Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ashburn

Region: Virginia

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       50.114.0.0 - 50.114.255.255
CIDR:           50.114.0.0/16
NetName:        ACE-NETWORK-4
NetHandle:      NET-50-114-0-0-1
Parent:         NET50 (NET-50-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Ace Data Centers, Inc. (ADC-96)
RegDate:        2011-06-20
Updated:        2024-04-22
Comment:        https://www.acedatacenter.com/
Comment:        Geofeed: https://www.acedatacenter.com/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/50.114.0.0


OrgName:        Ace Data Centers, Inc.
OrgId:          ADC-96
Address:        727 North 1550 East
Address:        Ste 400
City:           Orem
StateProv:      UT
PostalCode:     84097
Country:        US
RegDate:        2010-11-02
Updated:        2025-09-23
Ref:            https://rdap.arin.net/registry/entity/ADC-96


OrgTechHandle: LOWRY55-ARIN
OrgTechName:   Lowry, Justin 
OrgTechPhone:  +1-801-735-5256 
OrgTechEmail:  justin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LOWRY55-ARIN

OrgAbuseHandle: ABUSE8727-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-801-851-5540 
OrgAbuseEmail:  ipabuse@acedatacenter.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE8727-ARIN

OrgTechHandle: ACEAD-ARIN
OrgTechName:   ACE ADMIN
OrgTechPhone:  +1-801-900-5673 
OrgTechEmail:  admin@acedatacenter.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ACEAD-ARIN

# end


# start

NetRange:       50.114.114.0 - 50.114.114.255
CIDR:           50.114.114.0/24
NetName:        EVOXT
NetHandle:      NET-50-114-114-0-1
Parent:         ACE-NETWORK-4 (NET-50-114-0-0-1)
NetType:        Reallocated
OriginAS:       
Organization:   Evoxt (KR) (EK-29)
RegDate:        2025-09-09
Updated:        2025-09-09
Comment:        https://raw.githubusercontent.com/evoxt/geofeed/main/geofeed.csv
Ref:            https://rdap.arin.net/registry/ip/50.114.114.0


OrgName:        Evoxt (KR)
OrgId:          EK-29
Address:        189 Gasan digital 1-ro
City:           Seoul
StateProv:      Geumcheon-gu
PostalCode:     08503
Country:        KR
RegDate:        2025-08-04
Updated:        2025-08-05
Ref:            https://rdap.arin.net/registry/entity/EK-29


OrgDNSHandle: KEAC-ARIN
OrgDNSName:   KR Evoxt, Abuse Contact 
OrgDNSPhone:  +601158988860 
OrgDNSEmail:  abuse@evoxt.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgRoutingHandle: KEAC-ARIN
OrgRoutingName:   KR Evoxt, Abuse Contact 
OrgRoutingPhone:  +601158988860 
OrgRoutingEmail:  abuse@evoxt.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgNOCHandle: KEAC-ARIN
OrgNOCName:   KR Evoxt, Abuse Contact 
OrgNOCPhone:  +601158988860 
OrgNOCEmail:  abuse@evoxt.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgTechHandle: KEAC-ARIN
OrgTechName:   KR Evoxt, Abuse Contact 
OrgTechPhone:  +601158988860 
OrgTechEmail:  abuse@evoxt.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

OrgAbuseHandle: KEAC-ARIN
OrgAbuseName:   KR Evoxt, Abuse Contact 
OrgAbusePhone:  +601158988860 
OrgAbuseEmail:  abuse@evoxt.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/KEAC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.114.114.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.114.114.254.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 17:42:20 CST 2026
;; MSG SIZE  rcvd: 107
Host info
254.114.114.50.in-addr.arpa domain name pointer 50-114-114-254.ips.acedatacenter.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.114.114.50.in-addr.arpa	name = 50-114-114-254.ips.acedatacenter.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.56.11.236 attackbotsspam
2020-06-10T05:45:19.073258linuxbox-skyline sshd[289666]: Invalid user whobraun from 218.56.11.236 port 47893
...
2020-06-10 23:37:37
103.205.125.34 attackbotsspam
Unauthorized connection attempt from IP address 103.205.125.34 on Port 445(SMB)
2020-06-10 23:04:20
73.41.104.30 attackspam
2020-06-10T12:21:45.334721ns386461 sshd\[22980\]: Invalid user bulk from 73.41.104.30 port 39346
2020-06-10T12:21:45.339274ns386461 sshd\[22980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-41-104-30.hsd1.ca.comcast.net
2020-06-10T12:21:46.958508ns386461 sshd\[22980\]: Failed password for invalid user bulk from 73.41.104.30 port 39346 ssh2
2020-06-10T17:29:56.551731ns386461 sshd\[12056\]: Invalid user cai from 73.41.104.30 port 34220
2020-06-10T17:29:56.554417ns386461 sshd\[12056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-41-104-30.hsd1.ca.comcast.net
...
2020-06-10 23:30:37
119.28.7.77 attackspambots
2020-06-10T09:08:52.4679281495-001 sshd[55844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.7.77  user=root
2020-06-10T09:08:53.9498211495-001 sshd[55844]: Failed password for root from 119.28.7.77 port 37956 ssh2
2020-06-10T09:12:59.6434571495-001 sshd[56005]: Invalid user dfk from 119.28.7.77 port 40916
2020-06-10T09:12:59.6472241495-001 sshd[56005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.7.77
2020-06-10T09:12:59.6434571495-001 sshd[56005]: Invalid user dfk from 119.28.7.77 port 40916
2020-06-10T09:13:01.7057551495-001 sshd[56005]: Failed password for invalid user dfk from 119.28.7.77 port 40916 ssh2
...
2020-06-10 23:08:09
85.209.0.101 attackspam
Jun 10 22:03:29 itv-usvr-01 sshd[8426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.101  user=root
Jun 10 22:03:32 itv-usvr-01 sshd[8426]: Failed password for root from 85.209.0.101 port 51600 ssh2
2020-06-10 23:15:53
103.228.183.10 attackbots
Jun 10 15:42:55 ns3164893 sshd[8658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.183.10  user=root
Jun 10 15:42:57 ns3164893 sshd[8658]: Failed password for root from 103.228.183.10 port 47084 ssh2
...
2020-06-10 23:03:50
62.12.115.231 attackbotsspam
Jun 10 14:30:56 mout sshd[10005]: Connection closed by 62.12.115.231 port 48680 [preauth]
2020-06-10 23:21:53
113.190.37.150 attack
Unauthorized connection attempt from IP address 113.190.37.150 on Port 445(SMB)
2020-06-10 23:20:40
222.186.31.83 attackspambots
Jun 10 16:48:10 MainVPS sshd[13731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jun 10 16:48:13 MainVPS sshd[13731]: Failed password for root from 222.186.31.83 port 56641 ssh2
Jun 10 16:48:21 MainVPS sshd[13788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jun 10 16:48:23 MainVPS sshd[13788]: Failed password for root from 222.186.31.83 port 63253 ssh2
Jun 10 16:48:30 MainVPS sshd[13970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jun 10 16:48:33 MainVPS sshd[13970]: Failed password for root from 222.186.31.83 port 51137 ssh2
...
2020-06-10 22:55:59
154.66.132.74 attack
Automatic report - XMLRPC Attack
2020-06-10 23:10:14
92.45.234.183 attackspambots
firewall-block, port(s): 445/tcp
2020-06-10 23:15:22
167.71.176.84 attackbotsspam
Jun 10 17:17:29 odroid64 sshd\[26749\]: User root from 167.71.176.84 not allowed because not listed in AllowUsers
Jun 10 17:17:29 odroid64 sshd\[26749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.176.84  user=root
...
2020-06-10 23:24:13
219.91.241.195 attack
1591786807 - 06/10/2020 13:00:07 Host: 219.91.241.195/219.91.241.195 Port: 445 TCP Blocked
2020-06-10 23:07:24
195.76.192.145 attack
Unauthorized connection attempt from IP address 195.76.192.145 on Port 445(SMB)
2020-06-10 23:18:15
180.71.47.198 attackbots
Jun 10 14:02:56 powerpi2 sshd[10632]: Failed password for invalid user admin from 180.71.47.198 port 56554 ssh2
Jun 10 14:06:42 powerpi2 sshd[10819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198  user=root
Jun 10 14:06:44 powerpi2 sshd[10819]: Failed password for root from 180.71.47.198 port 59244 ssh2
...
2020-06-10 23:29:24

Recently Reported IPs

120.199.71.89 10.15.91.1 20.197.108.222 110.45.72.122
185.153.183.127 182.46.215.134 47.122.117.80 2606:4700:10::6816:523
2606:4700:10::ac43:2392 2606:4700:10::6814:7295 2606:4700:10::ac43:637 2606:4700:10::6816:2430
2606:4700:10::6816:4814 2606:4700:10::6814:8366 2606:4700:10::6814:7064 2606:4700:10::6816:845
185.38.148.2 175.107.233.65 134.35.157.38 2606:4700:10::6814:9775