This IP address has been reported a total of 18,432
times from 1,323 distinct
sources.
50.193.220.21 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2023-12-11T18:41:52.301566+00:00 ash-bm-1113 sshd[26771]: Invalid user usuario2 from 50.193.220.21 p ... show more2023-12-11T18:41:52.301566+00:00 ash-bm-1113 sshd[26771]: Invalid user usuario2 from 50.193.220.21 port 45824
2023-12-11T18:45:04.787922+00:00 ash-bm-1113 sshd[29176]: Invalid user master from 50.193.220.21 port 38260
2023-12-11T18:47:09.579492+00:00 ash-bm-1113 sshd[30749]: Invalid user mysql from 50.193.220.21 port 52564
... show less
Dec 11 18:22:25 CT6942 sshd[438982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreDec 11 18:22:25 CT6942 sshd[438982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 user=root
Dec 11 18:22:27 CT6942 sshd[438982]: Failed password for root from 50.193.220.21 port 32900 ssh2
Dec 11 18:23:36 CT6942 sshd[439076]: Invalid user nginx from 50.193.220.21 port 54104
... show less
Dec 11 17:43:22 h2691902 sshd[30006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eu ... show moreDec 11 17:43:22 h2691902 sshd[30006]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 user=root
Dec 11 17:43:24 h2691902 sshd[30006]: Failed password for root from 50.193.220.21 port 36970 ssh2
Dec 11 17:44:32 h2691902 sshd[30074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 user=root
Dec 11 17:44:34 h2691902 sshd[30074]: Failed password for root from 50.193.220.21 port 58296 ssh2
Dec 11 17:45:41 h2691902 sshd[30148]: Invalid user usuario2 from 50.193.220.21 port 51390
... show less
Dec 11 15:34:27 vhost sshd[1882179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui ... show moreDec 11 15:34:27 vhost sshd[1882179]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21
Dec 11 15:34:29 vhost sshd[1882179]: Failed password for invalid user centos from 50.193.220.21 port 48652 ssh2
Dec 11 15:36:41 vhost sshd[1884236]: Invalid user sara from 50.193.220.21 port 48732
... show less
Dec 11 14:51:06 sun sshd[1546057]: Failed password for root from 50.193.220.21 port 53070 ssh2 ... show moreDec 11 14:51:06 sun sshd[1546057]: Failed password for root from 50.193.220.21 port 53070 ssh2
Dec 11 14:52:20 sun sshd[1546157]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 user=root
Dec 11 14:52:23 sun sshd[1546157]: Failed password for root from 50.193.220.21 port 50440 ssh2
... show less
Dec 11 13:07:27 cloud sshd[1454012]: Invalid user m from 50.193.220.21 port 51214
Dec 11 13:12 ... show moreDec 11 13:07:27 cloud sshd[1454012]: Invalid user m from 50.193.220.21 port 51214
Dec 11 13:12:56 cloud sshd[1454329]: Invalid user tuan from 50.193.220.21 port 45950
... show less
Brute-ForceSSH
Anonymous
50.193.220.21 (US/United States/-), 5 distributed sshd attacks on account [root] in the last 3600 se ... show more50.193.220.21 (US/United States/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Dec 11 08:09:27 server2 sshd[29309]: Failed password for root from 178.62.66.67 port 44940 ssh2
Dec 11 08:09:00 server2 sshd[29194]: Failed password for root from 50.193.220.21 port 48640 ssh2
Dec 11 08:09:09 server2 sshd[29229]: Failed password for root from 188.254.50.180 port 34022 ssh2
Dec 11 08:08:34 server2 sshd[29084]: Failed password for root from 177.87.208.114 port 34258 ssh2
Dec 11 08:08:35 server2 sshd[29088]: Failed password for root from 103.82.240.194 port 60188 ssh2
sshd[23695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost ... show moresshd[23695]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21
sshd[23695]: Failed password for invalid user m from 50.193.220.21 port 59002 ssh2 show less
2023-12-11T14:04:07.125239monitor sshd[2828369]: Invalid user m from 50.193.220.21 port 40580
... show more2023-12-11T14:04:07.125239monitor sshd[2828369]: Invalid user m from 50.193.220.21 port 40580
... show less
Auto Fail2Ban report, multiple SSH login attempts.
Brute-ForceSSH
Anonymous
Dec 11 09:46:46 flow-dus sshd[173384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 e ... show moreDec 11 09:46:46 flow-dus sshd[173384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21
Dec 11 09:46:47 flow-dus sshd[173384]: Failed password for invalid user visitor from 50.193.220.21 port 45642 ssh2
Dec 11 09:50:20 flow-dus sshd[173404]: Invalid user ts3 from 50.193.220.21 port 59504
... show less
Dec 11 09:32:24 jump sshd[2303864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid ... show moreDec 11 09:32:24 jump sshd[2303864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21
Dec 11 09:32:24 jump sshd[2303864]: Invalid user devops from 50.193.220.21 port 54946
Dec 11 09:32:26 jump sshd[2303864]: Failed password for invalid user devops from 50.193.220.21 port 54946 ssh2
... show less
Dec 11 09:05:11 jump sshd[2302704]: Failed password for invalid user radio from 50.193.220.21 port 3 ... show moreDec 11 09:05:11 jump sshd[2302704]: Failed password for invalid user radio from 50.193.220.21 port 37924 ssh2
Dec 11 09:08:39 jump sshd[2302823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.193.220.21 user=root
Dec 11 09:08:40 jump sshd[2302823]: Failed password for root from 50.193.220.21 port 51048 ssh2
... show less