City: Los Angeles
Region: California
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 74.48.0.0 - 74.49.127.255
CIDR: 74.49.0.0/17, 74.48.0.0/16
NetName: TELUS-3
NetHandle: NET-74-48-0-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: TELUS Communications Inc. (TACE)
RegDate: 2006-02-09
Updated: 2021-07-15
Ref: https://rdap.arin.net/registry/ip/74.48.0.0
OrgName: TELUS Communications Inc.
OrgId: TACE
Address: 510 W Georgia St
City: Vancouver
StateProv: BC
PostalCode: V6B 2A3
Country: CA
RegDate:
Updated: 2025-10-16
Ref: https://rdap.arin.net/registry/entity/TACE
OrgAbuseHandle: AAT-ARIN
OrgAbuseName: Abuse at TELUS
OrgAbusePhone: +1-877-945-8220
OrgAbuseEmail: abuse@telus.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/AAT-ARIN
OrgTechHandle: TBOTP-ARIN
OrgTechName: TELUS BC ORG TECH POC
OrgTechPhone: +1-877-310-8324
OrgTechEmail: IPadmin@telus.com
OrgTechRef: https://rdap.arin.net/registry/entity/TBOTP-ARIN
# end
# start
NetRange: 74.48.128.0 - 74.48.191.255
CIDR: 74.48.128.0/18
NetName: MULTA-NET
NetHandle: NET-74-48-128-0-1
Parent: TELUS-3 (NET-74-48-0-0-1)
NetType: Reallocated
OriginAS:
Organization: MULTACOM CORPORATION (MULTA)
RegDate: 2023-09-28
Updated: 2023-09-28
Ref: https://rdap.arin.net/registry/ip/74.48.128.0
OrgName: MULTACOM CORPORATION
OrgId: MULTA
Address: 16654 Soledad Canyon Rd #150
City: Canyon Country
StateProv: CA
PostalCode: 91387
Country: US
RegDate: 2005-03-23
Updated: 2024-11-25
Ref: https://rdap.arin.net/registry/entity/MULTA
ReferralServer: rwhois://rwhois.multacom.com:4321
OrgAbuseHandle: ABUSE898-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-661-554-0287
OrgAbuseEmail: abuse@multacom.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE898-ARIN
OrgTechHandle: NOC1793-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-661-977-9436
OrgTechEmail: noc@multacom.com
OrgTechRef: https://rdap.arin.net/registry/entity/NOC1793-ARIN
RNOCHandle: NOC1793-ARIN
RNOCName: Network Operations Center
RNOCPhone: +1-661-977-9436
RNOCEmail: noc@multacom.com
RNOCRef: https://rdap.arin.net/registry/entity/NOC1793-ARIN
RAbuseHandle: ABUSE898-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-661-554-0287
RAbuseEmail: abuse@multacom.com
RAbuseRef: https://rdap.arin.net/registry/entity/ABUSE898-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.multacom.com:4321.
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.48.144.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39203
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;74.48.144.143. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400
;; Query time: 155 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 20:24:14 CST 2026
;; MSG SIZE rcvd: 106
b'Host 143.144.48.74.in-addr.arpa. not found: 3(NXDOMAIN)
'
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 143.144.48.74.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 69.94.158.124 | attack | Dec 30 00:14:38 |
2019-12-30 07:38:29 |
| 121.154.132.39 | attack | Unauthorized connection attempt detected from IP address 121.154.132.39 to port 23 |
2019-12-30 07:41:39 |
| 123.206.90.149 | attackspambots | Automatic report - Banned IP Access |
2019-12-30 07:19:36 |
| 190.207.224.144 | attackbots | Unauthorised access (Dec 30) SRC=190.207.224.144 LEN=52 TTL=52 ID=3712 DF TCP DPT=445 WINDOW=8192 SYN |
2019-12-30 07:39:33 |
| 218.92.0.138 | attack | Dec 30 00:08:34 dev0-dcde-rnet sshd[21102]: Failed password for root from 218.92.0.138 port 3466 ssh2 Dec 30 00:08:47 dev0-dcde-rnet sshd[21102]: error: maximum authentication attempts exceeded for root from 218.92.0.138 port 3466 ssh2 [preauth] Dec 30 00:08:53 dev0-dcde-rnet sshd[21104]: Failed password for root from 218.92.0.138 port 36224 ssh2 |
2019-12-30 07:17:13 |
| 80.211.9.178 | attackbots | Dec 30 01:03:52 server2 sshd\[26491\]: User root from 80.211.9.178 not allowed because not listed in AllowUsers Dec 30 01:03:53 server2 sshd\[26493\]: Invalid user admin from 80.211.9.178 Dec 30 01:03:53 server2 sshd\[26495\]: Invalid user admin from 80.211.9.178 Dec 30 01:03:53 server2 sshd\[26497\]: Invalid user user from 80.211.9.178 Dec 30 01:03:54 server2 sshd\[26499\]: Invalid user ubnt from 80.211.9.178 Dec 30 01:03:54 server2 sshd\[26501\]: Invalid user admin from 80.211.9.178 |
2019-12-30 07:47:12 |
| 182.18.188.132 | attackbots | Dec 29 12:16:37 : SSH login attempts with invalid user |
2019-12-30 07:38:08 |
| 79.166.136.19 | attackbotsspam | Telnet Server BruteForce Attack |
2019-12-30 07:15:58 |
| 186.31.37.203 | attackspambots | Dec 29 23:04:38 *** sshd[1286]: Invalid user quardo from 186.31.37.203 |
2019-12-30 07:18:03 |
| 220.246.26.51 | attackbotsspam | Automatic report - SSH Brute-Force Attack |
2019-12-30 07:14:03 |
| 200.46.231.146 | attackspambots | Unauthorized connection attempt detected from IP address 200.46.231.146 to port 445 |
2019-12-30 07:36:56 |
| 89.204.135.218 | attackbotsspam | Chat Spam |
2019-12-30 07:11:20 |
| 173.244.163.106 | attackspambots | Dec 27 10:22:38 *** sshd[32060]: Invalid user lampe from 173.244.163.106 Dec 27 10:22:38 *** sshd[32060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-244-163-106.xlhdns.com Dec 27 10:22:40 *** sshd[32060]: Failed password for invalid user lampe from 173.244.163.106 port 48404 ssh2 Dec 27 10:22:40 *** sshd[32060]: Received disconnect from 173.244.163.106: 11: Bye Bye [preauth] Dec 27 10:32:51 *** sshd[356]: Invalid user host from 173.244.163.106 Dec 27 10:32:51 *** sshd[356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-244-163-106.xlhdns.com Dec 27 10:32:53 *** sshd[356]: Failed password for invalid user host from 173.244.163.106 port 47584 ssh2 Dec 27 10:32:53 *** sshd[356]: Received disconnect from 173.244.163.106: 11: Bye Bye [preauth] Dec 27 10:35:17 *** sshd[593]: Invalid user dusty from 173.244.163.106 Dec 27 10:35:17 *** sshd[593]: pam_unix(sshd:auth): authentication ........ ------------------------------- |
2019-12-30 07:20:43 |
| 170.106.1.121 | attack | 170.106.1.121 - - \[30/Dec/2019:00:04:51 +0100\] "GET /TP/public/index.php HTTP/1.1" 403 465 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 6.0\;en-US\; rv:1.9.2\) Gecko/20100115 Firefox/3.6\)" 170.106.1.121 - - \[30/Dec/2019:00:04:51 +0100\] "GET /TP/index.php HTTP/1.1" 403 458 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 6.0\;en-US\; rv:1.9.2\) Gecko/20100115 Firefox/3.6\)" 170.106.1.121 - - \[30/Dec/2019:00:04:51 +0100\] "GET /thinkphp/html/public/index.php HTTP/1.1" 403 476 "-" "Mozilla/5.0 \(Windows\; U\; Windows NT 6.0\;en-US\; rv:1.9.2\) Gecko/20100115 Firefox/3.6\)" ... |
2019-12-30 07:11:06 |
| 176.10.104.240 | attackbotsspam | Automatic report - Banned IP Access |
2019-12-30 07:12:21 |