Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Melbourne

Region: Victoria

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '121.208.0.0 - 121.223.255.255'

% Abuse contact for '121.208.0.0 - 121.223.255.255' is 'abuse@telstra.net'

inetnum:        121.208.0.0 - 121.223.255.255
netname:        TELSTRAINTERNET45-AU
descr:          Telstra Limited
country:        AU
org:            ORG-TC6-AP
admin-c:        TIAR-AP
tech-c:         TAN2-AP
abuse-c:        AT1005-AP
status:         ALLOCATED PORTABLE
remarks:        -----
remarks:        All reports regarding SPAM or security breaches
remarks:        should be addressed to abuse@telstra.net
remarks:        ------
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-AU-TIAR-AP
mnt-routes:     MAINT-AU-TIAR-AP
mnt-irt:        IRT-TELSTRA-AU
last-modified:  2024-05-10T00:50:21Z
geofeed:        https://geofeed.tools.telstra.net/geofeed.csv
source:         APNIC

irt:            IRT-TELSTRA-AU
address:        Telstra Internet
e-mail:         abuse@telstra.net
abuse-mailbox:  abuse@telstra.net
admin-c:        TIAR-AP
tech-c:         TIAR-AP
auth:           # Filtered
remarks:        abuse@telstra.net was validated on 2026-01-26
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2026-01-26T01:19:20Z
source:         APNIC

organisation:   ORG-TC6-AP
org-name:       Telstra Limited
org-type:       LIR
country:        AU
address:        242 Exhibition Street
e-mail:         corporateaddressing@team.telstra.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-12-06T08:30:50Z
source:         APNIC

role:           ABUSE TELSTRAAU
country:        ZZ
address:        Telstra Internet
phone:          +000000000
e-mail:         abuse@telstra.net
admin-c:        TIAR-AP
tech-c:         TIAR-AP
nic-hdl:        AT1005-AP
remarks:        Generated from irt object IRT-TELSTRA-AU
remarks:        abuse@telstra.net was validated on 2026-01-26
abuse-mailbox:  abuse@telstra.net
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-26T01:19:29Z
source:         APNIC

role:           Telstra AU NOC
address:        Telstra Internet
address:        242 Exhibition Street
address:        Melbourne
address:        VIC 3000
country:        AU
phone:          +61 3 8650 3305
e-mail:         ipnoc-au@team.telstra.com
admin-c:        TIAR-AP
tech-c:         TIAR-AP
nic-hdl:        TAN2-AP
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2025-11-26T05:11:17Z
source:         APNIC

person:         Telstra Internet Address Registry
address:        Telstra Internet
address:        242 Exhibition St
address:        Melbourne
address:        VIC 3000
country:        AU
phone:          +61 000000000
e-mail:         addressing@telstra.net
nic-hdl:        TIAR-AP
remarks:        Telstra Internet Address Registry Role Object
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2021-12-09T22:28:56Z
source:         APNIC

% Information related to '121.208.0.0/12AS1221'

route:          121.208.0.0/12
origin:         AS1221
descr:          Telstra Corporation
                242 Exhibition Street
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2019-12-11T21:04:45Z
source:         APNIC

% Information related to '121.208.0.0/12AS19905'

route:          121.208.0.0/12
origin:         AS19905
descr:          Telstra Corporation Limited
                242 Exhibition Street
mnt-by:         MAINT-AU-TIAR-AP
last-modified:  2022-09-12T01:26:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 121.220.252.74
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48968
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;121.220.252.74.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030700 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 07 22:00:53 CST 2026
;; MSG SIZE  rcvd: 107
Host info
74.252.220.121.in-addr.arpa domain name pointer cpe-121-220-252-74.bpw7-r-031.way.sa.bigpond.net.au.
Nslookup info:
b'74.252.220.121.in-addr.arpa	name = cpe-121-220-252-74.bpw7-r-031.way.sa.bigpond.net.au.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
45.95.168.164 attack
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[395558]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[395559]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[395551]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[393988]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[395549]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[395556]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 10 07:17:22 mail.srvfarm.net postfix/smtpd[395564]: warning: go.goldsteelllc.tech[45.95.168.164]: SASL LOGIN authentication f
2020-03-10 15:24:47
125.43.68.83 attack
Mar 10 07:07:26  sshd\[28228\]: Invalid user jianzuoyi from 125.43.68.83Mar 10 07:07:27  sshd\[28228\]: Failed password for invalid user jianzuoyi from 125.43.68.83 port 24487 ssh2
...
2020-03-10 15:13:30
5.66.112.229 attackbotsspam
HTTP/80/443 Probe, Hack -
2020-03-10 15:14:58
103.49.94.148 attack
2020-03-10T05:23:31.868976shield sshd\[31743\]: Invalid user 123456 from 103.49.94.148 port 42024
2020-03-10T05:23:31.876316shield sshd\[31743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.94.148
2020-03-10T05:23:34.165068shield sshd\[31743\]: Failed password for invalid user 123456 from 103.49.94.148 port 42024 ssh2
2020-03-10T05:29:41.213388shield sshd\[32509\]: Invalid user 123456 from 103.49.94.148 port 57452
2020-03-10T05:29:41.216702shield sshd\[32509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.49.94.148
2020-03-10 15:42:34
167.71.4.117 attack
Mar 10 06:07:35 ip-172-31-62-245 sshd\[1760\]: Invalid user slfbrighttools from 167.71.4.117\
Mar 10 06:07:37 ip-172-31-62-245 sshd\[1760\]: Failed password for invalid user slfbrighttools from 167.71.4.117 port 40308 ssh2\
Mar 10 06:11:02 ip-172-31-62-245 sshd\[1856\]: Invalid user slfbrighttools from 167.71.4.117\
Mar 10 06:11:04 ip-172-31-62-245 sshd\[1856\]: Failed password for invalid user slfbrighttools from 167.71.4.117 port 53516 ssh2\
Mar 10 06:14:26 ip-172-31-62-245 sshd\[1872\]: Invalid user test from 167.71.4.117\
2020-03-10 15:18:32
137.74.44.162 attack
Mar 10 08:09:07 localhost sshd\[21468\]: Invalid user chef from 137.74.44.162 port 33916
Mar 10 08:09:07 localhost sshd\[21468\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.44.162
Mar 10 08:09:09 localhost sshd\[21468\]: Failed password for invalid user chef from 137.74.44.162 port 33916 ssh2
2020-03-10 15:19:05
223.206.250.15 attack
1583812319 - 03/10/2020 04:51:59 Host: 223.206.250.15/223.206.250.15 Port: 445 TCP Blocked
2020-03-10 15:16:39
42.115.237.98 attackbotsspam
Email rejected due to spam filtering
2020-03-10 15:36:16
49.88.112.115 attackbots
Mar 10 02:53:05 ny01 sshd[16944]: Failed password for root from 49.88.112.115 port 45492 ssh2
Mar 10 02:57:00 ny01 sshd[18826]: Failed password for root from 49.88.112.115 port 16874 ssh2
2020-03-10 15:02:38
46.185.31.55 attackspam
firewall-block, port(s): 445/tcp
2020-03-10 15:15:29
14.228.95.29 attackspam
1583812306 - 03/10/2020 04:51:46 Host: 14.228.95.29/14.228.95.29 Port: 445 TCP Blocked
2020-03-10 15:25:43
193.202.44.194 attackbotsspam
unauthorized connection attempt
2020-03-10 15:34:17
1.53.156.109 attackspambots
Email rejected due to spam filtering
2020-03-10 15:01:21
51.15.59.190 attack
2020-03-10T07:10:23.179407shield sshd\[11856\]: Invalid user lichaonan from 51.15.59.190 port 54370
2020-03-10T07:10:23.188668shield sshd\[11856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.59.190
2020-03-10T07:10:25.396351shield sshd\[11856\]: Failed password for invalid user lichaonan from 51.15.59.190 port 54370 ssh2
2020-03-10T07:16:01.937532shield sshd\[12731\]: Invalid user administrator from 51.15.59.190 port 42926
2020-03-10T07:16:01.943438shield sshd\[12731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.59.190
2020-03-10 15:24:09
58.187.88.186 attackbotsspam
Email rejected due to spam filtering
2020-03-10 15:26:08

Recently Reported IPs

121.237.149.191 2606:4700:10::ac43:872 2606:4700:10::6814:7364 2606:4700:10::6816:2183
2606:4700:10::6814:5848 20.81.46.136 2606:4700:10::6816:2528 2606:4700:10::6814:7655
2606:4700:10::6816:4029 2606:4700:10::ac43:2001 2606:4700:10::6814:5060 2606:4700:10::6814:4710
2606:4700:10::ac43:1724 39.98.173.84 47.92.248.107 47.92.93.49
122.193.247.187 2606:4700:10::6814:5433 121.230.89.195 2606:4700:10::6814:7836