City: unknown
Region: Texas
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b'#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 47.136.0.0 - 47.181.255.255
CIDR: 47.144.0.0/12, 47.180.0.0/15, 47.136.0.0/13, 47.176.0.0/14, 47.160.0.0/12
NetName: FCC-212
NetHandle: NET-47-136-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Frontier Communications Corporation (FCC-212)
RegDate: 2015-08-28
Updated: 2015-08-28
Ref: https://rdap.arin.net/registry/ip/47.136.0.0
OrgName: Frontier Communications Corporation
OrgId: FCC-212
Address: 1400 E PHILLIPS BLVD
City: POMONA
StateProv: CA
PostalCode: 91766
Country: US
RegDate: 2015-04-02
Updated: 2023-06-01
Comment: Abuse complaints will only be responded to by the use of the abuse contact
Ref: https://rdap.arin.net/registry/entity/FCC-212
ReferralServer: rwhois://rwhois.frontiernet.net:4321
OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-585-623-4519
OrgAbuseEmail: abuse@support.ftr.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE223-ARIN
OrgTechHandle: ZF47-ARIN
OrgTechName: Frontier Communications
OrgTechPhone: +1-585-623-4519
OrgTechEmail: abuse@support.ftr.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZF47-ARIN
OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName: Hostmaster
OrgRoutingPhone: +1-585-777-0949
OrgRoutingEmail: hostmaster@support.ftr.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/HOSTM2146-ARIN
# end
# start
NetRange: 47.162.0.0 - 47.163.255.255
CIDR: 47.162.0.0/15
NetName: FRTR-TX
NetHandle: NET-47-162-0-0-1
Parent: FCC-212 (NET-47-136-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Frontier Communications Corporation (FCC-211)
RegDate: 2024-11-08
Updated: 2024-11-08
Comment: abuse will only be responded to by the abuse POC
Ref: https://rdap.arin.net/registry/ip/47.162.0.0
OrgName: Frontier Communications Corporation
OrgId: FCC-211
Address: 700 Hidden Ridge
City: Irving
StateProv: TX
PostalCode: 75038
Country: US
RegDate: 2015-04-02
Updated: 2023-06-01
Comment: Abuse complaints will only be responded to by the use of the abuse contact
Ref: https://rdap.arin.net/registry/entity/FCC-211
ReferralServer: rwhois://rwhois.frontiernet.net:4321
OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName: Hostmaster
OrgRoutingPhone: +1-585-777-0949
OrgRoutingEmail: hostmaster@support.ftr.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/HOSTM2146-ARIN
OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-585-623-4519
OrgAbuseEmail: abuse@support.ftr.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE223-ARIN
OrgTechHandle: ZF47-ARIN
OrgTechName: Frontier Communications
OrgTechPhone: +1-585-623-4519
OrgTechEmail: abuse@support.ftr.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZF47-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.frontiernet.net:4321.
%rwhois V-1.5:002090:00 whois.frontiernet.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:47.163.0.0/16
network:ID:NET-47-163-56-0-23
network:Network-Name:47-163-56-0-23
network:IP-Network:47.163.56.0/23
network:Org-Name;I:Universal Service Network Frontier - D - PLAN.TX
network:Street-Address:1508 K Ave
network:City:Plano
network:State:TX
network:Postal-Code:75074
network:Country-Code:US
network:Tech-Contact;I:AR905-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Abuse-Contact;I:ABUSE-FRTR
network:Updated:20260114
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
network:Auth-Area:47.163.0.0/16
network:ID:NET-47-163-0-0-16
network:Network-Name:47-163-0-0-16
network:IP-Network:47.163.0.0/16
network:Org-Name;I:Frontier Communications Solutions
network:Street-Address:120 North Plymouth Ave
network:City:Rochester
network:State:NY
network:Postal-Code:14608
network:Country-Code:US
network:Tech-Contact;I:ABUSE-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Updated:20240530
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
%ok'
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.163.56.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.163.56.200. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026030900 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 09 15:52:20 CST 2026
;; MSG SIZE rcvd: 106
200.56.163.47.in-addr.arpa domain name pointer 47-163-56-200.bng01.plan.tx.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
200.56.163.47.in-addr.arpa name = 47-163-56-200.bng01.plan.tx.frontiernet.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 171.220.242.242 | attackspam | ssh brute force |
2020-03-21 18:35:12 |
| 222.186.173.183 | attack | Mar 21 11:49:55 SilenceServices sshd[5212]: Failed password for root from 222.186.173.183 port 2704 ssh2 Mar 21 11:49:59 SilenceServices sshd[5212]: Failed password for root from 222.186.173.183 port 2704 ssh2 Mar 21 11:50:04 SilenceServices sshd[5212]: Failed password for root from 222.186.173.183 port 2704 ssh2 Mar 21 11:50:11 SilenceServices sshd[5212]: error: maximum authentication attempts exceeded for root from 222.186.173.183 port 2704 ssh2 [preauth] |
2020-03-21 18:59:26 |
| 37.187.100.50 | attackspambots | Fail2Ban Ban Triggered (2) |
2020-03-21 18:34:47 |
| 106.54.10.188 | attackbots | Mar 21 11:20:27 pkdns2 sshd\[42028\]: Invalid user XiaB from 106.54.10.188Mar 21 11:20:29 pkdns2 sshd\[42028\]: Failed password for invalid user XiaB from 106.54.10.188 port 50712 ssh2Mar 21 11:22:24 pkdns2 sshd\[42114\]: Invalid user igor from 106.54.10.188Mar 21 11:22:27 pkdns2 sshd\[42114\]: Failed password for invalid user igor from 106.54.10.188 port 44738 ssh2Mar 21 11:24:23 pkdns2 sshd\[42184\]: Invalid user em from 106.54.10.188Mar 21 11:24:24 pkdns2 sshd\[42184\]: Failed password for invalid user em from 106.54.10.188 port 38766 ssh2 ... |
2020-03-21 18:52:48 |
| 51.75.18.215 | attackbots | Mar 21 06:49:38 ns392434 sshd[14792]: Invalid user jason from 51.75.18.215 port 42074 Mar 21 06:49:38 ns392434 sshd[14792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.215 Mar 21 06:49:38 ns392434 sshd[14792]: Invalid user jason from 51.75.18.215 port 42074 Mar 21 06:49:41 ns392434 sshd[14792]: Failed password for invalid user jason from 51.75.18.215 port 42074 ssh2 Mar 21 07:00:26 ns392434 sshd[15206]: Invalid user ubuntu from 51.75.18.215 port 48094 Mar 21 07:00:26 ns392434 sshd[15206]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.18.215 Mar 21 07:00:26 ns392434 sshd[15206]: Invalid user ubuntu from 51.75.18.215 port 48094 Mar 21 07:00:28 ns392434 sshd[15206]: Failed password for invalid user ubuntu from 51.75.18.215 port 48094 ssh2 Mar 21 07:04:37 ns392434 sshd[15426]: Invalid user ando from 51.75.18.215 port 33824 |
2020-03-21 18:31:29 |
| 198.199.124.109 | attackspam | $f2bV_matches |
2020-03-21 19:03:11 |
| 42.112.108.204 | attackbotsspam | 03/20/2020-23:47:42.049216 42.112.108.204 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-03-21 18:48:02 |
| 148.66.135.178 | attackspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-03-21 18:38:58 |
| 185.202.1.75 | attack | [MK-VM4] Blocked by UFW |
2020-03-21 18:55:25 |
| 154.8.227.18 | attackspam | Invalid user zhangyan from 154.8.227.18 port 45614 |
2020-03-21 18:37:28 |
| 163.172.49.56 | attackbotsspam | Brute-force attempt banned |
2020-03-21 18:42:53 |
| 68.183.22.85 | attackbotsspam | Mar 21 11:18:05 haigwepa sshd[15095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.22.85 Mar 21 11:18:07 haigwepa sshd[15095]: Failed password for invalid user xx from 68.183.22.85 port 52494 ssh2 ... |
2020-03-21 19:04:06 |
| 91.103.27.235 | attack | Mar 21 09:58:00 xeon sshd[3489]: Failed password for invalid user gg from 91.103.27.235 port 43092 ssh2 |
2020-03-21 18:55:53 |
| 188.166.5.84 | attackbotsspam | Too many connections or unauthorized access detected from Arctic banned ip |
2020-03-21 19:16:31 |
| 106.12.182.1 | attack | Invalid user wisonadmin from 106.12.182.1 port 40422 |
2020-03-21 18:37:07 |