Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: OVH SAS

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackbots
Mar 26 22:13:31 Ubuntu-1404-trusty-64-minimal sshd\[16496\]: Invalid user xnt from 54.38.214.191
Mar 26 22:13:31 Ubuntu-1404-trusty-64-minimal sshd\[16496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Mar 26 22:13:33 Ubuntu-1404-trusty-64-minimal sshd\[16496\]: Failed password for invalid user xnt from 54.38.214.191 port 46316 ssh2
Mar 26 22:19:49 Ubuntu-1404-trusty-64-minimal sshd\[20778\]: Invalid user trib from 54.38.214.191
Mar 26 22:19:49 Ubuntu-1404-trusty-64-minimal sshd\[20778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
2020-03-27 06:20:25
attackbotsspam
Mar 19 09:23:07 plusreed sshd[29479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191  user=root
Mar 19 09:23:09 plusreed sshd[29479]: Failed password for root from 54.38.214.191 port 52946 ssh2
...
2020-03-19 21:33:48
attackbotsspam
Mar 10 20:34:16 localhost sshd[6510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu  user=bin
Mar 10 20:34:18 localhost sshd[6510]: Failed password for bin from 54.38.214.191 port 51910 ssh2
Mar 10 20:42:09 localhost sshd[7446]: Invalid user surya from 54.38.214.191 port 54914
Mar 10 20:42:09 localhost sshd[7446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu
Mar 10 20:42:09 localhost sshd[7446]: Invalid user surya from 54.38.214.191 port 54914
Mar 10 20:42:11 localhost sshd[7446]: Failed password for invalid user surya from 54.38.214.191 port 54914 ssh2
...
2020-03-11 04:47:05
attack
Feb 23 05:03:02 web8 sshd\[16271\]: Invalid user ts3 from 54.38.214.191
Feb 23 05:03:02 web8 sshd\[16271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Feb 23 05:03:05 web8 sshd\[16271\]: Failed password for invalid user ts3 from 54.38.214.191 port 57756 ssh2
Feb 23 05:05:12 web8 sshd\[17364\]: Invalid user hr from 54.38.214.191
Feb 23 05:05:12 web8 sshd\[17364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
2020-02-23 13:17:53
attackspambots
Invalid user projects from 54.38.214.191 port 43346
2020-02-23 05:29:51
attack
Unauthorized connection attempt detected from IP address 54.38.214.191 to port 2220 [J]
2020-01-18 21:54:47
attackbots
Jan 16 14:02:33 SilenceServices sshd[3454]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Jan 16 14:02:34 SilenceServices sshd[3454]: Failed password for invalid user gt from 54.38.214.191 port 38706 ssh2
Jan 16 14:04:27 SilenceServices sshd[4186]: Failed password for root from 54.38.214.191 port 55746 ssh2
2020-01-16 21:58:20
attack
Unauthorized connection attempt detected from IP address 54.38.214.191 to port 2220 [J]
2020-01-13 04:36:17
attack
2019-12-20T10:08:56.025341homeassistant sshd[4846]: Invalid user squid from 54.38.214.191 port 51524
2019-12-20T10:08:56.031755homeassistant sshd[4846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
...
2019-12-20 19:58:50
attackspam
Dec 20 00:22:38 zeus sshd[3901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191 
Dec 20 00:22:40 zeus sshd[3901]: Failed password for invalid user gianchandani from 54.38.214.191 port 37346 ssh2
Dec 20 00:27:52 zeus sshd[4121]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191 
Dec 20 00:27:55 zeus sshd[4121]: Failed password for invalid user modu from 54.38.214.191 port 43906 ssh2
2019-12-20 08:58:02
attackspam
Dec 15 00:34:27 linuxvps sshd\[9732\]: Invalid user fysh from 54.38.214.191
Dec 15 00:34:27 linuxvps sshd\[9732\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Dec 15 00:34:30 linuxvps sshd\[9732\]: Failed password for invalid user fysh from 54.38.214.191 port 47120 ssh2
Dec 15 00:39:46 linuxvps sshd\[13319\]: Invalid user threet from 54.38.214.191
Dec 15 00:39:46 linuxvps sshd\[13319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
2019-12-15 13:48:57
attackspambots
Triggered by Fail2Ban at Ares web server
2019-12-14 03:35:43
attack
2019-12-11T08:57:00.477910abusebot-5.cloudsearch.cf sshd\[12412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu  user=root
2019-12-11 16:57:44
attack
Dec 10 10:19:31 server sshd\[16019\]: Invalid user www-admin from 54.38.214.191
Dec 10 10:19:31 server sshd\[16019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu 
Dec 10 10:19:34 server sshd\[16019\]: Failed password for invalid user www-admin from 54.38.214.191 port 56846 ssh2
Dec 10 10:26:59 server sshd\[18094\]: Invalid user oestby from 54.38.214.191
Dec 10 10:26:59 server sshd\[18094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu 
...
2019-12-10 18:27:35
attackspambots
Dec  9 13:48:38 vibhu-HP-Z238-Microtower-Workstation sshd\[20240\]: Invalid user linwood from 54.38.214.191
Dec  9 13:48:38 vibhu-HP-Z238-Microtower-Workstation sshd\[20240\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Dec  9 13:48:39 vibhu-HP-Z238-Microtower-Workstation sshd\[20240\]: Failed password for invalid user linwood from 54.38.214.191 port 56550 ssh2
Dec  9 13:53:58 vibhu-HP-Z238-Microtower-Workstation sshd\[20592\]: Invalid user 123456788 from 54.38.214.191
Dec  9 13:53:58 vibhu-HP-Z238-Microtower-Workstation sshd\[20592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
...
2019-12-09 16:25:23
attackspambots
Dec  8 05:52:13 loxhost sshd\[30500\]: Invalid user ssh from 54.38.214.191 port 40522
Dec  8 05:52:13 loxhost sshd\[30500\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Dec  8 05:52:15 loxhost sshd\[30500\]: Failed password for invalid user ssh from 54.38.214.191 port 40522 ssh2
Dec  8 05:57:32 loxhost sshd\[30757\]: Invalid user server from 54.38.214.191 port 50414
Dec  8 05:57:32 loxhost sshd\[30757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
...
2019-12-08 13:04:43
attack
Unauthorized SSH login attempts
2019-12-06 20:16:11
attackbots
Dec  6 07:19:22 jane sshd[15373]: Failed password for root from 54.38.214.191 port 45638 ssh2
...
2019-12-06 14:27:34
attackbots
Dec  4 08:29:10 eventyay sshd[2819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Dec  4 08:29:12 eventyay sshd[2819]: Failed password for invalid user password123456788 from 54.38.214.191 port 53418 ssh2
Dec  4 08:34:35 eventyay sshd[3018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
...
2019-12-04 15:49:08
attackbots
Dec  2 02:49:08 server sshd\[9531\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu  user=root
Dec  2 02:49:11 server sshd\[9531\]: Failed password for root from 54.38.214.191 port 49084 ssh2
Dec  2 02:56:20 server sshd\[11655\]: Invalid user test from 54.38.214.191
Dec  2 02:56:20 server sshd\[11655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu 
Dec  2 02:56:22 server sshd\[11655\]: Failed password for invalid user test from 54.38.214.191 port 32814 ssh2
...
2019-12-02 08:50:51
attackspambots
Invalid user admin from 54.38.214.191 port 48248
2019-12-01 08:32:58
attackbots
Nov  7 00:40:18 srv01 sshd[31347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu  user=root
Nov  7 00:40:20 srv01 sshd[31347]: Failed password for root from 54.38.214.191 port 37374 ssh2
Nov  7 00:43:48 srv01 sshd[31452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu  user=root
Nov  7 00:43:50 srv01 sshd[31452]: Failed password for root from 54.38.214.191 port 47024 ssh2
Nov  7 00:47:18 srv01 sshd[31780]: Invalid user mah from 54.38.214.191
...
2019-11-07 09:03:48
attackspambots
Sep 10 11:01:06 SilenceServices sshd[24518]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Sep 10 11:01:08 SilenceServices sshd[24518]: Failed password for invalid user oracle from 54.38.214.191 port 54936 ssh2
Sep 10 11:07:03 SilenceServices sshd[26823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
2019-09-10 17:18:52
attackspam
Sep  6 07:45:39 vps647732 sshd[4853]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Sep  6 07:45:42 vps647732 sshd[4853]: Failed password for invalid user oracle from 54.38.214.191 port 54628 ssh2
...
2019-09-06 20:22:37
attackspam
Aug 31 05:26:34 kapalua sshd\[5484\]: Invalid user info5 from 54.38.214.191
Aug 31 05:26:34 kapalua sshd\[5484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu
Aug 31 05:26:36 kapalua sshd\[5484\]: Failed password for invalid user info5 from 54.38.214.191 port 55018 ssh2
Aug 31 05:30:27 kapalua sshd\[5815\]: Invalid user openerp from 54.38.214.191
Aug 31 05:30:27 kapalua sshd\[5815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.ip-54-38-214.eu
2019-09-01 03:48:08
attack
Invalid user hcat from 54.38.214.191 port 42570
2019-08-23 14:51:46
attackbotsspam
Aug 21 08:40:56 plusreed sshd[6410]: Invalid user edit from 54.38.214.191
...
2019-08-22 04:27:32
attack
Aug 19 06:57:47 [host] sshd[455]: Invalid user mcserver from 54.38.214.191
Aug 19 06:57:47 [host] sshd[455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Aug 19 06:57:49 [host] sshd[455]: Failed password for invalid user mcserver from 54.38.214.191 port 41224 ssh2
2019-08-19 13:56:47
attackspam
Aug 18 06:47:56 SilenceServices sshd[2102]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
Aug 18 06:47:58 SilenceServices sshd[2102]: Failed password for invalid user matthew from 54.38.214.191 port 41512 ssh2
Aug 18 06:52:02 SilenceServices sshd[5342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
2019-08-18 12:55:07
attack
Aug  7 11:07:51 ubuntu-2gb-nbg1-dc3-1 sshd[5624]: Failed password for root from 54.38.214.191 port 45018 ssh2
Aug  7 11:14:14 ubuntu-2gb-nbg1-dc3-1 sshd[6060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.214.191
...
2019-08-07 18:05:28
Comments on same subnet:
IP Type Details Datetime
54.38.214.241 attackspam
Apr 14 10:10:36 mintao sshd\[9976\]: Invalid user 134.175.168.15 - SSH-2.0-Ope.SSH_7.4\\r from 54.38.214.241\
Apr 14 10:13:56 mintao sshd\[9982\]: Invalid user 134.175.169.106 - SSH-2.0-Ope.SSH_7.4\\r from 54.38.214.241\
2020-04-14 16:17:51
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.38.214.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36843
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;54.38.214.191.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019080602 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Aug 07 12:50:13 CST 2019
;; MSG SIZE  rcvd: 117
Host info
191.214.38.54.in-addr.arpa domain name pointer 191.ip-54-38-214.eu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
191.214.38.54.in-addr.arpa	name = 191.ip-54-38-214.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
223.202.201.138 attackspambots
Oct 20 07:24:37 server sshd\[30466\]: Invalid user kit from 223.202.201.138 port 18624
Oct 20 07:24:37 server sshd\[30466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.202.201.138
Oct 20 07:24:39 server sshd\[30466\]: Failed password for invalid user kit from 223.202.201.138 port 18624 ssh2
Oct 20 07:29:40 server sshd\[9985\]: Invalid user wapidc from 223.202.201.138 port 38057
Oct 20 07:29:40 server sshd\[9985\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.202.201.138
2019-10-20 18:35:50
194.67.223.117 attackbotsspam
Oct 20 04:46:05 raspberrypi sshd\[1954\]: Invalid user userftp from 194.67.223.117 port 50612
Oct 20 04:46:07 raspberrypi sshd\[1990\]: Invalid user username from 194.67.223.117 port 51164
Oct 20 04:46:10 raspberrypi sshd\[2012\]: Invalid user victor from 194.67.223.117 port 51446
...
2019-10-20 19:10:06
128.199.212.82 attack
Oct 20 00:41:56 ny01 sshd[27134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.212.82
Oct 20 00:41:58 ny01 sshd[27134]: Failed password for invalid user tmp from 128.199.212.82 port 38589 ssh2
Oct 20 00:46:39 ny01 sshd[27560]: Failed password for root from 128.199.212.82 port 57915 ssh2
2019-10-20 18:49:23
106.52.102.190 attackbotsspam
Oct 19 21:10:15 sachi sshd\[18260\]: Invalid user P4SS@2020 from 106.52.102.190
Oct 19 21:10:15 sachi sshd\[18260\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.102.190
Oct 19 21:10:17 sachi sshd\[18260\]: Failed password for invalid user P4SS@2020 from 106.52.102.190 port 59566 ssh2
Oct 19 21:16:23 sachi sshd\[18726\]: Invalid user fackQQ from 106.52.102.190
Oct 19 21:16:23 sachi sshd\[18726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.102.190
2019-10-20 19:08:00
123.30.236.149 attackbots
Oct 20 10:47:23 server sshd\[25858\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149  user=root
Oct 20 10:47:24 server sshd\[25866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149  user=root
Oct 20 10:47:24 server sshd\[25858\]: Failed password for root from 123.30.236.149 port 59962 ssh2
Oct 20 10:47:26 server sshd\[25866\]: Failed password for root from 123.30.236.149 port 44876 ssh2
Oct 20 10:52:37 server sshd\[27094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.30.236.149  user=root
...
2019-10-20 18:43:53
221.228.111.131 attackspam
2019-10-20T10:11:26.375246abusebot-5.cloudsearch.cf sshd\[19055\]: Invalid user telnet from 221.228.111.131 port 48656
2019-10-20 18:48:09
171.97.35.175 attack
SS1,DEF GET /admin/build/modules
2019-10-20 18:57:13
180.66.207.67 attackbotsspam
Oct 20 13:10:32 hosting sshd[26370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.66.207.67  user=root
Oct 20 13:10:34 hosting sshd[26370]: Failed password for root from 180.66.207.67 port 56941 ssh2
...
2019-10-20 18:50:08
159.203.74.227 attackspam
Invalid user art from 159.203.74.227 port 53074
2019-10-20 19:07:42
193.31.24.113 attackbots
10/20/2019-12:47:51.675833 193.31.24.113 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-20 19:13:21
213.32.71.196 attackspam
detected by Fail2Ban
2019-10-20 19:16:51
178.128.107.61 attackspambots
Oct 20 12:46:12 MK-Soft-Root1 sshd[8421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.107.61 
Oct 20 12:46:13 MK-Soft-Root1 sshd[8421]: Failed password for invalid user sales from 178.128.107.61 port 34938 ssh2
...
2019-10-20 19:18:49
128.199.219.181 attackspam
Automatic report - Banned IP Access
2019-10-20 18:53:44
193.70.89.152 attack
CloudCIX Reconnaissance Scan Detected, PTR: 152.ip-193-70-89.eu.
2019-10-20 19:13:36
106.13.81.242 attack
Oct 20 08:05:38 Ubuntu-1404-trusty-64-minimal sshd\[14422\]: Invalid user santo from 106.13.81.242
Oct 20 08:05:38 Ubuntu-1404-trusty-64-minimal sshd\[14422\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
Oct 20 08:05:40 Ubuntu-1404-trusty-64-minimal sshd\[14422\]: Failed password for invalid user santo from 106.13.81.242 port 46010 ssh2
Oct 20 08:23:02 Ubuntu-1404-trusty-64-minimal sshd\[29916\]: Invalid user ilanthirayan from 106.13.81.242
Oct 20 08:23:02 Ubuntu-1404-trusty-64-minimal sshd\[29916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
2019-10-20 19:00:11

Recently Reported IPs

84.200.212.104 73.129.186.234 191.254.174.235 115.138.187.29
42.179.91.224 111.204.148.149 47.88.255.159 1.53.67.207
49.87.211.218 35.192.6.39 185.122.223.21 182.242.56.191
183.246.70.160 200.98.119.143 95.32.248.9 14.177.9.151
43.231.113.155 182.18.228.186 91.225.162.50 51.15.129.17