Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Northwest Fiber

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attack
May  6 22:10:43 vps687878 sshd\[13032\]: Invalid user carlita from 50.54.141.121 port 45112
May  6 22:10:43 vps687878 sshd\[13032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.54.141.121
May  6 22:10:45 vps687878 sshd\[13032\]: Failed password for invalid user carlita from 50.54.141.121 port 45112 ssh2
May  6 22:11:47 vps687878 sshd\[13082\]: Invalid user naveen from 50.54.141.121 port 55412
May  6 22:11:47 vps687878 sshd\[13082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.54.141.121
...
2020-05-07 04:25:50
attackbots
May  1 17:41:31 inter-technics sshd[2699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.54.141.121  user=root
May  1 17:41:33 inter-technics sshd[2699]: Failed password for root from 50.54.141.121 port 42316 ssh2
May  1 17:45:32 inter-technics sshd[4400]: Invalid user toto from 50.54.141.121 port 54264
May  1 17:45:32 inter-technics sshd[4400]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.54.141.121
May  1 17:45:32 inter-technics sshd[4400]: Invalid user toto from 50.54.141.121 port 54264
May  1 17:45:34 inter-technics sshd[4400]: Failed password for invalid user toto from 50.54.141.121 port 54264 ssh2
...
2020-05-02 01:19:22
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 50.54.141.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43336
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;50.54.141.121.			IN	A

;; AUTHORITY SECTION:
.			456	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050101 1800 900 604800 86400

;; Query time: 149 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 01:19:17 CST 2020
;; MSG SIZE  rcvd: 117
Host info
121.141.54.50.in-addr.arpa domain name pointer 50-54-141-121.evrt.wa.frontiernet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
121.141.54.50.in-addr.arpa	name = 50-54-141-121.evrt.wa.frontiernet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.97.99.117 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-02 02:16:44
49.233.174.48 attackspam
Mar  1 17:40:51 DAAP sshd[23660]: Invalid user cpanelrrdtool from 49.233.174.48 port 50850
Mar  1 17:40:51 DAAP sshd[23660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.174.48
Mar  1 17:40:51 DAAP sshd[23660]: Invalid user cpanelrrdtool from 49.233.174.48 port 50850
Mar  1 17:40:53 DAAP sshd[23660]: Failed password for invalid user cpanelrrdtool from 49.233.174.48 port 50850 ssh2
Mar  1 17:47:33 DAAP sshd[23752]: Invalid user www from 49.233.174.48 port 59330
...
2020-03-02 01:59:42
140.136.210.146 attackbots
Unauthorized connection attempt detected from IP address 140.136.210.146 to port 81 [J]
2020-03-02 02:13:07
63.82.49.26 attackspam
Mar  1 14:22:12 grey postfix/smtpd\[19933\]: NOQUEUE: reject: RCPT from knowing.sapuxfiori.com\[63.82.49.26\]: 554 5.7.1 Service unavailable\; Client host \[63.82.49.26\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[63.82.49.26\]\; from=\ to=\ proto=ESMTP helo=\
...
2020-03-02 01:57:48
167.114.4.204 attackspambots
Feb 25 16:33:57 ns sshd[6114]: Connection from 167.114.4.204 port 37674 on 134.119.36.27 port 22
Feb 25 16:33:58 ns sshd[6114]: Invalid user alfresco from 167.114.4.204 port 37674
Feb 25 16:33:58 ns sshd[6114]: Failed password for invalid user alfresco from 167.114.4.204 port 37674 ssh2
Feb 25 16:33:58 ns sshd[6114]: Received disconnect from 167.114.4.204 port 37674:11: Bye Bye [preauth]
Feb 25 16:33:58 ns sshd[6114]: Disconnected from 167.114.4.204 port 37674 [preauth]
Feb 25 16:49:20 ns sshd[32376]: Connection from 167.114.4.204 port 33600 on 134.119.36.27 port 22
Feb 25 16:49:24 ns sshd[32376]: Failed password for invalid user mysql from 167.114.4.204 port 33600 ssh2
Feb 25 16:49:24 ns sshd[32376]: Received disconnect from 167.114.4.204 port 33600:11: Bye Bye [preauth]
Feb 25 16:49:24 ns sshd[32376]: Disconnected from 167.114.4.204 port 33600 [preauth]
Feb 25 17:01:37 ns sshd[20839]: Connection from 167.114.4.204 port 35212 on 134.119.36.27 port 22
Feb 25 17:01:39 ns........
-------------------------------
2020-03-02 02:14:38
138.197.131.249 attackspambots
Mar  1 20:28:06 webhost01 sshd[10548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.131.249
Mar  1 20:28:08 webhost01 sshd[10548]: Failed password for invalid user confluence from 138.197.131.249 port 59296 ssh2
...
2020-03-02 02:11:35
213.60.165.77 attackbots
Mar  1 19:10:09 MK-Soft-VM4 sshd[17634]: Failed password for git from 213.60.165.77 port 58478 ssh2
Mar  1 19:14:48 MK-Soft-VM4 sshd[18314]: Failed password for root from 213.60.165.77 port 43404 ssh2
...
2020-03-02 02:20:53
186.122.148.9 attack
Mar  1 12:40:37 NPSTNNYC01T sshd[30468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.122.148.9
Mar  1 12:40:39 NPSTNNYC01T sshd[30468]: Failed password for invalid user vps from 186.122.148.9 port 59388 ssh2
Mar  1 12:45:51 NPSTNNYC01T sshd[30815]: Failed password for root from 186.122.148.9 port 47192 ssh2
...
2020-03-02 01:51:31
31.220.48.56 attackspam
Mar  1 18:24:56 kmh-wsh-001-nbg03 sshd[1895]: Invalid user vmadmin from 31.220.48.56 port 32930
Mar  1 18:24:56 kmh-wsh-001-nbg03 sshd[1895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.48.56
Mar  1 18:24:58 kmh-wsh-001-nbg03 sshd[1895]: Failed password for invalid user vmadmin from 31.220.48.56 port 32930 ssh2
Mar  1 18:24:58 kmh-wsh-001-nbg03 sshd[1895]: Received disconnect from 31.220.48.56 port 32930:11: Bye Bye [preauth]
Mar  1 18:24:58 kmh-wsh-001-nbg03 sshd[1895]: Disconnected from 31.220.48.56 port 32930 [preauth]
Mar  1 18:31:57 kmh-wsh-001-nbg03 sshd[2624]: Invalid user xbot from 31.220.48.56 port 57022
Mar  1 18:31:57 kmh-wsh-001-nbg03 sshd[2624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.220.48.56


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=31.220.48.56
2020-03-02 01:57:31
2.60.56.32 attackspambots
Mar  1 14:22:18 grey postfix/smtpd\[23581\]: NOQUEUE: reject: RCPT from host-2-60-56-32.pppoe.omsknet.ru\[2.60.56.32\]: 554 5.7.1 Service unavailable\; Client host \[2.60.56.32\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?2.60.56.32\; from=\ to=\ proto=ESMTP helo=\
...
2020-03-02 01:52:29
156.200.110.226 attack
Honeypot attack, port: 445, PTR: host-156.200.110.226.tedata.net.
2020-03-02 02:03:14
14.186.201.63 attackbotsspam
2020-03-01 14:03:19 plain_virtual_exim authenticator failed for ([127.0.0.1]) [14.186.201.63]: 535 Incorrect authentication data


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.186.201.63
2020-03-02 02:25:45
78.188.42.22 attack
Automatic report - Banned IP Access
2020-03-02 02:00:47
222.186.31.166 attack
Unauthorized connection attempt detected from IP address 222.186.31.166 to port 22 [J]
2020-03-02 02:06:04
142.93.172.67 attack
Mar  1 08:10:06 tdfoods sshd\[15276\]: Invalid user jstorm from 142.93.172.67
Mar  1 08:10:06 tdfoods sshd\[15276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.67
Mar  1 08:10:07 tdfoods sshd\[15276\]: Failed password for invalid user jstorm from 142.93.172.67 port 45144 ssh2
Mar  1 08:16:00 tdfoods sshd\[15745\]: Invalid user sport from 142.93.172.67
Mar  1 08:16:00 tdfoods sshd\[15745\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.172.67
2020-03-02 02:22:53

Recently Reported IPs

6.97.89.184 137.167.229.103 150.122.76.103 182.64.211.164
174.94.187.54 57.43.14.59 14.202.112.6 96.199.1.161
162.243.137.43 159.196.154.13 158.244.245.195 176.28.117.186
184.57.151.198 27.78.70.239 61.105.159.48 61.137.162.89
59.233.31.63 137.27.176.186 186.225.42.190 3.51.251.208