必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): Sydney

省份(region): New South Wales

国家(country): Australia

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       129.94.0.0 - 129.94.255.255
CIDR:           129.94.0.0/16
NetName:        AP-ERX-129-94-0-0
NetHandle:      NET-129-94-0-0-1
Parent:         NET129 (NET-129-0-0-0-0)
NetType:        Early Registrations, Transferred to APNIC
OriginAS:       
Organization:   Asia Pacific Network Information Centre (APNIC)
RegDate:        2003-01-10
Updated:        2018-02-02
Comment:        This IP address range is not registered in the ARIN database. This range was transferred to the APNIC Whois Database as part of the ERX (Early Registration Transfer) project. For details, refer to the APNIC Whois Database via WHOIS.APNIC.NET or http://wq.apnic.net/apnic-bin/whois.pl ** IMPORTANT NOTE: APNIC is the Regional Internet Registry for the Asia Pacific region. APNIC does not operate networks using this IP address range and is not able to investigate spam or abuse reports relating to these addresses. For more help, refer to http://www.apnic.net/apnic-info/whois_search2/abuse-and-spamming
Ref:            https://rdap.arin.net/registry/ip/129.94.0.0

ResourceLink:  https://apps.db.ripe.net/db-web-ui/query
ResourceLink:  whois.apnic.net


OrgName:        Asia Pacific Network Information Centre
OrgId:          APNIC
Address:        PO Box 3646
City:           South Brisbane
StateProv:      QLD
PostalCode:     4101
Country:        AU
RegDate:        
Updated:        2012-01-24
Ref:            https://rdap.arin.net/registry/entity/APNIC

ReferralServer:  whois://whois.apnic.net
ResourceLink:  http://wq.apnic.net/whois-search/static/search.html

OrgTechHandle: AWC12-ARIN
OrgTechName:   APNIC Whois Contact
OrgTechPhone:  +61 7 3858 3188 
OrgTechEmail:  search-apnic-not-arin@apnic.net
OrgTechRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN

OrgAbuseHandle: AWC12-ARIN
OrgAbuseName:   APNIC Whois Contact
OrgAbusePhone:  +61 7 3858 3188 
OrgAbuseEmail:  search-apnic-not-arin@apnic.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AWC12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to whois.apnic.net.

% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '129.94.0.0 - 129.94.255.255'

% Abuse contact for '129.94.0.0 - 129.94.255.255' is 'hostmaster@unsw.edu.au'

inetnum:        129.94.0.0 - 129.94.255.255
netname:        UNSW
descr:          University of New South Wales
country:        AU
org:            ORG-UONS1-AP
admin-c:        NH302-AP
tech-c:         NH302-AP
abuse-c:        AN1027-AP
status:         ALLOCATED PORTABLE
mnt-by:         APNIC-HM
mnt-lower:      MAINT-AU-NSWUNIVERSITY
mnt-routes:     MAINT-AU-NSWUNIVERSITY
mnt-irt:        IRT-NSWUNIVERSITY-AU
last-modified:  2020-10-15T01:33:54Z
source:         APNIC

irt:            IRT-NSWUNIVERSITY-AU
address:        University of New South Wales
address:        Communications Unit
address:        Sydney, NSW 2052
phone:          +61 2 9385 3333
e-mail:         hostmaster@unsw.edu.au
abuse-mailbox:  hostmaster@unsw.edu.au
admin-c:        NH302-AP
tech-c:         NH302-AP
auth:           # Filtered
remarks:        hostmaster@unsw.edu.au was validated on 2025-11-20
mnt-by:         MAINT-AU-NSWUNIVERSITY
last-modified:  2025-11-20T02:47:14Z
source:         APNIC

organisation:   ORG-UONS1-AP
org-name:       University of New South Wales
org-type:       LIR
country:        AU
address:        UNSW IT
address:        Level 13 Library Building
address:        The University of New South Wales
phone:          +61-2-93851333
e-mail:         hostmaster@unsw.edu.au
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:15:43Z
source:         APNIC

role:           ABUSE NSWUNIVERSITYAU
country:        ZZ
address:        University of New South Wales
address:        Communications Unit
address:        Sydney, NSW 2052
phone:          +61 2 9385 3333
e-mail:         hostmaster@unsw.edu.au
admin-c:        NH302-AP
tech-c:         NH302-AP
nic-hdl:        AN1027-AP
remarks:        Generated from irt object IRT-NSWUNIVERSITY-AU
remarks:        hostmaster@unsw.edu.au was validated on 2025-11-20
abuse-mailbox:  hostmaster@unsw.edu.au
mnt-by:         APNIC-ABUSE
last-modified:  2025-11-20T02:47:37Z
source:         APNIC

role:           NSWUNIVERSITY Hostmaster
address:        University of New South Wales
address:        SYDNEY, NSW 2052
country:        AU
phone:          +61 2 9385 3333
fax-no:         +61 2 9385 1112
e-mail:         hostmaster@unsw.edu.au
admin-c:        NH302-AP
tech-c:         NH302-AP
nic-hdl:        NH302-AP
mnt-by:         MAINT-AU-NSWUNIVERSITY
last-modified:  2012-03-22T06:45:10Z
source:         APNIC

% Information related to '129.94.0.0/16AS23859'

route:          129.94.0.0/16
origin:         AS23859
descr:          University of New South Wales
                UNSW IT
                Level 13 Library Building
                The University of New South Wales
mnt-by:         MAINT-AU-NSWUNIVERSITY
last-modified:  2022-08-25T03:33:33Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.47 (WHOIS-AU4)
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 129.94.177.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50833
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;129.94.177.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 20 02:05:00 CST 2026
;; MSG SIZE  rcvd: 107
HOST信息:
108.177.94.129.in-addr.arpa domain name pointer matht308.maths.unsw.edu.au.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
108.177.94.129.in-addr.arpa	name = matht308.maths.unsw.edu.au.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
104.248.205.67 attackspam
Jun 22 08:46:12 v22019038103785759 sshd\[3191\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67  user=root
Jun 22 08:46:14 v22019038103785759 sshd\[3191\]: Failed password for root from 104.248.205.67 port 45878 ssh2
Jun 22 08:51:30 v22019038103785759 sshd\[3540\]: Invalid user sports from 104.248.205.67 port 45382
Jun 22 08:51:30 v22019038103785759 sshd\[3540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.205.67
Jun 22 08:51:32 v22019038103785759 sshd\[3540\]: Failed password for invalid user sports from 104.248.205.67 port 45382 ssh2
...
2020-06-22 18:01:18
123.207.111.151 attack
odoo8
...
2020-06-22 17:55:43
68.183.203.187 attack
 TCP (SYN) 68.183.203.187:56443 -> port 31334, len 44
2020-06-22 18:09:47
193.112.16.245 attackbotsspam
2020-06-22T05:49:13+0200 Failed SSH Authentication/Brute Force Attack. (Server 9)
2020-06-22 17:58:18
218.92.0.251 attackbots
v+ssh-bruteforce
2020-06-22 17:53:12
49.88.112.110 attackspambots
Jun 22 06:51:49 dns1 sshd[31017]: Failed password for root from 49.88.112.110 port 53450 ssh2
Jun 22 06:51:52 dns1 sshd[31017]: Failed password for root from 49.88.112.110 port 53450 ssh2
Jun 22 06:52:28 dns1 sshd[31025]: Failed password for root from 49.88.112.110 port 35886 ssh2
2020-06-22 17:56:09
188.166.61.76 attackspam
Jun 21 19:28:27 sachi sshd\[13429\]: Invalid user luna from 188.166.61.76
Jun 21 19:28:27 sachi sshd\[13429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.61.76
Jun 21 19:28:30 sachi sshd\[13429\]: Failed password for invalid user luna from 188.166.61.76 port 58756 ssh2
Jun 21 19:32:00 sachi sshd\[13858\]: Invalid user popuser from 188.166.61.76
Jun 21 19:32:00 sachi sshd\[13858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.61.76
2020-06-22 18:05:49
37.49.224.106 attackbots
smtp auth brute force
2020-06-22 18:04:33
185.219.133.202 attack
Unauthorized connection attempt detected from IP address 185.219.133.202 to port 3765
2020-06-22 17:51:49
222.186.175.217 attackbots
Jun 22 12:17:21 server sshd[20760]: Failed none for root from 222.186.175.217 port 53254 ssh2
Jun 22 12:17:23 server sshd[20760]: Failed password for root from 222.186.175.217 port 53254 ssh2
Jun 22 12:17:28 server sshd[20760]: Failed password for root from 222.186.175.217 port 53254 ssh2
2020-06-22 18:19:35
112.73.0.146 attackspambots
Jun 22 11:48:23 vpn01 sshd[635]: Failed password for root from 112.73.0.146 port 42916 ssh2
Jun 22 12:00:36 vpn01 sshd[838]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.73.0.146
...
2020-06-22 18:17:08
142.44.198.19 attack
Automatic report - XMLRPC Attack
2020-06-22 17:59:57
198.12.156.214 attack
Automatic report - Banned IP Access
2020-06-22 17:52:02
162.243.139.170 attackspam
Port scan denied
2020-06-22 17:46:06
159.203.27.98 attack
Jun 22 03:54:33 124388 sshd[6478]: Invalid user admin from 159.203.27.98 port 42294
Jun 22 03:54:33 124388 sshd[6478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.27.98
Jun 22 03:54:33 124388 sshd[6478]: Invalid user admin from 159.203.27.98 port 42294
Jun 22 03:54:35 124388 sshd[6478]: Failed password for invalid user admin from 159.203.27.98 port 42294 ssh2
Jun 22 03:58:41 124388 sshd[6833]: Invalid user mc from 159.203.27.98 port 40870
2020-06-22 18:20:03

最近上报的IP列表

13.219.107.176 2606:4700:10::6816:2911 198.235.24.95 121.230.89.60
2606:4700:10::6816:3302 109.167.82.139 2606:4700:10::6816:1204 2606:4700:10::6814:4680
127.16.156.136 195.178.110.153 188.166.234.87 121.134.176.129
2606:4700:10::6814:4716 2606:4700:10::6814:6278 2606:4700:10::6814:8961 222.108.161.236
2606:4700:10::ac43:48e 2606:4700:10::6814:9011 2606:4700:10::6816:3077 2606:4700:10::6816:4302