.180 91.230.168.89 91.230.168.215 47.92.222.82
185.247.137.103 45.230.66.125 116.76.38.223 217.154.69.208