Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyoto

Region: Kyoto

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.55.29.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55807
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;221.55.29.51.			IN	A

;; AUTHORITY SECTION:
.			578	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 03 01:22:28 CST 2020
;; MSG SIZE  rcvd: 116
Host info
51.29.55.221.in-addr.arpa domain name pointer softbank221055029051.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.29.55.221.in-addr.arpa	name = softbank221055029051.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.175.28.227 attackbotsspam
SSH Invalid Login
2020-06-27 07:34:16
104.236.63.99 attackspambots
Invalid user mcserver from 104.236.63.99 port 49610
2020-06-27 07:36:31
207.140.102.150 attack
Invalid user soporte from 207.140.102.150 port 34874
2020-06-27 07:22:04
74.82.47.50 attackspambots
srv02 Mass scanning activity detected Target: 23(telnet) ..
2020-06-27 07:20:28
115.159.86.75 attack
Jun 27 04:28:25 gw1 sshd[20016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.86.75
Jun 27 04:28:27 gw1 sshd[20016]: Failed password for invalid user pjv from 115.159.86.75 port 34757 ssh2
...
2020-06-27 07:39:28
113.104.240.193 attack
Lines containing failures of 113.104.240.193
Jun 25 13:09:49 shared03 sshd[13254]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.240.193  user=r.r
Jun 25 13:09:51 shared03 sshd[13254]: Failed password for r.r from 113.104.240.193 port 11581 ssh2
Jun 25 13:09:52 shared03 sshd[13254]: Received disconnect from 113.104.240.193 port 11581:11: Bye Bye [preauth]
Jun 25 13:09:52 shared03 sshd[13254]: Disconnected from authenticating user r.r 113.104.240.193 port 11581 [preauth]
Jun 25 13:12:52 shared03 sshd[17779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.104.240.193  user=www-data
Jun 25 13:12:53 shared03 sshd[17779]: Failed password for www-data from 113.104.240.193 port 9361 ssh2
Jun 25 13:12:54 shared03 sshd[17779]: Received disconnect from 113.104.240.193 port 9361:11: Bye Bye [preauth]
Jun 25 13:12:54 shared03 sshd[17779]: Disconnected from authenticating user www-data 113.........
------------------------------
2020-06-27 07:36:03
183.56.218.62 attackspam
SSH Brute-Force reported by Fail2Ban
2020-06-27 07:29:18
138.68.21.125 attack
Jun 26 15:43:24 propaganda sshd[36610]: Connection from 138.68.21.125 port 45026 on 10.0.0.160 port 22 rdomain ""
Jun 26 15:43:24 propaganda sshd[36610]: Connection closed by 138.68.21.125 port 45026 [preauth]
2020-06-27 07:08:06
139.162.120.98 attack
 TCP (SYN) 139.162.120.98:47473 -> port 22, len 44
2020-06-27 07:06:20
119.47.90.197 attackspam
2020-06-27T00:29:29.040720ks3355764 sshd[2191]: Invalid user sasaki from 119.47.90.197 port 57150
2020-06-27T00:29:31.085462ks3355764 sshd[2191]: Failed password for invalid user sasaki from 119.47.90.197 port 57150 ssh2
...
2020-06-27 07:22:33
13.76.154.111 attackspambots
2020-06-26T23:13:53.019309ns386461 sshd\[17597\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.154.111  user=root
2020-06-26T23:13:54.674157ns386461 sshd\[17597\]: Failed password for root from 13.76.154.111 port 18113 ssh2
2020-06-26T23:20:52.711554ns386461 sshd\[24555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.154.111  user=root
2020-06-26T23:20:54.221040ns386461 sshd\[24555\]: Failed password for root from 13.76.154.111 port 46976 ssh2
2020-06-27T00:37:57.732311ns386461 sshd\[30431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.154.111  user=root
...
2020-06-27 07:34:31
152.136.189.81 attackbots
Failed password for invalid user dpa from 152.136.189.81 port 37186 ssh2
2020-06-27 07:34:02
185.39.11.38 attack
Fail2Ban Ban Triggered
2020-06-27 07:33:40
222.186.30.112 attackspambots
26.06.2020 23:17:50 SSH access blocked by firewall
2020-06-27 07:19:35
131.196.87.229 attackbots
Icarus honeypot on github
2020-06-27 07:27:32

Recently Reported IPs

75.154.206.80 34.13.154.50 166.155.17.209 146.181.207.214
193.110.83.159 167.205.50.80 80.113.185.112 76.51.120.199
207.164.116.244 149.14.33.125 24.227.130.160 87.90.145.83
123.194.243.59 90.161.84.41 100.42.29.46 74.196.215.94
83.28.56.72 163.28.154.142 42.217.115.129 206.105.140.105