City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 74.114.54.0 - 74.114.55.255
CIDR: 74.114.54.0/23
NetName: GLOBALHOST1
NetHandle: NET-74-114-54-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GLOBALHOSTINGSOLUTIONS INC (GLOBA-425)
RegDate: 2017-09-20
Updated: 2018-01-03
Ref: https://rdap.arin.net/registry/ip/74.114.54.0
OrgName: GLOBALHOSTINGSOLUTIONS INC
OrgId: GLOBA-425
Address: 75A Lake RD Office 171
City: Congerg
StateProv: NY
PostalCode: 10920
Country: US
RegDate: 2016-07-21
Updated: 2016-09-26
Ref: https://rdap.arin.net/registry/entity/GLOBA-425
ReferralServer: rwhois://rwhois.globalhostingsolutionsinc.com:4321
OrgNOCHandle: NETWO7856-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-201-719-9899
OrgNOCEmail: noc@globalhostingsolutionsinc.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO7856-ARIN
OrgTechHandle: NETWO7856-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-201-719-9899
OrgTechEmail: noc@globalhostingsolutionsinc.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO7856-ARIN
OrgAbuseHandle: ABUSE5565-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-201-719-9899
OrgAbuseEmail: abuse@globalhostingsolutionsinc.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE5565-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.globalhostingsolutionsinc.com:4321.
%rwhois V-1.5:003eff:00 rwhois.globalhostingsolutionsinc.com (by Network Solutions, Inc. V-1.5.9.6)
network:Class-Name:network
network:ID:globalhostingsolutionsinc 74.114.54.0/23
network:Auth-Area:74.114.54.0/23
network:Network-Name:Michael Robertson-74.114.54.71
network:IP-Network:74.114.54.71/32
network:IP-Network-Block:74.114.54.71-74.114.54.71
network:Organization;I:Michael Robertson
network:Street-Address:1901 Discovery Village Lane
network:Tech-Contact;I:Private
network:Admin-Contact;I:Private
network:Created:20170315
network:Updated:20170315
network:Class-Name:network
network:ID:globalhostingsolutionsinc 74.114.54.0/23
network:Auth-Area:74.114.54.0/23
network:Network-Name:globalhostingsolutionsinc-74.114.54.0
network:IP-Network:74.114.54.0/23
network:IP-Network-Block:74.114.54.0-74.114.55.255
network:Organization;I:globalhostingsolutionsinc
network:Street-Address:75A Lake RD Office 171 10920
network:Tech-Contact;I:noc@globalhostingsolutionsinc.com
network:Admin-Contact;I:noc@globalhostingsolutionsinc.com
network:Created:20130315
network:Updated:20130315
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.114.54.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25302
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.114.54.71. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033100 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 15:09:20 CST 2026
;; MSG SIZE rcvd: 105
Host 71.54.114.74.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 71.54.114.74.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 83.103.98.211 | attackbotsspam | Nov 4 07:33:25 sauna sshd[216953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=83.103.98.211 Nov 4 07:33:27 sauna sshd[216953]: Failed password for invalid user eryn from 83.103.98.211 port 60058 ssh2 ... |
2019-11-04 13:40:22 |
| 71.6.232.6 | attack | " " |
2019-11-04 13:02:41 |
| 207.154.218.16 | attackbotsspam | $f2bV_matches |
2019-11-04 13:13:58 |
| 212.20.4.181 | attackspam | Chat Spam |
2019-11-04 13:38:59 |
| 111.231.54.33 | attackspambots | Nov 4 06:10:40 vps691689 sshd[19369]: Failed password for root from 111.231.54.33 port 56894 ssh2 Nov 4 06:15:17 vps691689 sshd[19437]: Failed password for root from 111.231.54.33 port 36766 ssh2 ... |
2019-11-04 13:24:07 |
| 51.75.163.218 | attackbots | Nov 4 02:16:25 server sshd\[11938\]: Invalid user rf from 51.75.163.218 Nov 4 02:16:25 server sshd\[11938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-51-75-163.eu Nov 4 02:16:27 server sshd\[11938\]: Failed password for invalid user rf from 51.75.163.218 port 33266 ssh2 Nov 4 02:22:21 server sshd\[13579\]: Invalid user tomcat from 51.75.163.218 Nov 4 02:22:21 server sshd\[13579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.ip-51-75-163.eu ... |
2019-11-04 08:05:48 |
| 80.211.245.103 | attackspambots | $f2bV_matches |
2019-11-04 13:28:59 |
| 51.68.214.134 | attackspam | xmlrpc attack |
2019-11-04 13:18:47 |
| 51.254.220.20 | attackbots | Nov 4 05:53:33 SilenceServices sshd[16647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 Nov 4 05:53:35 SilenceServices sshd[16647]: Failed password for invalid user as3662202 from 51.254.220.20 port 32825 ssh2 Nov 4 05:57:17 SilenceServices sshd[17679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20 |
2019-11-04 13:13:13 |
| 5.45.6.66 | attackbotsspam | 2019-11-04 06:04:39,447 fail2ban.actions: WARNING [ssh] Ban 5.45.6.66 |
2019-11-04 13:13:34 |
| 173.249.35.163 | attackbots | Automatic report - Banned IP Access |
2019-11-04 13:36:51 |
| 222.186.180.147 | attack | 2019-11-04T05:08:14.113825shield sshd\[31359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.147 user=root 2019-11-04T05:08:16.512997shield sshd\[31359\]: Failed password for root from 222.186.180.147 port 16814 ssh2 2019-11-04T05:08:21.065255shield sshd\[31359\]: Failed password for root from 222.186.180.147 port 16814 ssh2 2019-11-04T05:08:25.312401shield sshd\[31359\]: Failed password for root from 222.186.180.147 port 16814 ssh2 2019-11-04T05:08:29.439228shield sshd\[31359\]: Failed password for root from 222.186.180.147 port 16814 ssh2 |
2019-11-04 13:15:58 |
| 117.220.228.2 | attack | Unauthorised access (Nov 4) SRC=117.220.228.2 LEN=52 PREC=0x20 TTL=111 ID=8431 DF TCP DPT=445 WINDOW=8192 SYN |
2019-11-04 13:29:18 |
| 114.45.146.30 | attack | Portscan detected |
2019-11-04 08:07:55 |
| 51.77.157.78 | attack | Nov 4 05:53:46 MK-Soft-VM6 sshd[19199]: Failed password for root from 51.77.157.78 port 33680 ssh2 ... |
2019-11-04 13:03:04 |