City: La Puente
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 47.136.0.0 - 47.181.255.255
CIDR: 47.180.0.0/15, 47.136.0.0/13, 47.160.0.0/12, 47.144.0.0/12, 47.176.0.0/14
NetName: FCC-212
NetHandle: NET-47-136-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Frontier Communications Corporation (FCC-212)
RegDate: 2015-08-28
Updated: 2015-08-28
Ref: https://rdap.arin.net/registry/ip/47.136.0.0
OrgName: Frontier Communications Corporation
OrgId: FCC-212
Address: 1400 E PHILLIPS BLVD
City: POMONA
StateProv: CA
PostalCode: 91766
Country: US
RegDate: 2015-04-02
Updated: 2023-06-01
Comment: Abuse complaints will only be responded to by the use of the abuse contact
Ref: https://rdap.arin.net/registry/entity/FCC-212
ReferralServer: rwhois://rwhois.frontiernet.net:4321
OrgTechHandle: ZF47-ARIN
OrgTechName: Frontier Communications
OrgTechPhone: +1-585-623-4519
OrgTechEmail: abuse@support.ftr.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZF47-ARIN
OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-877-474-7876
OrgAbuseEmail: abuse@support.ftr.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE223-ARIN
OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName: Hostmaster
OrgRoutingPhone: +1-585-777-0949
OrgRoutingEmail: hostmaster@support.ftr.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/HOSTM2146-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.frontiernet.net:4321.
%rwhois V-1.5:002090:00 whois.frontiernet.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:47.144.0.0/13
network:ID:NET-47-147-0-0-19
network:Network-Name:47-147-0-0-19
network:IP-Network:47.147.0.0/19
network:Org-Name;I:FTR3 FiberOptic-D La Puente CA
network:Street-Address:15884 E Workman St
network:City:LA PUENTE
network:State:CA
network:Postal-Code:91744
network:Country-Code:US
network:Tech-Contact;I:AR259-FRTR
network:Updated:20160714
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
network:Auth-Area:47.144.0.0/13
network:ID:NET-47-144-0-0-13
network:Network-Name:47-144-0-0-13
network:IP-Network:47.144.0.0/13
network:Org-Name;I:Frontier Communications Solutions
network:Street-Address:120 North Plymouth Ave
network:City:Rochester
network:State:NY
network:Postal-Code:14608
network:Country-Code:US
network:Tech-Contact;I:ABUSE-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Updated:20160520
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.147.0.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.147.0.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 00:53:40 CST 2026
;; MSG SIZE rcvd: 105
242.0.147.47.in-addr.arpa domain name pointer 47-147-0-242.lsan.ca.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.0.147.47.in-addr.arpa name = 47-147-0-242.lsan.ca.frontiernet.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 207.154.229.50 | attack | 2020-04-26T16:26:24.672830linuxbox-skyline sshd[94154]: Invalid user hb from 207.154.229.50 port 45750 ... |
2020-04-27 07:04:07 |
| 79.137.181.54 | attackbots | Unauthorised access (Apr 26) SRC=79.137.181.54 LEN=52 TTL=118 ID=4681 DF TCP DPT=445 WINDOW=8192 SYN |
2020-04-27 07:09:30 |
| 51.89.136.104 | attackbots | Apr 26 17:18:04 ny01 sshd[18191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.136.104 Apr 26 17:18:06 ny01 sshd[18191]: Failed password for invalid user linux1 from 51.89.136.104 port 57758 ssh2 Apr 26 17:22:41 ny01 sshd[18826]: Failed password for root from 51.89.136.104 port 36594 ssh2 |
2020-04-27 07:12:01 |
| 185.166.131.146 | attack | Wordpress attack |
2020-04-27 07:20:46 |
| 1.179.137.10 | attackbots | Apr 26 21:08:32 game-panel sshd[16647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10 Apr 26 21:08:34 game-panel sshd[16647]: Failed password for invalid user fu from 1.179.137.10 port 33798 ssh2 Apr 26 21:13:00 game-panel sshd[16879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.179.137.10 |
2020-04-27 07:21:55 |
| 178.62.248.130 | attackspambots | Apr 26 23:04:53 vps647732 sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.248.130 Apr 26 23:04:55 vps647732 sshd[21322]: Failed password for invalid user deploy from 178.62.248.130 port 57732 ssh2 ... |
2020-04-27 07:31:16 |
| 129.211.171.24 | attackbotsspam | Invalid user ajp from 129.211.171.24 port 48404 |
2020-04-27 07:29:03 |
| 45.143.220.216 | attack | [2020-04-26 19:08:07] NOTICE[1170][C-0000637a] chan_sip.c: Call from '' (45.143.220.216:50498) to extension '01146406820532' rejected because extension not found in context 'public'. [2020-04-26 19:08:07] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-26T19:08:07.733-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146406820532",SessionID="0x7f6c083b5ae8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.143.220.216/50498",ACLName="no_extension_match" [2020-04-26 19:18:07] NOTICE[1170][C-00006391] chan_sip.c: Call from '' (45.143.220.216:55079) to extension '01146633915843' rejected because extension not found in context 'public'. [2020-04-26 19:18:07] SECURITY[1184] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-04-26T19:18:07.360-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146633915843",SessionID="0x7f6c080ab528",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/4 ... |
2020-04-27 07:38:56 |
| 192.126.153.171 | attackspam | REQUESTED PAGE: / |
2020-04-27 07:24:41 |
| 77.65.79.150 | attack | (sshd) Failed SSH login from 77.65.79.150 (PL/Poland/d79-150.icpnet.pl): 5 in the last 3600 secs |
2020-04-27 07:11:39 |
| 34.67.145.173 | attack | Invalid user hgrepo from 34.67.145.173 port 35728 |
2020-04-27 07:29:19 |
| 3.22.194.250 | attack | mue-0 : Trying access unauthorized files=>/images/jdownloads/screenshots/update.php() |
2020-04-27 07:34:19 |
| 142.44.160.173 | attackspambots | Apr 27 01:07:31 legacy sshd[20360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173 Apr 27 01:07:33 legacy sshd[20360]: Failed password for invalid user jethro from 142.44.160.173 port 41586 ssh2 Apr 27 01:11:42 legacy sshd[20537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.173 ... |
2020-04-27 07:24:14 |
| 106.12.24.193 | attack | Apr 26 22:41:25 OPSO sshd\[9045\]: Invalid user redis from 106.12.24.193 port 46464 Apr 26 22:41:25 OPSO sshd\[9045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.193 Apr 26 22:41:28 OPSO sshd\[9045\]: Failed password for invalid user redis from 106.12.24.193 port 46464 ssh2 Apr 26 22:44:49 OPSO sshd\[10108\]: Invalid user eco from 106.12.24.193 port 39530 Apr 26 22:44:49 OPSO sshd\[10108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.24.193 |
2020-04-27 07:29:44 |
| 91.121.87.174 | attackbotsspam | $f2bV_matches |
2020-04-27 06:58:57 |