Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Malaysia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.101.48.0 - 103.101.51.255'

% Abuse contact for '103.101.48.0 - 103.101.51.255' is 'support@jnisystem.com'

inetnum:        103.101.48.0 - 103.101.51.255
netname:        JNI-MY
descr:          JNI SYSTEM SDN BHD
country:        MY
org:            ORG-JSSB1-AP
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
abuse-c:        AJ419-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-JNI-MY
mnt-routes:     MAINT-JNI-MY
mnt-irt:        IRT-JNI-MY
last-modified:  2020-07-01T01:24:45Z
source:         APNIC

irt:            IRT-JNI-MY
address:        1210, 12th Floor,, Plaza Taragon Kelana,, No 3. Jalan SS6/6,, Kelana Jaya, Petaling Jaya Selangor 47
e-mail:         support@jnisystem.com
abuse-mailbox:  support@jnisystem.com
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
auth:           # Filtered
remarks:        support@jnisystem.com was validated on 2025-09-19
mnt-by:         MAINT-JNI-MY
last-modified:  2025-11-18T00:31:51Z
source:         APNIC

organisation:   ORG-JSSB1-AP
org-name:       JNI SYSTEM SDN BHD
org-type:       LIR
country:        MY
address:        1210, 12th Floor,
address:        Plaza Taragon Kelana,
address:        No 3. Jalan SS6/6,, Kelana Jaya
phone:          +60378878180
fax-no:         +60378879212
e-mail:         abuse@jnisystem.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2023-09-05T02:17:16Z
source:         APNIC

role:           ABUSE JNIMY
country:        ZZ
address:        1210, 12th Floor,, Plaza Taragon Kelana,, No 3. Jalan SS6/6,, Kelana Jaya, Petaling Jaya Selangor 47
phone:          +000000000
e-mail:         support@jnisystem.com
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
nic-hdl:        AJ419-AP
remarks:        Generated from irt object IRT-JNI-MY
remarks:        support@jnisystem.com was validated on 2025-09-19
abuse-mailbox:  support@jnisystem.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-09-19T03:06:54Z
source:         APNIC

role:           JNI SYSTEM SDN BHD administrator
address:        1210, 12th Floor,, Plaza Taragon Kelana,, No 3. Jalan SS6/6,, Kelana Jaya, Petaling Jaya Selangor 47
country:        MY
phone:          +60378878180
fax-no:         +60378878180
e-mail:         abuse@jnisystem.com
admin-c:        JSSB2-AP
tech-c:         JSSB2-AP
nic-hdl:        JSSB2-AP
mnt-by:         MAINT-JNI-MY
last-modified:  2017-09-15T02:30:42Z
source:         APNIC

% Information related to '103.101.50.0/24AS202736'

route:          103.101.50.0/24
origin:         AS202736
descr:          JNI SYSTEM SDN BHD
                1210, 12th Floor,
                Plaza Taragon Kelana,
                No 3. Jalan SS6/6,, Kelana Jaya
mnt-by:         MAINT-JNI-MY
last-modified:  2025-11-26T12:20:46Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.101.50.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15986
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.101.50.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025112901 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 29 15:45:41 CST 2025
;; MSG SIZE  rcvd: 106
Host info
70.50.101.103.in-addr.arpa domain name pointer 103-101-50-70.kroservices.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.50.101.103.in-addr.arpa	name = 103-101-50-70.kroservices.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
191.240.229.167 attackbots
Unauthorized connection attempt detected from IP address 191.240.229.167 to port 82 [J]
2020-01-18 19:51:50
143.255.243.190 attackbots
Unauthorized connection attempt detected from IP address 143.255.243.190 to port 80 [J]
2020-01-18 19:57:15
194.182.65.100 attackbots
Jan 18 09:35:20 ns382633 sshd\[5906\]: Invalid user jenkins from 194.182.65.100 port 37768
Jan 18 09:35:20 ns382633 sshd\[5906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.65.100
Jan 18 09:35:23 ns382633 sshd\[5906\]: Failed password for invalid user jenkins from 194.182.65.100 port 37768 ssh2
Jan 18 09:38:31 ns382633 sshd\[6133\]: Invalid user ubuntu from 194.182.65.100 port 40684
Jan 18 09:38:31 ns382633 sshd\[6133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.65.100
2020-01-18 19:25:38
93.126.149.216 attack
Unauthorized connection attempt detected from IP address 93.126.149.216 to port 2223 [J]
2020-01-18 20:00:56
46.23.199.14 attack
Unauthorized connection attempt detected from IP address 46.23.199.14 to port 3389 [J]
2020-01-18 19:42:14
42.117.130.60 attackbots
Unauthorized connection attempt detected from IP address 42.117.130.60 to port 23 [J]
2020-01-18 19:44:14
152.136.44.49 attackbotsspam
Jan 18 07:06:01 ns382633 sshd\[14013\]: Invalid user db2admin from 152.136.44.49 port 41940
Jan 18 07:06:01 ns382633 sshd\[14013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.44.49
Jan 18 07:06:03 ns382633 sshd\[14013\]: Failed password for invalid user db2admin from 152.136.44.49 port 41940 ssh2
Jan 18 07:23:30 ns382633 sshd\[16646\]: Invalid user bsnl from 152.136.44.49 port 52512
Jan 18 07:23:30 ns382633 sshd\[16646\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.44.49
2020-01-18 19:33:47
145.239.11.235 attackbotsspam
Unauthorized connection attempt detected from IP address 145.239.11.235 to port 2220 [J]
2020-01-18 19:56:56
202.53.51.129 attack
Unauthorized connection attempt detected from IP address 202.53.51.129 to port 80 [J]
2020-01-18 19:49:45
91.106.77.53 attackbots
Unauthorized connection attempt detected from IP address 91.106.77.53 to port 8080 [J]
2020-01-18 19:38:54
170.254.73.133 attack
Unauthorized connection attempt detected from IP address 170.254.73.133 to port 8080 [J]
2020-01-18 19:32:10
193.33.38.234 attackspambots
Automatic report - Banned IP Access
2020-01-18 19:25:51
195.158.30.34 attackspambots
Unauthorized connection attempt detected from IP address 195.158.30.34 to port 21 [J]
2020-01-18 19:25:05
189.41.90.166 attack
Unauthorized connection attempt detected from IP address 189.41.90.166 to port 81 [J]
2020-01-18 19:27:38
182.218.197.150 attackbots
Unauthorized connection attempt detected from IP address 182.218.197.150 to port 88 [J]
2020-01-18 19:53:07

Recently Reported IPs

156.214.245.235 22.225.54.38 122.225.54.38 196.251.100.27
45.192.113.57 14.213.27.192 8.212.115.61 10.115.158.151
54.251.192.137 47.237.64.203 47.237.26.31 92.255.207.132
92.255.207.130 211.101.247.47 54.174.255.31 115.198.21.102
182.61.55.53 47.57.190.228 103.196.9.32 34.38.242.32