Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 28.214.141.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;28.214.141.50.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 06:48:32 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 50.141.214.28.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.141.214.28.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.98.130.59 attackspam
1596945311 - 08/09/2020 05:55:11 Host: 46.98.130.59/46.98.130.59 Port: 23 TCP Blocked
2020-08-09 12:58:10
49.88.112.73 attack
Aug  9 05:12:05 onepixel sshd[703197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73  user=root
Aug  9 05:12:07 onepixel sshd[703197]: Failed password for root from 49.88.112.73 port 41374 ssh2
Aug  9 05:12:05 onepixel sshd[703197]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73  user=root
Aug  9 05:12:07 onepixel sshd[703197]: Failed password for root from 49.88.112.73 port 41374 ssh2
Aug  9 05:12:11 onepixel sshd[703197]: Failed password for root from 49.88.112.73 port 41374 ssh2
2020-08-09 13:13:19
134.209.236.191 attack
SSH brutforce
2020-08-09 13:12:44
45.71.219.248 attack
*Port Scan* detected from 45.71.219.248 (BR/Brazil/Mato Grosso/Cuiabá/sgv-248-bgp219.sgvtelecom.com.br). 4 hits in the last 215 seconds
2020-08-09 13:04:33
46.101.61.207 attack
xmlrpc attack
2020-08-09 12:51:34
51.83.134.233 attackspam
Aug  9 05:48:33 amit sshd\[28157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.134.233  user=root
Aug  9 05:48:35 amit sshd\[28157\]: Failed password for root from 51.83.134.233 port 39056 ssh2
Aug  9 05:56:14 amit sshd\[30513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.134.233  user=root
...
2020-08-09 13:01:37
61.177.172.61 attackbots
Aug  9 06:33:10 vps639187 sshd\[22697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61  user=root
Aug  9 06:33:13 vps639187 sshd\[22697\]: Failed password for root from 61.177.172.61 port 64069 ssh2
Aug  9 06:33:16 vps639187 sshd\[22697\]: Failed password for root from 61.177.172.61 port 64069 ssh2
...
2020-08-09 12:35:39
107.175.33.240 attack
Aug  9 07:00:00 vpn01 sshd[15744]: Failed password for root from 107.175.33.240 port 39486 ssh2
...
2020-08-09 13:08:59
117.60.90.217 attack
Aug  9 05:55:04 vserver sshd\[20663\]: Invalid user misp from 117.60.90.217Aug  9 05:55:07 vserver sshd\[20663\]: Failed password for invalid user misp from 117.60.90.217 port 47915 ssh2Aug  9 05:55:13 vserver sshd\[20667\]: Invalid user osbash from 117.60.90.217Aug  9 05:55:14 vserver sshd\[20667\]: Failed password for invalid user osbash from 117.60.90.217 port 51843 ssh2
...
2020-08-09 12:52:49
81.130.234.235 attack
SSH brutforce
2020-08-09 12:35:14
149.202.79.125 attackbots
Port scan: Attack repeated for 24 hours
2020-08-09 12:46:00
183.103.115.2 attackbotsspam
SSH Bruteforce
2020-08-09 12:43:56
49.88.112.65 attack
2020-08-09T04:00:13.963321abusebot-6.cloudsearch.cf sshd[3208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-08-09T04:00:15.486407abusebot-6.cloudsearch.cf sshd[3208]: Failed password for root from 49.88.112.65 port 35394 ssh2
2020-08-09T04:00:17.848788abusebot-6.cloudsearch.cf sshd[3208]: Failed password for root from 49.88.112.65 port 35394 ssh2
2020-08-09T04:00:13.963321abusebot-6.cloudsearch.cf sshd[3208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.65  user=root
2020-08-09T04:00:15.486407abusebot-6.cloudsearch.cf sshd[3208]: Failed password for root from 49.88.112.65 port 35394 ssh2
2020-08-09T04:00:17.848788abusebot-6.cloudsearch.cf sshd[3208]: Failed password for root from 49.88.112.65 port 35394 ssh2
2020-08-09T04:00:13.963321abusebot-6.cloudsearch.cf sshd[3208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.8
...
2020-08-09 12:42:27
111.229.16.97 attackspam
(sshd) Failed SSH login from 111.229.16.97 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Aug  9 05:33:15 amsweb01 sshd[3544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.97  user=root
Aug  9 05:33:17 amsweb01 sshd[3544]: Failed password for root from 111.229.16.97 port 41652 ssh2
Aug  9 05:49:12 amsweb01 sshd[5837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.97  user=root
Aug  9 05:49:14 amsweb01 sshd[5837]: Failed password for root from 111.229.16.97 port 36506 ssh2
Aug  9 05:55:10 amsweb01 sshd[6765]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.16.97  user=root
2020-08-09 12:55:08
46.98.173.184 attackspam
1596945321 - 08/09/2020 05:55:21 Host: 46.98.173.184/46.98.173.184 Port: 445 TCP Blocked
2020-08-09 12:47:36

Recently Reported IPs

150.12.2.182 83.88.213.4 137.20.132.183 122.126.187.161
55.249.172.140 143.197.138.124 242.201.7.0 124.65.252.75
152.77.248.68 192.52.90.189 117.178.186.227 233.86.107.255
162.222.59.162 241.216.165.161 116.139.14.52 119.47.190.253
30.39.46.53 17.61.143.159 222.178.134.222 216.19.220.178