City: Pinon
Region: Arizona
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 74.32.0.0 - 74.47.255.255
CIDR: 74.32.0.0/12
NetName: FRONTIER-COMMUNICATIONS
NetHandle: NET-74-32-0-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Frontier Communications of America, Inc. (FRTR)
RegDate: 2006-01-27
Updated: 2012-02-24
Comment: All abuse complaints for this block will only be
Comment: answered by the Frontier abuse team and not the ELI abuse team. Use
Comment: contact info from Handle ABUSE223-ARIN.
Ref: https://rdap.arin.net/registry/ip/74.32.0.0
OrgName: Frontier Communications of America, Inc.
OrgId: FRTR
Address: 95 Fitzhugh St N
City: Rochester
StateProv: NY
PostalCode: 14614
Country: US
RegDate: 1996-05-09
Updated: 2024-01-19
Comment: Abuse complaints will only be responded to by the use of the abuse contact.
Ref: https://rdap.arin.net/registry/entity/FRTR
ReferralServer: rwhois://rwhois.frontiernet.net:4321
OrgTechHandle: ZF47-ARIN
OrgTechName: Frontier Communications
OrgTechPhone: +1-585-623-4519
OrgTechEmail: abuse@support.ftr.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZF47-ARIN
OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-585-623-4519
OrgAbuseEmail: abuse@support.ftr.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE223-ARIN
OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName: Hostmaster
OrgRoutingPhone: +1-585-777-0949
OrgRoutingEmail: hostmaster@support.ftr.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/HOSTM2146-ARIN
RAbuseHandle: ABUSE223-ARIN
RAbuseName: Abuse
RAbusePhone: +1-585-623-4519
RAbuseEmail: abuse@support.ftr.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE223-ARIN
RTechHandle: ZF47-ARIN
RTechName: Frontier Communications
RTechPhone: +1-585-623-4519
RTechEmail: abuse@support.ftr.com
RTechRef: https://rdap.arin.net/registry/entity/ZF47-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.frontiernet.net:4321.
%rwhois V-1.5:002090:00 whois.frontiernet.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:74.40.0.0/15
network:ID:NET-74-41-152-0-21
network:Network-Name:74-41-152-0-21
network:IP-Network:74.41.152.0/21
network:Org-Name;I:BDSL Frontier Communications Show Low AZ
network:Street-Address:831 Hall Street
network:City:Show Low
network:State:AZ
network:Postal-Code:85901
network:Country-Code:US
network:Tech-Contact;I:NS248-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Abuse-Contact;I:ABUSE-FRTR
network:Updated:20060302
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
network:Auth-Area:74.40.0.0/15
network:ID:NET-74-40-0-0-15
network:Network-Name:74-40-0-0-15
network:IP-Network:74.40.0.0/15
network:Org-Name;I:Frontier Communications Solutions
network:Street-Address:120 North Plymouth Ave
network:City:Rochester
network:State:NY
network:Postal-Code:14608
network:Country-Code:US
network:Tech-Contact;I:ABUSE-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Updated:20060201
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.41.154.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11522
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.41.154.158. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400
;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 21:25:43 CST 2026
;; MSG SIZE rcvd: 106
158.154.41.74.in-addr.arpa domain name pointer static-74-41-154-158.br1.sho.az.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
158.154.41.74.in-addr.arpa name = static-74-41-154-158.br1.sho.az.frontiernet.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 51.83.74.158 | attackspam | Jun 28 07:15:21 srv03 sshd\[14890\]: Invalid user putty from 51.83.74.158 port 50519 Jun 28 07:15:21 srv03 sshd\[14890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.74.158 Jun 28 07:15:23 srv03 sshd\[14890\]: Failed password for invalid user putty from 51.83.74.158 port 50519 ssh2 |
2019-06-28 15:15:39 |
| 59.1.116.20 | attackspambots | Jun 28 07:16:07 mail sshd\[29724\]: Invalid user user from 59.1.116.20 Jun 28 07:16:07 mail sshd\[29724\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.1.116.20 Jun 28 07:16:09 mail sshd\[29724\]: Failed password for invalid user user from 59.1.116.20 port 43684 ssh2 ... |
2019-06-28 14:54:29 |
| 193.112.253.182 | attackbots | [FriJun2807:15:56.8140132019][:error][pid6261:tid47523494393600][client193.112.253.182:54848][client193.112.253.182]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"390"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"ledpiu.ch"][uri"/wp-content/plugins/xt-woo-quick-view-lite/README.txt"][unique_id"XRWijH6Mstti-bzjhFsshgAAAFU"][FriJun2807:16:04.3161252019][:error][pid6262:tid47523485988608][client193.112.253.182:55077][client193.112.253.182]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"390"][id"397989"][rev"1"][m |
2019-06-28 14:56:10 |
| 191.240.24.136 | attackbots | Brute force attempt |
2019-06-28 15:28:35 |
| 124.178.233.118 | attackspambots | Attempted SSH login |
2019-06-28 15:28:00 |
| 58.59.2.26 | attack | Jun 28 **REMOVED** sshd\[32657\]: Invalid user demon from 58.59.2.26 Jun 28 **REMOVED** sshd\[32666\]: Invalid user vmail from 58.59.2.26 Jun 28 **REMOVED** sshd\[32675\]: Invalid user nagios from 58.59.2.26 |
2019-06-28 15:32:44 |
| 14.248.83.163 | attackbotsspam | Jun 28 08:40:39 dedicated sshd[23343]: Invalid user spot from 14.248.83.163 port 44378 Jun 28 08:40:41 dedicated sshd[23343]: Failed password for invalid user spot from 14.248.83.163 port 44378 ssh2 Jun 28 08:40:39 dedicated sshd[23343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.248.83.163 Jun 28 08:40:39 dedicated sshd[23343]: Invalid user spot from 14.248.83.163 port 44378 Jun 28 08:40:41 dedicated sshd[23343]: Failed password for invalid user spot from 14.248.83.163 port 44378 ssh2 |
2019-06-28 14:43:45 |
| 218.92.0.145 | attackbotsspam | Automatic report - Web App Attack |
2019-06-28 15:08:49 |
| 216.144.251.86 | attackspam | Brute force attempt |
2019-06-28 15:23:26 |
| 68.183.122.211 | attack | Muieblackcat Scanner Remote Code Injection Vulnerability, PTR: PTR record not found |
2019-06-28 14:47:40 |
| 190.144.161.10 | attackspambots | Jun 28 08:10:18 OPSO sshd\[22511\]: Invalid user admin1 from 190.144.161.10 port 50838 Jun 28 08:10:18 OPSO sshd\[22511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.161.10 Jun 28 08:10:20 OPSO sshd\[22511\]: Failed password for invalid user admin1 from 190.144.161.10 port 50838 ssh2 Jun 28 08:11:54 OPSO sshd\[22569\]: Invalid user sk from 190.144.161.10 port 39220 Jun 28 08:11:54 OPSO sshd\[22569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.144.161.10 |
2019-06-28 15:09:50 |
| 210.179.126.136 | attackspam | Jun 28 07:15:20 lnxweb61 sshd[25596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.179.126.136 |
2019-06-28 15:16:07 |
| 37.187.117.187 | attackspambots | SSH invalid-user multiple login attempts |
2019-06-28 15:24:53 |
| 158.69.198.102 | attackspam | Reported by AbuseIPDB proxy server. |
2019-06-28 14:44:15 |
| 91.121.222.157 | attackspam | Drupal Core Remote Code Execution Vulnerability, PTR: ns319164.ip-91-121-222.eu. |
2019-06-28 14:50:27 |