Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frankfurt am Main

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.157.161.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58440
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;18.157.161.99.			IN	A

;; AUTHORITY SECTION:
.			370	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020041702 1800 900 604800 86400

;; Query time: 119 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 18 07:24:16 CST 2020
;; MSG SIZE  rcvd: 117
Host info
99.161.157.18.in-addr.arpa domain name pointer ec2-18-157-161-99.eu-central-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.161.157.18.in-addr.arpa	name = ec2-18-157-161-99.eu-central-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.50.62.78 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 19:30:39
179.232.1.254 attackbotsspam
$f2bV_matches
2019-07-11 19:20:57
46.101.88.10 attackspambots
Jul 11 12:36:45 mail sshd\[4955\]: Invalid user devil from 46.101.88.10
Jul 11 12:36:45 mail sshd\[4955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.88.10
Jul 11 12:36:48 mail sshd\[4955\]: Failed password for invalid user devil from 46.101.88.10 port 16034 ssh2
...
2019-07-11 19:24:16
93.184.8.142 attackspam
Telnet Server BruteForce Attack
2019-07-11 19:21:58
110.136.172.147 attack
445/tcp
[2019-07-11]1pkt
2019-07-11 19:49:35
185.210.36.134 attack
ssh failed login
2019-07-11 19:49:12
122.195.200.36 attack
Jul 11 06:23:02 aat-srv002 sshd[5430]: Failed password for root from 122.195.200.36 port 39196 ssh2
Jul 11 06:23:12 aat-srv002 sshd[5435]: Failed password for root from 122.195.200.36 port 56351 ssh2
Jul 11 06:23:20 aat-srv002 sshd[5441]: Failed password for root from 122.195.200.36 port 61684 ssh2
...
2019-07-11 19:27:25
171.211.227.39 attack
23/tcp
[2019-07-11]1pkt
2019-07-11 19:39:12
67.205.136.215 attackspam
k+ssh-bruteforce
2019-07-11 19:41:04
51.38.37.128 attackspam
Invalid user misp from 51.38.37.128 port 54151
2019-07-11 19:43:39
119.60.27.62 attackbots
Brute force attempt
2019-07-11 19:54:26
88.88.193.230 attack
Jul 11 13:29:33 cvbmail sshd\[8924\]: Invalid user snoopy from 88.88.193.230
Jul 11 13:29:33 cvbmail sshd\[8924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.88.193.230
Jul 11 13:29:34 cvbmail sshd\[8924\]: Failed password for invalid user snoopy from 88.88.193.230 port 58167 ssh2
2019-07-11 19:45:24
217.238.166.113 attackspam
2019-07-11T11:48:12.516184abusebot-4.cloudsearch.cf sshd\[28917\]: Invalid user isabelle from 217.238.166.113 port 46696
2019-07-11 19:51:16
117.87.152.244 attackbotsspam
37215/tcp
[2019-07-11]1pkt
2019-07-11 19:58:30
203.81.99.194 attack
Jul 10 21:08:36 ntop sshd[13382]: User r.r from 203.81.99.194 not allowed because not listed in AllowUsers
Jul 10 21:08:36 ntop sshd[13382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.81.99.194  user=r.r
Jul 10 21:08:38 ntop sshd[13382]: Failed password for invalid user r.r from 203.81.99.194 port 37098 ssh2
Jul 10 21:08:38 ntop sshd[13382]: Received disconnect from 203.81.99.194 port 37098:11: Bye Bye [preauth]
Jul 10 21:08:38 ntop sshd[13382]: Disconnected from 203.81.99.194 port 37098 [preauth]
Jul 10 21:11:56 ntop sshd[13764]: Invalid user fedora from 203.81.99.194 port 60922
Jul 10 21:11:58 ntop sshd[13764]: Failed password for invalid user fedora from 203.81.99.194 port 60922 ssh2
Jul 10 21:11:58 ntop sshd[13764]: Received disconnect from 203.81.99.194 port 60922:11: Bye Bye [preauth]
Jul 10 21:11:58 ntop sshd[13764]: Disconnected from 203.81.99.194 port 60922 [preauth]
Jul 10 21:14:35 ntop sshd[13969]: Invalid user........
-------------------------------
2019-07-11 19:26:53

Recently Reported IPs

105.136.224.253 114.107.149.94 93.48.51.62 71.220.184.71
210.138.242.183 37.205.51.40 184.232.216.226 197.241.129.136
121.180.96.82 90.70.146.247 5.37.40.16 150.203.202.247
65.94.126.57 158.36.21.25 83.97.180.174 156.215.250.191
27.23.58.27 187.127.215.130 199.170.72.193 102.186.229.203