City: Melbourne
Region: Victoria
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '121.208.0.0 - 121.223.255.255'
% Abuse contact for '121.208.0.0 - 121.223.255.255' is 'abuse@telstra.net'
inetnum: 121.208.0.0 - 121.223.255.255
netname: TELSTRAINTERNET45-AU
descr: Telstra Limited
country: AU
org: ORG-TC6-AP
admin-c: TIAR-AP
tech-c: TAN2-AP
abuse-c: AT1005-AP
status: ALLOCATED PORTABLE
remarks: -----
remarks: All reports regarding SPAM or security breaches
remarks: should be addressed to abuse@telstra.net
remarks: ------
remarks: --------------------------------------------------------
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: --------------------------------------------------------
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-TIAR-AP
mnt-routes: MAINT-AU-TIAR-AP
mnt-irt: IRT-TELSTRA-AU
last-modified: 2024-05-10T00:50:21Z
geofeed: https://geofeed.tools.telstra.net/geofeed.csv
source: APNIC
irt: IRT-TELSTRA-AU
address: Telstra Internet
e-mail: abuse@telstra.net
abuse-mailbox: abuse@telstra.net
admin-c: TIAR-AP
tech-c: TIAR-AP
auth: # Filtered
remarks: abuse@telstra.net was validated on 2026-01-26
mnt-by: MAINT-AU-TIAR-AP
last-modified: 2026-01-26T01:19:20Z
source: APNIC
organisation: ORG-TC6-AP
org-name: Telstra Limited
org-type: LIR
country: AU
address: 242 Exhibition Street
e-mail: corporateaddressing@team.telstra.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2024-12-06T08:30:50Z
source: APNIC
role: ABUSE TELSTRAAU
country: ZZ
address: Telstra Internet
phone: +000000000
e-mail: abuse@telstra.net
admin-c: TIAR-AP
tech-c: TIAR-AP
nic-hdl: AT1005-AP
remarks: Generated from irt object IRT-TELSTRA-AU
remarks: abuse@telstra.net was validated on 2026-01-26
abuse-mailbox: abuse@telstra.net
mnt-by: APNIC-ABUSE
last-modified: 2026-01-26T01:19:29Z
source: APNIC
role: Telstra AU NOC
address: Telstra Internet
address: 242 Exhibition Street
address: Melbourne
address: VIC 3000
country: AU
phone: +61 3 8650 3305
e-mail: ipnoc-au@team.telstra.com
admin-c: TIAR-AP
tech-c: TIAR-AP
nic-hdl: TAN2-AP
mnt-by: MAINT-AU-TIAR-AP
last-modified: 2025-11-26T05:11:17Z
source: APNIC
person: Telstra Internet Address Registry
address: Telstra Internet
address: 242 Exhibition St
address: Melbourne
address: VIC 3000
country: AU
phone: +61 000000000
e-mail: addressing@telstra.net
nic-hdl: TIAR-AP
remarks: Telstra Internet Address Registry Role Object
mnt-by: MAINT-AU-TIAR-AP
last-modified: 2021-12-09T22:28:56Z
source: APNIC
% Information related to '121.208.0.0/12AS1221'
route: 121.208.0.0/12
origin: AS1221
descr: Telstra Corporation
242 Exhibition Street
mnt-by: MAINT-AU-TIAR-AP
last-modified: 2019-12-11T21:04:45Z
source: APNIC
% Information related to '121.208.0.0/12AS19905'
route: 121.208.0.0/12
origin: AS19905
descr: Telstra Corporation Limited
242 Exhibition Street
mnt-by: MAINT-AU-TIAR-AP
last-modified: 2022-09-12T01:26:27Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.220.252.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;121.220.252.136. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030700 1800 900 604800 86400
;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 22:00:57 CST 2026
;; MSG SIZE rcvd: 108
136.252.220.121.in-addr.arpa domain name pointer cpe-121-220-252-136.bpw7-r-031.way.sa.bigpond.net.au.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
136.252.220.121.in-addr.arpa name = cpe-121-220-252-136.bpw7-r-031.way.sa.bigpond.net.au.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 192.167.18.50 | attackbotsspam | miraniessen.de 192.167.18.50 \[13/Jul/2019:01:15:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5972 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" miraniessen.de 192.167.18.50 \[13/Jul/2019:01:15:40 +0200\] "POST /wp-login.php HTTP/1.1" 200 5976 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" miraniessen.de 192.167.18.50 \[13/Jul/2019:01:15:40 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4043 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0" |
2019-07-13 10:41:24 |
| 5.126.9.204 | attackspambots | Unauthorized connection attempt from IP address 5.126.9.204 on Port 445(SMB) |
2019-07-13 10:36:54 |
| 217.24.183.72 | attackbotsspam | Unauthorized connection attempt from IP address 217.24.183.72 on Port 25(SMTP) |
2019-07-13 10:27:39 |
| 27.50.24.83 | attackbots | Jul 12 18:34:48 cac1d2 sshd\[8215\]: Invalid user berit from 27.50.24.83 port 35154 Jul 12 18:34:48 cac1d2 sshd\[8215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.50.24.83 Jul 12 18:34:50 cac1d2 sshd\[8215\]: Failed password for invalid user berit from 27.50.24.83 port 35154 ssh2 ... |
2019-07-13 10:15:39 |
| 168.181.226.146 | attackspam | failed_logins |
2019-07-13 10:32:16 |
| 140.143.53.145 | attack | SSH Brute Force, server-1 sshd[12916]: Failed password for invalid user jay from 140.143.53.145 port 53151 ssh2 |
2019-07-13 10:44:58 |
| 45.63.95.251 | attack | WordPress brute force |
2019-07-13 10:21:15 |
| 218.155.202.145 | attackbots | Jul 12 17:10:56 home sshd[5209]: Invalid user system from 218.155.202.145 port 49196 Jul 12 17:10:57 home sshd[5209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.202.145 Jul 12 17:10:56 home sshd[5209]: Invalid user system from 218.155.202.145 port 49196 Jul 12 17:10:58 home sshd[5209]: Failed password for invalid user system from 218.155.202.145 port 49196 ssh2 Jul 12 17:10:57 home sshd[5209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.202.145 Jul 12 17:10:56 home sshd[5209]: Invalid user system from 218.155.202.145 port 49196 Jul 12 17:10:58 home sshd[5209]: Failed password for invalid user system from 218.155.202.145 port 49196 ssh2 Jul 12 19:05:02 home sshd[5518]: Invalid user cisco from 218.155.202.145 port 48382 Jul 12 19:05:02 home sshd[5518]: Invalid user cisco from 218.155.202.145 port 48382 ... |
2019-07-13 10:37:38 |
| 45.76.151.163 | attackbots | WordPress brute force |
2019-07-13 10:20:54 |
| 211.181.237.49 | attackbotsspam | Unauthorized connection attempt from IP address 211.181.237.49 on Port 445(SMB) |
2019-07-13 10:46:45 |
| 192.227.109.35 | attackspam | Automatic report - Web App Attack |
2019-07-13 10:38:42 |
| 82.114.241.138 | attack | WordPress brute force |
2019-07-13 10:09:56 |
| 46.163.169.84 | attackspambots | Unauthorized connection attempt from IP address 46.163.169.84 on Port 445(SMB) |
2019-07-13 10:18:36 |
| 31.165.112.245 | attackspambots | Jul1221:57:14server6dovecot:imap-login:Disconnected\(authfailed\,1attemptsin2secs\):user=\ |
2019-07-13 10:24:02 |
| 202.146.215.20 | attack | WordPress XMLRPC scan :: 202.146.215.20 0.348 BYPASS [13/Jul/2019:11:46:32 1000] [censored_1] "POST /xmlrpc.php HTTP/1.1" 503 21351 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2019-07-13 10:32:43 |