Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.141.111.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22048
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.141.111.57.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 11 21:05:31 CST 2022
;; MSG SIZE  rcvd: 106
Host info
57.111.141.18.in-addr.arpa domain name pointer ec2-18-141-111-57.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.111.141.18.in-addr.arpa	name = ec2-18-141-111-57.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.164.211.22 attackspam
Nov 23 08:47:34 server sshd\[2823\]: Invalid user miro from 52.164.211.22 port 52156
Nov 23 08:47:34 server sshd\[2823\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.164.211.22
Nov 23 08:47:37 server sshd\[2823\]: Failed password for invalid user miro from 52.164.211.22 port 52156 ssh2
Nov 23 08:52:02 server sshd\[25011\]: User root from 52.164.211.22 not allowed because listed in DenyUsers
Nov 23 08:52:02 server sshd\[25011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.164.211.22  user=root
2019-11-23 15:09:59
60.255.230.202 attack
Nov 23 07:06:22 dev0-dcde-rnet sshd[9113]: Failed password for root from 60.255.230.202 port 40842 ssh2
Nov 23 07:26:13 dev0-dcde-rnet sshd[9189]: Failed password for root from 60.255.230.202 port 32918 ssh2
Nov 23 07:31:57 dev0-dcde-rnet sshd[9198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.255.230.202
2019-11-23 15:00:53
79.111.189.34 attackspam
Unauthorized connection attempt from IP address 79.111.189.34 on Port 445(SMB)
2019-11-23 15:09:02
107.180.111.23 attackspam
Automatic report - XMLRPC Attack
2019-11-23 14:48:46
201.235.19.122 attackbots
Nov 23 07:30:45 MK-Soft-Root2 sshd[1930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.235.19.122 
Nov 23 07:30:47 MK-Soft-Root2 sshd[1930]: Failed password for invalid user admin from 201.235.19.122 port 43470 ssh2
...
2019-11-23 14:54:08
62.152.30.96 attackbots
Fail2Ban Ban Triggered
2019-11-23 15:14:45
106.13.102.215 attackbots
Nov 23 08:10:48 SilenceServices sshd[11463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.102.215
Nov 23 08:10:49 SilenceServices sshd[11463]: Failed password for invalid user botelho from 106.13.102.215 port 33444 ssh2
Nov 23 08:15:32 SilenceServices sshd[12826]: Failed password for root from 106.13.102.215 port 35832 ssh2
2019-11-23 15:16:49
79.170.40.54 attack
Automatic report - XMLRPC Attack
2019-11-23 15:19:31
112.85.42.238 attack
Nov 23 07:29:57 h2177944 sshd\[18916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Nov 23 07:29:59 h2177944 sshd\[18916\]: Failed password for root from 112.85.42.238 port 15492 ssh2
Nov 23 07:30:02 h2177944 sshd\[18916\]: Failed password for root from 112.85.42.238 port 15492 ssh2
Nov 23 07:30:04 h2177944 sshd\[18916\]: Failed password for root from 112.85.42.238 port 15492 ssh2
...
2019-11-23 14:58:47
202.163.104.116 attackbotsspam
11/23/2019-01:30:15.286948 202.163.104.116 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-23 14:53:50
185.156.73.52 attack
11/23/2019-02:17:23.646444 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-23 15:18:39
59.148.104.81 attack
Automatic report - Port Scan
2019-11-23 15:01:12
188.68.56.128 attack
Nov 23 07:27:18 legacy sshd[27028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.68.56.128
Nov 23 07:27:20 legacy sshd[27028]: Failed password for invalid user www from 188.68.56.128 port 57006 ssh2
Nov 23 07:30:46 legacy sshd[27094]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.68.56.128
...
2019-11-23 14:46:49
150.109.40.31 attack
Nov 23 01:54:45 TORMINT sshd\[13893\]: Invalid user !!! from 150.109.40.31
Nov 23 01:54:45 TORMINT sshd\[13893\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.40.31
Nov 23 01:54:47 TORMINT sshd\[13893\]: Failed password for invalid user !!! from 150.109.40.31 port 59322 ssh2
...
2019-11-23 14:57:49
173.249.51.194 attack
173.249.51.194 - - - [23/Nov/2019:06:29:35 +0000] "GET / HTTP/1.0" 404 162 "-" "masscan/1.0 (https://github.com/robertdavidgraham/masscan)" "-" "-"
2019-11-23 15:19:57

Recently Reported IPs

23.109.248.213 136.47.228.46 183.5.129.47 51.105.197.9
18.141.111.230 195.189.41.16 246.155.48.42 229.59.19.61
185.63.153.53 253.180.218.115 188.58.89.10 114.194.52.130
198.244.143.253 227.216.85.163 198.244.143.252 31.254.101.191
195.242.110.94 113.68.25.189 204.15.135.162 12.37.2.240