City: Ashburn
Region: Virginia
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
# start
NetRange: 50.114.0.0 - 50.114.255.255
CIDR: 50.114.0.0/16
NetName: ACE-NETWORK-4
NetHandle: NET-50-114-0-0-1
Parent: NET50 (NET-50-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Ace Data Centers, Inc. (ADC-96)
RegDate: 2011-06-20
Updated: 2024-04-22
Comment: https://www.acedatacenter.com/
Comment: Geofeed: https://www.acedatacenter.com/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/50.114.0.0
OrgName: Ace Data Centers, Inc.
OrgId: ADC-96
Address: 727 North 1550 East
Address: Ste 400
City: Orem
StateProv: UT
PostalCode: 84097
Country: US
RegDate: 2010-11-02
Updated: 2025-09-23
Ref: https://rdap.arin.net/registry/entity/ADC-96
OrgTechHandle: LOWRY55-ARIN
OrgTechName: Lowry, Justin
OrgTechPhone: +1-801-735-5256
OrgTechEmail: justin@acedatacenter.com
OrgTechRef: https://rdap.arin.net/registry/entity/LOWRY55-ARIN
OrgAbuseHandle: ABUSE8727-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-801-851-5540
OrgAbuseEmail: ipabuse@acedatacenter.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE8727-ARIN
OrgTechHandle: ACEAD-ARIN
OrgTechName: ACE ADMIN
OrgTechPhone: +1-801-900-5673
OrgTechEmail: admin@acedatacenter.com
OrgTechRef: https://rdap.arin.net/registry/entity/ACEAD-ARIN
# end
# start
NetRange: 50.114.114.0 - 50.114.114.255
CIDR: 50.114.114.0/24
NetName: EVOXT
NetHandle: NET-50-114-114-0-1
Parent: ACE-NETWORK-4 (NET-50-114-0-0-1)
NetType: Reallocated
OriginAS:
Organization: Evoxt (KR) (EK-29)
RegDate: 2025-09-09
Updated: 2025-09-09
Comment: https://raw.githubusercontent.com/evoxt/geofeed/main/geofeed.csv
Ref: https://rdap.arin.net/registry/ip/50.114.114.0
OrgName: Evoxt (KR)
OrgId: EK-29
Address: 189 Gasan digital 1-ro
City: Seoul
StateProv: Geumcheon-gu
PostalCode: 08503
Country: KR
RegDate: 2025-08-04
Updated: 2025-08-05
Ref: https://rdap.arin.net/registry/entity/EK-29
OrgDNSHandle: KEAC-ARIN
OrgDNSName: KR Evoxt, Abuse Contact
OrgDNSPhone: +601158988860
OrgDNSEmail: abuse@evoxt.com
OrgDNSRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgRoutingHandle: KEAC-ARIN
OrgRoutingName: KR Evoxt, Abuse Contact
OrgRoutingPhone: +601158988860
OrgRoutingEmail: abuse@evoxt.com
OrgRoutingRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgNOCHandle: KEAC-ARIN
OrgNOCName: KR Evoxt, Abuse Contact
OrgNOCPhone: +601158988860
OrgNOCEmail: abuse@evoxt.com
OrgNOCRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgTechHandle: KEAC-ARIN
OrgTechName: KR Evoxt, Abuse Contact
OrgTechPhone: +601158988860
OrgTechEmail: abuse@evoxt.com
OrgTechRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
OrgAbuseHandle: KEAC-ARIN
OrgAbuseName: KR Evoxt, Abuse Contact
OrgAbusePhone: +601158988860
OrgAbuseEmail: abuse@evoxt.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/KEAC-ARIN
# end
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.114.114.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11588
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;50.114.114.254. IN A
;; AUTHORITY SECTION:
. 29 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033103 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 01 17:42:20 CST 2026
;; MSG SIZE rcvd: 107
254.114.114.50.in-addr.arpa domain name pointer 50-114-114-254.ips.acedatacenter.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
254.114.114.50.in-addr.arpa name = 50-114-114-254.ips.acedatacenter.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 218.56.11.236 | attackbotsspam | 2020-06-10T05:45:19.073258linuxbox-skyline sshd[289666]: Invalid user whobraun from 218.56.11.236 port 47893 ... |
2020-06-10 23:37:37 |
| 103.205.125.34 | attackbotsspam | Unauthorized connection attempt from IP address 103.205.125.34 on Port 445(SMB) |
2020-06-10 23:04:20 |
| 73.41.104.30 | attackspam | 2020-06-10T12:21:45.334721ns386461 sshd\[22980\]: Invalid user bulk from 73.41.104.30 port 39346 2020-06-10T12:21:45.339274ns386461 sshd\[22980\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-41-104-30.hsd1.ca.comcast.net 2020-06-10T12:21:46.958508ns386461 sshd\[22980\]: Failed password for invalid user bulk from 73.41.104.30 port 39346 ssh2 2020-06-10T17:29:56.551731ns386461 sshd\[12056\]: Invalid user cai from 73.41.104.30 port 34220 2020-06-10T17:29:56.554417ns386461 sshd\[12056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-41-104-30.hsd1.ca.comcast.net ... |
2020-06-10 23:30:37 |
| 119.28.7.77 | attackspambots | 2020-06-10T09:08:52.4679281495-001 sshd[55844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.7.77 user=root 2020-06-10T09:08:53.9498211495-001 sshd[55844]: Failed password for root from 119.28.7.77 port 37956 ssh2 2020-06-10T09:12:59.6434571495-001 sshd[56005]: Invalid user dfk from 119.28.7.77 port 40916 2020-06-10T09:12:59.6472241495-001 sshd[56005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.7.77 2020-06-10T09:12:59.6434571495-001 sshd[56005]: Invalid user dfk from 119.28.7.77 port 40916 2020-06-10T09:13:01.7057551495-001 sshd[56005]: Failed password for invalid user dfk from 119.28.7.77 port 40916 ssh2 ... |
2020-06-10 23:08:09 |
| 85.209.0.101 | attackspam | Jun 10 22:03:29 itv-usvr-01 sshd[8426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.209.0.101 user=root Jun 10 22:03:32 itv-usvr-01 sshd[8426]: Failed password for root from 85.209.0.101 port 51600 ssh2 |
2020-06-10 23:15:53 |
| 103.228.183.10 | attackbots | Jun 10 15:42:55 ns3164893 sshd[8658]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.183.10 user=root Jun 10 15:42:57 ns3164893 sshd[8658]: Failed password for root from 103.228.183.10 port 47084 ssh2 ... |
2020-06-10 23:03:50 |
| 62.12.115.231 | attackbotsspam | Jun 10 14:30:56 mout sshd[10005]: Connection closed by 62.12.115.231 port 48680 [preauth] |
2020-06-10 23:21:53 |
| 113.190.37.150 | attack | Unauthorized connection attempt from IP address 113.190.37.150 on Port 445(SMB) |
2020-06-10 23:20:40 |
| 222.186.31.83 | attackspambots | Jun 10 16:48:10 MainVPS sshd[13731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root Jun 10 16:48:13 MainVPS sshd[13731]: Failed password for root from 222.186.31.83 port 56641 ssh2 Jun 10 16:48:21 MainVPS sshd[13788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root Jun 10 16:48:23 MainVPS sshd[13788]: Failed password for root from 222.186.31.83 port 63253 ssh2 Jun 10 16:48:30 MainVPS sshd[13970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83 user=root Jun 10 16:48:33 MainVPS sshd[13970]: Failed password for root from 222.186.31.83 port 51137 ssh2 ... |
2020-06-10 22:55:59 |
| 154.66.132.74 | attack | Automatic report - XMLRPC Attack |
2020-06-10 23:10:14 |
| 92.45.234.183 | attackspambots | firewall-block, port(s): 445/tcp |
2020-06-10 23:15:22 |
| 167.71.176.84 | attackbotsspam | Jun 10 17:17:29 odroid64 sshd\[26749\]: User root from 167.71.176.84 not allowed because not listed in AllowUsers Jun 10 17:17:29 odroid64 sshd\[26749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.176.84 user=root ... |
2020-06-10 23:24:13 |
| 219.91.241.195 | attack | 1591786807 - 06/10/2020 13:00:07 Host: 219.91.241.195/219.91.241.195 Port: 445 TCP Blocked |
2020-06-10 23:07:24 |
| 195.76.192.145 | attack | Unauthorized connection attempt from IP address 195.76.192.145 on Port 445(SMB) |
2020-06-10 23:18:15 |
| 180.71.47.198 | attackbots | Jun 10 14:02:56 powerpi2 sshd[10632]: Failed password for invalid user admin from 180.71.47.198 port 56554 ssh2 Jun 10 14:06:42 powerpi2 sshd[10819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.71.47.198 user=root Jun 10 14:06:44 powerpi2 sshd[10819]: Failed password for root from 180.71.47.198 port 59244 ssh2 ... |
2020-06-10 23:29:24 |