Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Melbourne

Region: Victoria

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '101.160.0.0 - 101.191.255.255'

% Abuse contact for '101.160.0.0 - 101.191.255.255' is 'abuse@telstra.net'

inetnum:        101.160.0.0 - 101.191.255.255
netname:        TELSTRAINTERNET50-AU
descr:          Telstra Limited
country:        AU
org:            ORG-TC6-AP
admin-c:        TIAR-AP
tech-c:         TAN2-AP
abuse-c:        AT1005-AP
status:         ALLOCATED PORTABLE
remarks:        -----
remarks:        All reports regarding SPAM or security breaches
remarks:        should be addressed to abuse@telstra.net
remarks:        ------
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-AU-TIAR-AP
mnt-routes:     MAINT-AU-TIAR-AP
mnt-irt:        IRT-TELSTRA-AU
last-modified:  2024-05-10T00:50:21Z
geofeed:        https://geofeed.tools.telstra.net/geofeed.csv
source:         APNIC

irt:            IRT-TELSTRA-AU
address:        Telstra Internet
e-mail:         abuse@telstra.net
abuse-mailbox:  abuse@telstra.net
admin-c:        TIAR-AP
tech-c:         TIAR-AP
auth:           # Filtered
remarks:        abuse@telstra.net was validated on 2026-01-26
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2026-01-26T01:19:20Z
source:         APNIC

organisation:   ORG-TC6-AP
org-name:       Telstra Limited
org-type:       LIR
country:        AU
address:        242 Exhibition Street
e-mail:         corporateaddressing@team.telstra.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-12-06T08:30:50Z
source:         APNIC

role:           ABUSE TELSTRAAU
country:        ZZ
address:        Telstra Internet
phone:          +000000000
e-mail:         abuse@telstra.net
admin-c:        TIAR-AP
tech-c:         TIAR-AP
nic-hdl:        AT1005-AP
remarks:        Generated from irt object IRT-TELSTRA-AU
remarks:        abuse@telstra.net was validated on 2026-01-26
abuse-mailbox:  abuse@telstra.net
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-26T01:19:29Z
source:         APNIC

role:           Telstra AU NOC
address:        Telstra Internet
address:        242 Exhibition Street
address:        Melbourne
address:        VIC 3000
country:        AU
phone:          +61 3 8650 3305
e-mail:         ipnoc-au@team.telstra.com
admin-c:        TIAR-AP
tech-c:         TIAR-AP
nic-hdl:        TAN2-AP
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2025-11-26T05:11:17Z
source:         APNIC

person:         Telstra Internet Address Registry
address:        Telstra Internet
address:        242 Exhibition St
address:        Melbourne
address:        VIC 3000
country:        AU
phone:          +61 000000000
e-mail:         addressing@telstra.net
nic-hdl:        TIAR-AP
remarks:        Telstra Internet Address Registry Role Object
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2021-12-09T22:28:56Z
source:         APNIC

% Information related to '101.160.0.0/11AS1221'

route:          101.160.0.0/11
origin:         AS1221
descr:          Telstra Corporation
                242 Exhibition Street
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2019-12-11T21:02:41Z
source:         APNIC

% Information related to '101.160.0.0/11AS19905'

route:          101.160.0.0/11
origin:         AS19905
descr:          Telstra Corporation Limited
                242 Exhibition Street
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2022-09-12T01:18:19Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.181.164.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11167
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.181.164.237.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031600 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 16 21:27:40 CST 2026
;; MSG SIZE  rcvd: 108
Host info
237.164.181.101.in-addr.arpa domain name pointer cpe-101-181-164-237.vb03.vic.asp.telstra.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
237.164.181.101.in-addr.arpa	name = cpe-101-181-164-237.vb03.vic.asp.telstra.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.233.177.197 attackbotsspam
$f2bV_matches
2020-06-19 14:06:06
189.91.231.252 attackbots
SSH login attempts.
2020-06-19 14:02:45
98.159.110.201 attackbots
SSH login attempts.
2020-06-19 14:11:27
45.232.73.83 attackbotsspam
Invalid user semenov from 45.232.73.83 port 49686
2020-06-19 14:01:55
217.217.90.149 attackbotsspam
Jun 19 10:46:44 gw1 sshd[23563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.217.90.149
Jun 19 10:46:46 gw1 sshd[23563]: Failed password for invalid user zzz from 217.217.90.149 port 60264 ssh2
...
2020-06-19 13:57:41
134.209.197.218 attackbots
Jun 19 07:25:54 eventyay sshd[3286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.197.218
Jun 19 07:25:57 eventyay sshd[3286]: Failed password for invalid user deploy from 134.209.197.218 port 16460 ssh2
Jun 19 07:29:06 eventyay sshd[3357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.197.218
...
2020-06-19 14:13:11
213.251.184.102 attack
Invalid user erick from 213.251.184.102 port 58976
2020-06-19 14:16:18
202.43.164.214 attack
Invalid user confluence from 202.43.164.214 port 26819
2020-06-19 14:24:19
94.23.172.28 attackspam
Invalid user visitor from 94.23.172.28 port 55268
2020-06-19 13:56:47
1.191.216.220 attackspambots
SSH login attempts.
2020-06-19 13:55:55
104.131.189.4 attackspam
Jun 19 06:21:05 localhost sshd\[11715\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.4  user=root
Jun 19 06:21:07 localhost sshd\[11715\]: Failed password for root from 104.131.189.4 port 38937 ssh2
Jun 19 06:24:35 localhost sshd\[11828\]: Invalid user pie from 104.131.189.4
Jun 19 06:24:35 localhost sshd\[11828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.189.4
Jun 19 06:24:37 localhost sshd\[11828\]: Failed password for invalid user pie from 104.131.189.4 port 39014 ssh2
...
2020-06-19 14:00:59
132.232.31.157 attackspambots
Jun 19 07:38:34 buvik sshd[24033]: Failed password for invalid user ntc from 132.232.31.157 port 34006 ssh2
Jun 19 07:42:54 buvik sshd[24748]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.31.157  user=root
Jun 19 07:42:56 buvik sshd[24748]: Failed password for root from 132.232.31.157 port 60888 ssh2
...
2020-06-19 13:56:34
104.129.5.49 attackbots
prod8
...
2020-06-19 14:13:56
67.205.137.32 attack
Jun 19 05:57:05 pve1 sshd[11252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.137.32 
Jun 19 05:57:07 pve1 sshd[11252]: Failed password for invalid user xinyi from 67.205.137.32 port 43510 ssh2
...
2020-06-19 13:51:45
51.255.192.101 attackbots
2020-06-19T06:17:26.302529sd-86998 sshd[2106]: Invalid user schulz from 51.255.192.101 port 41665
2020-06-19T06:17:26.307675sd-86998 sshd[2106]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-51-255-192.eu
2020-06-19T06:17:26.302529sd-86998 sshd[2106]: Invalid user schulz from 51.255.192.101 port 41665
2020-06-19T06:17:28.335750sd-86998 sshd[2106]: Failed password for invalid user schulz from 51.255.192.101 port 41665 ssh2
2020-06-19T06:24:49.697004sd-86998 sshd[2923]: Invalid user kevin from 51.255.192.101 port 33943
...
2020-06-19 13:51:58

Recently Reported IPs

143.180.22.208 103.181.164.237 125.42.96.246 40.5.110.209
80.94.92.10 39.100.80.150 216.154.72.216 101.133.131.45
43.165.3.25 114.66.54.183 36.113.115.150 20.46.225.117
1.234.96.192 69.92.141.241 54.146.119.88 85.217.149.56
162.243.71.18 228.180.101.202 74.222.3.251 172.234.217.129