Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Charter Communications Inc

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
2020-09-25T00:52:43.658829hostname sshd[72807]: Failed password for invalid user kiosk from 47.50.246.114 port 35442 ssh2
...
2020-09-26 02:37:18
attack
Invalid user freeswitch from 47.50.246.114 port 35252
2020-09-25 18:22:52
attack
Aug 15 22:46:56 kh-dev-server sshd[13952]: Failed password for root from 47.50.246.114 port 45734 ssh2
...
2020-08-16 04:58:57
attack
2020-07-24T23:58:12.106801vps773228.ovh.net sshd[7143]: Invalid user backup from 47.50.246.114 port 60134
2020-07-24T23:58:12.125770vps773228.ovh.net sshd[7143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-050-246-114.biz.spectrum.com
2020-07-24T23:58:12.106801vps773228.ovh.net sshd[7143]: Invalid user backup from 47.50.246.114 port 60134
2020-07-24T23:58:14.849996vps773228.ovh.net sshd[7143]: Failed password for invalid user backup from 47.50.246.114 port 60134 ssh2
2020-07-25T00:03:34.440958vps773228.ovh.net sshd[7257]: Invalid user ubuntu from 47.50.246.114 port 39328
...
2020-07-25 06:44:56
attack
Jul 24 05:52:33 rush sshd[8401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
Jul 24 05:52:36 rush sshd[8401]: Failed password for invalid user deva from 47.50.246.114 port 53284 ssh2
Jul 24 05:57:22 rush sshd[8549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
...
2020-07-24 13:58:05
attackbots
Invalid user sophia from 47.50.246.114 port 50526
2020-07-19 06:05:39
attackbots
Jul 16 18:22:29 NPSTNNYC01T sshd[10235]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
Jul 16 18:22:31 NPSTNNYC01T sshd[10235]: Failed password for invalid user mariusz from 47.50.246.114 port 45722 ssh2
Jul 16 18:27:03 NPSTNNYC01T sshd[10635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
...
2020-07-17 06:29:23
attackspam
Jul 16 17:02:59 home sshd[17220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
Jul 16 17:03:01 home sshd[17220]: Failed password for invalid user unt from 47.50.246.114 port 54214 ssh2
Jul 16 17:08:08 home sshd[17764]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
...
2020-07-17 00:46:10
attackspam
Invalid user fbm from 47.50.246.114 port 50240
2020-07-16 16:37:17
attackbotsspam
Invalid user vipul from 47.50.246.114 port 49720
2020-07-16 07:14:07
attackspam
Jul 11 17:50:54 ajax sshd[27766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114 
Jul 11 17:50:55 ajax sshd[27766]: Failed password for invalid user luc from 47.50.246.114 port 44662 ssh2
2020-07-12 02:14:24
attackbots
$f2bV_matches
2020-07-07 05:29:12
attackbots
Jun 19 22:58:48 vps687878 sshd\[1623\]: Failed password for nagios from 47.50.246.114 port 34590 ssh2
Jun 19 23:02:10 vps687878 sshd\[2025\]: Invalid user administrator from 47.50.246.114 port 34506
Jun 19 23:02:10 vps687878 sshd\[2025\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
Jun 19 23:02:12 vps687878 sshd\[2025\]: Failed password for invalid user administrator from 47.50.246.114 port 34506 ssh2
Jun 19 23:05:33 vps687878 sshd\[2287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114  user=root
...
2020-06-20 05:07:43
attack
Jun 15 07:28:20 hosting sshd[6325]: Invalid user examen from 47.50.246.114 port 57110
...
2020-06-15 13:19:17
attackbotsspam
Jun 13 15:36:11 cdc sshd[20630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114 
Jun 13 15:36:12 cdc sshd[20630]: Failed password for invalid user rougemont from 47.50.246.114 port 43300 ssh2
2020-06-13 23:51:48
attack
2020-06-06T16:02:28.052174  sshd[4626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114  user=root
2020-06-06T16:02:30.509419  sshd[4626]: Failed password for root from 47.50.246.114 port 51176 ssh2
2020-06-06T16:06:04.195039  sshd[4690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114  user=root
2020-06-06T16:06:05.969990  sshd[4690]: Failed password for root from 47.50.246.114 port 36668 ssh2
...
2020-06-07 01:24:05
attackbotsspam
May 25 00:11:54 askasleikir sshd[57274]: Failed password for root from 47.50.246.114 port 52718 ssh2
May 25 00:13:30 askasleikir sshd[57282]: Failed password for invalid user louisa.morgan from 47.50.246.114 port 50338 ssh2
May 25 00:08:22 askasleikir sshd[57263]: Failed password for invalid user asplin from 47.50.246.114 port 35792 ssh2
2020-05-25 13:18:06
attackbotsspam
May  8 03:52:39 vlre-nyc-1 sshd\[30738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114  user=irc
May  8 03:52:41 vlre-nyc-1 sshd\[30738\]: Failed password for irc from 47.50.246.114 port 48062 ssh2
May  8 03:56:59 vlre-nyc-1 sshd\[30805\]: Invalid user store from 47.50.246.114
May  8 03:56:59 vlre-nyc-1 sshd\[30805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
May  8 03:57:01 vlre-nyc-1 sshd\[30805\]: Failed password for invalid user store from 47.50.246.114 port 57300 ssh2
...
2020-05-08 13:42:07
attackspambots
Apr 24 10:36:24 NPSTNNYC01T sshd[19967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114
Apr 24 10:36:25 NPSTNNYC01T sshd[19967]: Failed password for invalid user ou from 47.50.246.114 port 45332 ssh2
Apr 24 10:40:32 NPSTNNYC01T sshd[20567]: Failed password for root from 47.50.246.114 port 51530 ssh2
...
2020-04-25 00:43:14
attackspambots
Apr 24 06:27:19 hcbbdb sshd\[15637\]: Invalid user hg from 47.50.246.114
Apr 24 06:27:19 hcbbdb sshd\[15637\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-050-246-114.biz.spectrum.com
Apr 24 06:27:20 hcbbdb sshd\[15637\]: Failed password for invalid user hg from 47.50.246.114 port 48438 ssh2
Apr 24 06:31:33 hcbbdb sshd\[16043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-050-246-114.biz.spectrum.com  user=root
Apr 24 06:31:35 hcbbdb sshd\[16043\]: Failed password for root from 47.50.246.114 port 33690 ssh2
2020-04-24 14:57:38
attackspam
2020-04-18T04:04:51.712931abusebot-6.cloudsearch.cf sshd[8908]: Invalid user postgresql from 47.50.246.114 port 53354
2020-04-18T04:04:51.719780abusebot-6.cloudsearch.cf sshd[8908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-050-246-114.biz.spectrum.com
2020-04-18T04:04:51.712931abusebot-6.cloudsearch.cf sshd[8908]: Invalid user postgresql from 47.50.246.114 port 53354
2020-04-18T04:04:53.759610abusebot-6.cloudsearch.cf sshd[8908]: Failed password for invalid user postgresql from 47.50.246.114 port 53354 ssh2
2020-04-18T04:08:54.511656abusebot-6.cloudsearch.cf sshd[9176]: Invalid user b from 47.50.246.114 port 34032
2020-04-18T04:08:54.517750abusebot-6.cloudsearch.cf sshd[9176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-050-246-114.biz.spectrum.com
2020-04-18T04:08:54.511656abusebot-6.cloudsearch.cf sshd[9176]: Invalid user b from 47.50.246.114 port 34032
2020-04-18T04:08:56.582702abusebo
...
2020-04-18 13:14:36
attack
SSH Invalid Login
2020-04-08 07:44:20
attack
Invalid user uos from 47.50.246.114 port 59122
2020-03-30 20:30:28
attack
(sshd) Failed SSH login from 47.50.246.114 (US/United States/047-050-246-114.biz.spectrum.com): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 28 22:31:06 elude sshd[2169]: Invalid user xmm from 47.50.246.114 port 52056
Mar 28 22:31:08 elude sshd[2169]: Failed password for invalid user xmm from 47.50.246.114 port 52056 ssh2
Mar 28 22:36:04 elude sshd[2395]: Invalid user ym from 47.50.246.114 port 46732
Mar 28 22:36:06 elude sshd[2395]: Failed password for invalid user ym from 47.50.246.114 port 46732 ssh2
Mar 28 22:40:15 elude sshd[2673]: Invalid user aht from 47.50.246.114 port 58828
2020-03-29 08:29:34
attack
Mar 25 13:50:58 mailserver sshd\[25137\]: Invalid user serazetdinov from 47.50.246.114
...
2020-03-25 21:17:52
attack
Ssh brute force
2020-03-25 10:01:32
attack
Mar 24 18:58:49 163-172-32-151 sshd[3966]: Invalid user anhtuan from 47.50.246.114 port 45946
...
2020-03-25 02:04:50
attackbotsspam
B: ssh repeated attack for invalid user
2020-03-23 19:35:45
attackbotsspam
Mar 18 19:07:57 santamaria sshd\[22995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114  user=root
Mar 18 19:07:59 santamaria sshd\[22995\]: Failed password for root from 47.50.246.114 port 37276 ssh2
Mar 18 19:10:18 santamaria sshd\[23102\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.50.246.114  user=root
...
2020-03-19 02:57:47
attackspambots
Mar 16 20:31:27 v22018053744266470 sshd[18371]: Failed password for root from 47.50.246.114 port 59970 ssh2
Mar 16 20:34:13 v22018053744266470 sshd[18660]: Failed password for root from 47.50.246.114 port 37262 ssh2
Mar 16 20:37:00 v22018053744266470 sshd[18933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=047-050-246-114.biz.spectrum.com
...
2020-03-17 07:00:28
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.50.246.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;47.50.246.114.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011200 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 12 22:20:33 CST 2020
;; MSG SIZE  rcvd: 117
Host info
114.246.50.47.in-addr.arpa domain name pointer 047-050-246-114.biz.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.246.50.47.in-addr.arpa	name = 047-050-246-114.biz.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
190.18.176.107 attack
Nov 29 18:36:43 microserver sshd[64689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.18.176.107  user=backup
Nov 29 18:36:45 microserver sshd[64689]: Failed password for backup from 190.18.176.107 port 39590 ssh2
Nov 29 18:36:55 microserver sshd[64702]: Invalid user test1 from 190.18.176.107 port 39968
Nov 29 18:36:55 microserver sshd[64702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.18.176.107
Nov 29 18:36:56 microserver sshd[64702]: Failed password for invalid user test1 from 190.18.176.107 port 39968 ssh2
Nov 29 18:49:29 microserver sshd[1363]: Invalid user www from 190.18.176.107 port 39660
Nov 29 18:49:29 microserver sshd[1363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.18.176.107
Nov 29 18:49:31 microserver sshd[1363]: Failed password for invalid user www from 190.18.176.107 port 39660 ssh2
Nov 29 18:49:40 microserver sshd[1389]: Invalid user administrator f
2019-11-30 01:04:47
193.194.80.101 attack
Failed RDP login
2019-11-30 00:35:37
23.129.64.100 attack
proto=tcp  .  spt=37627  .  dpt=25  .     (Found on   The Onion Router Exit Node)     (558)
2019-11-30 00:32:15
58.56.76.166 attackbotsspam
Failed RDP login
2019-11-30 00:48:28
192.160.102.169 attackbotsspam
Unauthorized IMAP connection attempt
2019-11-30 01:06:58
36.72.143.91 attackbotsspam
2019-11-29T16:56:02.508866  sshd[13515]: Invalid user test from 36.72.143.91 port 37966
2019-11-29T16:56:02.523087  sshd[13515]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.72.143.91
2019-11-29T16:56:02.508866  sshd[13515]: Invalid user test from 36.72.143.91 port 37966
2019-11-29T16:56:04.868862  sshd[13515]: Failed password for invalid user test from 36.72.143.91 port 37966 ssh2
2019-11-29T17:00:17.664233  sshd[13611]: Invalid user miremadi from 36.72.143.91 port 43364
...
2019-11-30 00:27:31
107.189.11.11 attackspambots
Bruteforce on SSH Honeypot
2019-11-30 00:29:10
106.54.48.96 attackspam
Nov 28 19:16:49 nbi-636 sshd[10141]: User mysql from 106.54.48.96 not allowed because not listed in AllowUsers
Nov 28 19:16:49 nbi-636 sshd[10141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.96  user=mysql
Nov 28 19:16:51 nbi-636 sshd[10141]: Failed password for invalid user mysql from 106.54.48.96 port 35920 ssh2
Nov 28 19:16:51 nbi-636 sshd[10141]: Received disconnect from 106.54.48.96 port 35920:11: Bye Bye [preauth]
Nov 28 19:16:51 nbi-636 sshd[10141]: Disconnected from 106.54.48.96 port 35920 [preauth]
Nov 28 19:27:19 nbi-636 sshd[12017]: User r.r from 106.54.48.96 not allowed because not listed in AllowUsers
Nov 28 19:27:19 nbi-636 sshd[12017]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.48.96  user=r.r
Nov 28 19:27:20 nbi-636 sshd[12017]: Failed password for invalid user r.r from 106.54.48.96 port 56558 ssh2
Nov 28 19:27:21 nbi-636 sshd[12017]: Received disco........
-------------------------------
2019-11-30 01:01:05
114.244.39.222 attackbots
port scan/probe/communication attempt
2019-11-30 01:05:08
106.124.141.108 attackspambots
fail2ban
2019-11-30 00:31:25
175.213.185.129 attackspambots
Nov 29 16:22:36 ns3042688 sshd\[31929\]: Invalid user admin from 175.213.185.129
Nov 29 16:22:36 ns3042688 sshd\[31929\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.213.185.129 
Nov 29 16:22:38 ns3042688 sshd\[31929\]: Failed password for invalid user admin from 175.213.185.129 port 59032 ssh2
Nov 29 16:27:31 ns3042688 sshd\[1187\]: Invalid user celitje from 175.213.185.129
Nov 29 16:27:31 ns3042688 sshd\[1187\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.213.185.129 
...
2019-11-30 01:09:04
178.45.17.161 attackspambots
Failed RDP login
2019-11-30 00:41:14
178.45.34.147 attack
Failed RDP login
2019-11-30 00:40:57
106.13.15.153 attackbots
fail2ban
2019-11-30 01:04:23
94.47.144.223 attackbots
Failed RDP login
2019-11-30 00:46:37

Recently Reported IPs

55.105.162.172 1.36.234.109 98.221.128.83 218.91.175.83
199.100.76.6 123.207.60.200 246.254.15.24 104.126.43.42
48.208.50.184 243.124.178.232 171.136.106.10 167.68.121.202
25.87.186.98 88.185.169.94 96.180.34.214 241.153.210.21
208.48.167.214 48.119.223.194 85.122.66.53 45.244.80.254