城市(city): La Puente
省份(region): California
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 47.136.0.0 - 47.181.255.255
CIDR: 47.180.0.0/15, 47.136.0.0/13, 47.160.0.0/12, 47.144.0.0/12, 47.176.0.0/14
NetName: FCC-212
NetHandle: NET-47-136-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Frontier Communications Corporation (FCC-212)
RegDate: 2015-08-28
Updated: 2015-08-28
Ref: https://rdap.arin.net/registry/ip/47.136.0.0
OrgName: Frontier Communications Corporation
OrgId: FCC-212
Address: 1400 E PHILLIPS BLVD
City: POMONA
StateProv: CA
PostalCode: 91766
Country: US
RegDate: 2015-04-02
Updated: 2023-06-01
Comment: Abuse complaints will only be responded to by the use of the abuse contact
Ref: https://rdap.arin.net/registry/entity/FCC-212
ReferralServer: rwhois://rwhois.frontiernet.net:4321
OrgTechHandle: ZF47-ARIN
OrgTechName: Frontier Communications
OrgTechPhone: +1-585-623-4519
OrgTechEmail: abuse@support.ftr.com
OrgTechRef: https://rdap.arin.net/registry/entity/ZF47-ARIN
OrgAbuseHandle: ABUSE223-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-877-474-7876
OrgAbuseEmail: abuse@support.ftr.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE223-ARIN
OrgRoutingHandle: HOSTM2146-ARIN
OrgRoutingName: Hostmaster
OrgRoutingPhone: +1-585-777-0949
OrgRoutingEmail: hostmaster@support.ftr.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/HOSTM2146-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Found a referral to rwhois.frontiernet.net:4321.
%rwhois V-1.5:002090:00 whois.frontiernet.net (by Network Solutions, Inc. V-1.5.9.6)
network:Auth-Area:47.144.0.0/13
network:ID:NET-47-147-0-0-19
network:Network-Name:47-147-0-0-19
network:IP-Network:47.147.0.0/19
network:Org-Name;I:FTR3 FiberOptic-D La Puente CA
network:Street-Address:15884 E Workman St
network:City:LA PUENTE
network:State:CA
network:Postal-Code:91744
network:Country-Code:US
network:Tech-Contact;I:AR259-FRTR
network:Updated:20160714
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
network:Auth-Area:47.144.0.0/13
network:ID:NET-47-144-0-0-13
network:Network-Name:47-144-0-0-13
network:IP-Network:47.144.0.0/13
network:Org-Name;I:Frontier Communications Solutions
network:Street-Address:120 North Plymouth Ave
network:City:Rochester
network:State:NY
network:Postal-Code:14608
network:Country-Code:US
network:Tech-Contact;I:ABUSE-FRTR
network:Admin-Contact;I:IPADMIN-FRTR
network:Updated:20160520
network:Updated-By:ipadmin@support.ftr.com
network:Class-Name:network
%ok
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.147.0.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11810
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;47.147.0.242. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026050500 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 06 00:53:40 CST 2026
;; MSG SIZE rcvd: 105
242.0.147.47.in-addr.arpa domain name pointer 47-147-0-242.lsan.ca.frontiernet.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
242.0.147.47.in-addr.arpa name = 47-147-0-242.lsan.ca.frontiernet.net.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 134.73.129.127 | attackbots | Brute force SMTP login attempted. ... |
2019-08-10 05:00:06 |
| 37.79.151.99 | attack | Lines containing failures of 37.79.151.99 Aug 9 19:12:45 install sshd[25574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.79.151.99 user=r.r Aug 9 19:12:47 install sshd[25574]: Failed password for r.r from 37.79.151.99 port 55658 ssh2 Aug 9 19:12:48 install sshd[25574]: Failed password for r.r from 37.79.151.99 port 55658 ssh2 ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=37.79.151.99 |
2019-08-10 04:53:35 |
| 173.164.173.36 | attack | Invalid user ssh-user from 173.164.173.36 port 40374 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36 Failed password for invalid user ssh-user from 173.164.173.36 port 40374 ssh2 pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.164.173.36 user=root Failed password for root from 173.164.173.36 port 34082 ssh2 |
2019-08-10 05:08:10 |
| 134.209.84.42 | attackbotsspam | Brute force SMTP login attempted. ... |
2019-08-10 05:09:24 |
| 187.167.192.12 | attackspambots | Automatic report - Port Scan Attack |
2019-08-10 05:25:20 |
| 178.62.108.111 | attackspam | Automatic report - Banned IP Access |
2019-08-10 05:13:14 |
| 118.34.12.35 | attack | Automatic report - Banned IP Access |
2019-08-10 05:25:04 |
| 134.209.90.139 | attackspam | Brute force SMTP login attempted. ... |
2019-08-10 05:08:37 |
| 134.73.129.208 | attack | Brute force SMTP login attempted. ... |
2019-08-10 04:46:29 |
| 210.219.151.187 | attackspam | vps1:sshd-InvalidUser |
2019-08-10 05:21:00 |
| 159.65.3.197 | attackbotsspam | Aug 9 19:17:59 shared05 sshd[2578]: Invalid user tranz from 159.65.3.197 Aug 9 19:17:59 shared05 sshd[2578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.3.197 Aug 9 19:18:01 shared05 sshd[2578]: Failed password for invalid user tranz from 159.65.3.197 port 44122 ssh2 Aug 9 19:18:01 shared05 sshd[2578]: Received disconnect from 159.65.3.197 port 44122:11: Bye Bye [preauth] Aug 9 19:18:01 shared05 sshd[2578]: Disconnected from 159.65.3.197 port 44122 [preauth] ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=159.65.3.197 |
2019-08-10 05:20:37 |
| 134.73.129.196 | attack | Brute force SMTP login attempted. ... |
2019-08-10 04:47:33 |
| 84.72.10.172 | attackspambots | Aug 9 17:06:52 raspberrypi sshd\[8725\]: Invalid user ariane from 84.72.10.172Aug 9 17:06:54 raspberrypi sshd\[8725\]: Failed password for invalid user ariane from 84.72.10.172 port 58214 ssh2Aug 9 17:32:27 raspberrypi sshd\[9204\]: Invalid user jerald from 84.72.10.172 ... |
2019-08-10 05:12:54 |
| 134.209.74.77 | attackspam | Brute force SMTP login attempted. ... |
2019-08-10 05:13:35 |
| 162.144.84.235 | attackbots | xmlrpc attack |
2019-08-10 04:59:26 |