Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.32.14.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19264
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;50.32.14.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 04:47:10 CST 2025
;; MSG SIZE  rcvd: 105
Host info
114.14.32.50.in-addr.arpa domain name pointer 50-32-14-114.bng01.dlls.pa.frontiernet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
114.14.32.50.in-addr.arpa	name = 50-32-14-114.bng01.dlls.pa.frontiernet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.103.241.211 attack
Jul 28 18:10:08 rpi sshd[4976]: Failed password for root from 36.103.241.211 port 48006 ssh2
2019-07-29 00:43:58
103.199.145.234 attackspambots
Automatic report - SSH Brute-Force Attack
2019-07-29 00:13:45
142.93.1.100 attack
Jul 28 17:04:44 mail sshd\[29990\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100  user=root
Jul 28 17:04:47 mail sshd\[29990\]: Failed password for root from 142.93.1.100 port 50428 ssh2
Jul 28 17:09:33 mail sshd\[30733\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100  user=root
Jul 28 17:09:35 mail sshd\[30733\]: Failed password for root from 142.93.1.100 port 45022 ssh2
Jul 28 17:14:31 mail sshd\[31364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.1.100  user=root
2019-07-28 23:36:29
52.224.216.167 attack
Jul 28 11:27:02 TORMINT sshd\[17569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.224.216.167  user=root
Jul 28 11:27:03 TORMINT sshd\[17569\]: Failed password for root from 52.224.216.167 port 58580 ssh2
Jul 28 11:36:28 TORMINT sshd\[18078\]: Invalid user abc from 52.224.216.167
Jul 28 11:36:28 TORMINT sshd\[18078\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.224.216.167
...
2019-07-28 23:47:27
103.28.22.138 attackbotsspam
Wordpress Admin Login attack
2019-07-29 00:10:06
142.54.101.146 attackbotsspam
Invalid user nagios from 142.54.101.146 port 52221
2019-07-28 23:55:01
192.42.116.16 attack
Jul 28 13:34:11 mail sshd\[29883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.16  user=root
Jul 28 13:34:13 mail sshd\[29883\]: Failed password for root from 192.42.116.16 port 60484 ssh2
Jul 28 13:34:15 mail sshd\[29883\]: Failed password for root from 192.42.116.16 port 60484 ssh2
Jul 28 13:34:17 mail sshd\[29883\]: Failed password for root from 192.42.116.16 port 60484 ssh2
Jul 28 13:34:20 mail sshd\[29883\]: Failed password for root from 192.42.116.16 port 60484 ssh2
2019-07-28 23:33:40
182.162.89.59 attack
Automatic report - Banned IP Access
2019-07-29 00:22:19
128.199.224.215 attack
Jul 28 15:36:58 MK-Soft-VM5 sshd\[5706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.224.215  user=root
Jul 28 15:37:00 MK-Soft-VM5 sshd\[5706\]: Failed password for root from 128.199.224.215 port 37928 ssh2
Jul 28 15:42:39 MK-Soft-VM5 sshd\[5721\]: Invalid user zhang from 128.199.224.215 port 59156
...
2019-07-29 00:36:12
218.197.16.152 attackbotsspam
Jul 28 09:57:26 xtremcommunity sshd\[24210\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.197.16.152  user=root
Jul 28 09:57:27 xtremcommunity sshd\[24210\]: Failed password for root from 218.197.16.152 port 47779 ssh2
Jul 28 10:00:16 xtremcommunity sshd\[24265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.197.16.152  user=root
Jul 28 10:00:18 xtremcommunity sshd\[24265\]: Failed password for root from 218.197.16.152 port 60507 ssh2
Jul 28 10:03:12 xtremcommunity sshd\[24347\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.197.16.152  user=root
...
2019-07-28 23:49:03
185.93.180.172 attackspam
fell into ViewStateTrap:essen
2019-07-28 23:24:19
77.42.111.59 attackbots
*Port Scan* detected from 77.42.111.59 (IR/Iran/-). 4 hits in the last 35 seconds
2019-07-28 23:54:31
178.128.114.248 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-28 23:48:18
77.247.181.165 attackspam
Jul 28 13:35:48 mail sshd\[30280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.247.181.165  user=root
Jul 28 13:35:51 mail sshd\[30280\]: Failed password for root from 77.247.181.165 port 11280 ssh2
Jul 28 13:35:54 mail sshd\[30280\]: Failed password for root from 77.247.181.165 port 11280 ssh2
Jul 28 13:35:57 mail sshd\[30280\]: Failed password for root from 77.247.181.165 port 11280 ssh2
Jul 28 13:35:59 mail sshd\[30280\]: Failed password for root from 77.247.181.165 port 11280 ssh2
2019-07-28 23:38:21
54.148.22.101 attackbots
54.148.22.101 - - [28/Jul/2019:17:04:55 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.148.22.101 - - [28/Jul/2019:17:04:56 +0200] "POST /wp-login.php HTTP/1.1" 200 1632 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.148.22.101 - - [28/Jul/2019:17:04:56 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.148.22.101 - - [28/Jul/2019:17:04:57 +0200] "POST /wp-login.php HTTP/1.1" 200 1607 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.148.22.101 - - [28/Jul/2019:17:04:57 +0200] "GET /wp-login.php HTTP/1.1" 200 1237 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.148.22.101 - - [28/Jul/2019:17:04:57 +0200] "POST /wp-login.php HTTP/1.1" 200 1608 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-28 23:42:14

Recently Reported IPs

2.250.123.16 177.47.89.22 168.187.50.97 187.157.51.168
95.69.145.195 62.179.155.95 145.6.21.44 187.253.216.4
137.249.113.14 59.83.109.204 225.43.52.159 9.29.152.71
25.200.123.52 56.186.253.216 199.114.171.114 100.187.86.199
160.38.4.144 13.30.189.220 241.240.248.208 80.153.213.55