City: unknown
Region: New South Wales
Country: Australia
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
NetRange: 137.166.0.0 - 137.166.255.255
CIDR: 137.166.0.0/16
NetName: APNIC-ERX-137-166-0-0
NetHandle: NET-137-166-0-0-1
Parent: NET137 (NET-137-0-0-0-0)
NetType: Early Registrations, Transferred to APNIC
OriginAS:
Organization: Asia Pacific Network Information Centre (APNIC)
RegDate: 2004-02-18
Updated: 2009-10-08
Comment: This IP address range is not registered in the ARIN database.
Comment: This range was transferred to the APNIC Whois Database as
Comment: part of the ERX (Early Registration Transfer) project.
Comment: For details, refer to the APNIC Whois Database via
Comment: WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl
Comment:
Comment: ** IMPORTANT NOTE: APNIC is the Regional Internet Registry
Comment: for the Asia Pacific region. APNIC does not operate networks
Comment: using this IP address range and is not able to investigate
Comment: spam or abuse reports relating to these addresses. For more
Comment: help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref: https://rdap.arin.net/registry/ip/137.166.0.0
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.apnic.net
OrgName: Asia Pacific Network Information Centre
OrgId: APNIC
Address: PO Box 3646
City: South Brisbane
StateProv: QLD
PostalCode: 4101
Country: AU
RegDate:
Updated: 2012-01-24
Ref: https://rdap.arin.net/registry/entity/APNIC
ReferralServer: whois://whois.apnic.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query
OrgTechHandle: AWC12-ARIN
OrgTechName: APNIC Whois Contact
OrgTechPhone: +61 7 3858 3188
OrgTechEmail: search-apnic-not-arin@apnic.net
OrgTechRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
OrgAbuseHandle: AWC12-ARIN
OrgAbuseName: APNIC Whois Contact
OrgAbusePhone: +61 7 3858 3188
OrgAbuseEmail: search-apnic-not-arin@apnic.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/AWC12-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Found a referral to whois.apnic.net.
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '137.166.0.0 - 137.166.255.255'
% Abuse contact for '137.166.0.0 - 137.166.255.255' is 'ip-admin@csu.edu.au'
inetnum: 137.166.0.0 - 137.166.255.255
netname: CHASTURT-UNI
descr: Charles Sturt University
country: AU
org: ORG-CSU1-AP
admin-c: CIA4-AP
tech-c: CIA4-AP
abuse-c: AC1876-AP
status: ALLOCATED PORTABLE
notify: ip-admin@csu.edu.au
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-CSUIPADMIN
mnt-routes: MAINT-AU-CSUIPADMIN
mnt-irt: IRT-CSUNIC1-AU
last-modified: 2020-06-30T23:14:29Z
source: APNIC
irt: IRT-CSUNIC1-AU
address: Charles Sturt Univeristy
address: Panorama Avenue
address: Bathurst, NSW
e-mail: ip-admin@csu.edu.au
abuse-mailbox: ip-admin@csu.edu.au
admin-c: CIA4-AP
tech-c: CIA4-AP
auth: # Filtered
remarks: ip-admin@csu.edu.au was validated on 2025-03-25
mnt-by: MNT-ERX-CHARLESTURTUNI-NON-AU
last-modified: 2025-09-04T06:54:40Z
source: APNIC
organisation: ORG-CSU1-AP
org-name: Charles Sturt University
org-type: LIR
country: AU
address: Boorooma Street
phone: +61263384239
e-mail: ip-admin@csu.edu.au
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2023-09-05T02:16:03Z
source: APNIC
role: ABUSE CSUNIC1AU
country: ZZ
address: Charles Sturt Univeristy
address: Panorama Avenue
address: Bathurst, NSW
phone: +000000000
e-mail: ip-admin@csu.edu.au
admin-c: CIA4-AP
tech-c: CIA4-AP
nic-hdl: AC1876-AP
remarks: Generated from irt object IRT-CSUNIC1-AU
remarks: ip-admin@csu.edu.au was validated on 2025-03-25
abuse-mailbox: ip-admin@csu.edu.au
mnt-by: APNIC-ABUSE
last-modified: 2025-03-25T22:45:32Z
source: APNIC
person: CSU IP Admin
address: Charles Sturt University
Boorooma Street
Wagga Wagga NSW 2650
country: AU
phone: +61263384357
e-mail: ip-admin@csu.edu.au
nic-hdl: CIA4-AP
abuse-mailbox: ip-admin@csu.edu.au
mnt-by: MAINT-AU-CSUIPADMIN
last-modified: 2012-09-14T06:51:10Z
source: APNIC
% Information related to '137.166.128.0/17AS58877'
route: 137.166.128.0/17
origin: AS58877
descr: Charles Sturt University
Boorooma Street
mnt-by: MAINT-AU-CSUIPADMIN
last-modified: 2023-02-16T05:58:34Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.166.178.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44139
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;137.166.178.153. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025092101 1800 900 604800 86400
;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 22 13:26:28 CST 2025
;; MSG SIZE rcvd: 108
Host 153.178.166.137.in-addr.arpa not found: 2(SERVFAIL)
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server: 183.60.82.98
Address: 183.60.82.98#53
** server can't find 153.178.166.137.in-addr.arpa: SERVFAIL
IP | Type | Details | Datetime |
---|---|---|---|
211.152.136.95 | attackbots | ICMP MH Probe, Scan /Distributed - |
2019-11-16 04:21:02 |
68.32.152.195 | attack | Port scan |
2019-11-16 04:15:02 |
66.186.160.54 | attackbotsspam | 66.186.160.54 was recorded 111 times by 1 hosts attempting to connect to the following ports: 3389. Incident counter (4h, 24h, all-time): 111, 624, 7774 |
2019-11-16 04:01:50 |
50.67.178.164 | attackspambots | Automatic report - Banned IP Access |
2019-11-16 04:19:17 |
203.205.244.61 | attack | ICMP MH Probe, Scan /Distributed - |
2019-11-16 04:34:12 |
188.165.116.177 | attackbots | Connection by 188.165.116.177 on port: 465 got caught by honeypot at 11/15/2019 1:38:44 PM |
2019-11-16 04:12:27 |
63.80.184.121 | attackspam | 2019-11-15T15:38:03.547800stark.klein-stark.info postfix/smtpd\[4106\]: NOQUEUE: reject: RCPT from channel.sapuxfiori.com\[63.80.184.121\]: 554 5.7.1 \ |
2019-11-16 04:33:28 |
72.168.144.81 | attackspam | Hit on /xmlrpc.php |
2019-11-16 04:36:57 |
211.152.152.95 | attackspam | ICMP MH Probe, Scan /Distributed - |
2019-11-16 04:16:08 |
195.206.105.217 | attackspam | Automatic report - XMLRPC Attack |
2019-11-16 04:07:20 |
217.146.1.102 | attackbots | ICMP MH Probe, Scan /Distributed - |
2019-11-16 04:04:38 |
68.183.48.172 | attack | Nov 15 10:16:57 web1 sshd\[1658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172 user=backup Nov 15 10:16:59 web1 sshd\[1658\]: Failed password for backup from 68.183.48.172 port 41513 ssh2 Nov 15 10:21:19 web1 sshd\[2056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172 user=root Nov 15 10:21:21 web1 sshd\[2056\]: Failed password for root from 68.183.48.172 port 60161 ssh2 Nov 15 10:25:31 web1 sshd\[2448\]: Invalid user agnesse from 68.183.48.172 Nov 15 10:25:31 web1 sshd\[2448\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.48.172 |
2019-11-16 04:26:09 |
192.144.130.62 | attackbotsspam | Nov 15 17:38:48 hosting sshd[4114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.130.62 user=root Nov 15 17:38:50 hosting sshd[4114]: Failed password for root from 192.144.130.62 port 34284 ssh2 ... |
2019-11-16 04:06:36 |
150.223.12.208 | attack | Nov 15 20:52:19 lnxweb61 sshd[28878]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.223.12.208 |
2019-11-16 04:16:40 |
177.139.177.94 | attackspambots | SSH invalid-user multiple login try |
2019-11-16 04:40:31 |