City: Hāthras
Region: Uttar Pradesh
Country: India
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '103.160.196.0 - 103.160.197.255'
% Abuse contact for '103.160.196.0 - 103.160.197.255' is 'info@jmdenterprise.co.in'
inetnum: 103.160.196.0 - 103.160.197.255
netname: JMDENTRP
descr: Jmd Enterprises
admin-c: NA799-AP
tech-c: NA799-AP
country: IN
mnt-by: MAINT-IN-IRINN
mnt-lower: MAINT-IN-JMDENTRP
mnt-lower: MAINT-IN-IRINN
mnt-irt: IRT-JMDENTRP-IN
mnt-routes: MAINT-IN-JMDENTRP
mnt-routes: MAINT-IN-IRINN
status: ASSIGNED PORTABLE
last-modified: 2026-04-16T04:44:03Z
source: APNIC
irt: IRT-JMDENTRP-IN
address: Shop No. 112, Sector 6 Market, Sector 6 , Bahadurgarh, Distt. Jhajjar, Haryana - 124507
e-mail: admin@jmdenterprise.co.in
abuse-mailbox: info@jmdenterprise.co.in
admin-c: NA799-AP
tech-c: NA799-AP
auth: # Filtered
mnt-by: MAINT-IN-JMDENTRP
mnt-by: MAINT-IN-IRINN
last-modified: 2026-04-17T06:06:15Z
source: APNIC
role: Network admin
address: Shop No. 112, Sector 6 Market, Sector 6 , Bahadurgarh, Distt. Jhajjar, Haryana - 124507
country: IN
phone: +91 9812007320
e-mail: admin@jmdenterprise.co.in
admin-c: SK2459-AP
tech-c: SK2459-AP
nic-hdl: NA799-AP
mnt-by: MAINT-IN-JMDENTRP
mnt-by: MAINT-IN-IRINN
last-modified: 2025-09-27T10:03:19Z
source: APNIC
% Information related to '103.160.197.0/24AS135761'
route: 103.160.197.0/24
descr: Bharat Digital Network Private Limited
origin: AS135761
mnt-by: MAINT-IN-BHARATIP
mnt-by: MAINT-IN-IRINN
mnt-routes: MAINT-IN-IRINN
mnt-routes: MAINT-IN-BHARATIP
last-modified: 2025-12-14T22:22:52Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.160.197.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;103.160.197.222. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 14:00:27 CST 2026
;; MSG SIZE rcvd: 108
222.197.160.103.in-addr.arpa domain name pointer static-103-160-197-222.unpl.net.
b'222.197.160.103.in-addr.arpa name = static-103-160-197-222.unpl.net.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 121.27.57.251 | attackspambots | Unauthorised access (Oct 7) SRC=121.27.57.251 LEN=40 TTL=49 ID=24854 TCP DPT=8080 WINDOW=12092 SYN Unauthorised access (Oct 7) SRC=121.27.57.251 LEN=40 TTL=49 ID=30922 TCP DPT=8080 WINDOW=15944 SYN Unauthorised access (Oct 7) SRC=121.27.57.251 LEN=40 TTL=49 ID=22031 TCP DPT=8080 WINDOW=57836 SYN Unauthorised access (Oct 6) SRC=121.27.57.251 LEN=40 TTL=49 ID=24503 TCP DPT=8080 WINDOW=12092 SYN Unauthorised access (Oct 6) SRC=121.27.57.251 LEN=40 TTL=49 ID=63019 TCP DPT=8080 WINDOW=12092 SYN |
2019-10-07 18:04:34 |
| 109.116.196.174 | attack | Oct 7 04:45:20 ms-srv sshd[23356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.196.174 user=root Oct 7 04:45:23 ms-srv sshd[23356]: Failed password for invalid user root from 109.116.196.174 port 45782 ssh2 |
2019-10-07 17:54:11 |
| 162.209.215.34 | attackspambots | ECShop Remote Code Execution Vulnerability |
2019-10-07 17:44:44 |
| 222.186.15.204 | attack | SSH Brute Force, server-1 sshd[25230]: Failed password for root from 222.186.15.204 port 49744 ssh2 |
2019-10-07 17:46:18 |
| 200.56.88.249 | attackspam | Automatic report - Port Scan Attack |
2019-10-07 17:29:24 |
| 54.38.184.235 | attackspam | Unauthorized SSH login attempts |
2019-10-07 17:23:24 |
| 222.186.52.107 | attack | Oct 7 11:40:59 nextcloud sshd\[18748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107 user=root Oct 7 11:41:01 nextcloud sshd\[18748\]: Failed password for root from 222.186.52.107 port 59094 ssh2 Oct 7 11:41:28 nextcloud sshd\[19670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107 user=root ... |
2019-10-07 17:51:47 |
| 111.252.199.52 | attackbots | Telnet Server BruteForce Attack |
2019-10-07 17:37:22 |
| 89.40.122.128 | attackspambots | Oct 7 11:40:32 meumeu sshd[20176]: Failed password for root from 89.40.122.128 port 57010 ssh2 Oct 7 11:44:07 meumeu sshd[20704]: Failed password for root from 89.40.122.128 port 41198 ssh2 ... |
2019-10-07 17:47:55 |
| 170.130.126.214 | attack | php WP PHPmyadamin ABUSE blocked for 12h |
2019-10-07 18:08:11 |
| 149.56.44.101 | attack | Oct 6 17:38:10 kapalua sshd\[4166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net user=root Oct 6 17:38:13 kapalua sshd\[4166\]: Failed password for root from 149.56.44.101 port 47944 ssh2 Oct 6 17:42:11 kapalua sshd\[4676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net user=root Oct 6 17:42:12 kapalua sshd\[4676\]: Failed password for root from 149.56.44.101 port 59834 ssh2 Oct 6 17:46:08 kapalua sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net user=root |
2019-10-07 17:30:51 |
| 115.77.187.18 | attackspambots | Oct 7 05:46:09 lnxmysql61 sshd[1646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.77.187.18 |
2019-10-07 17:31:07 |
| 14.29.237.125 | attack | Oct 6 20:07:22 php1 sshd\[9631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.237.125 user=root Oct 6 20:07:24 php1 sshd\[9631\]: Failed password for root from 14.29.237.125 port 36638 ssh2 Oct 6 20:11:42 php1 sshd\[10249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.237.125 user=root Oct 6 20:11:44 php1 sshd\[10249\]: Failed password for root from 14.29.237.125 port 41078 ssh2 Oct 6 20:16:19 php1 sshd\[10817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.237.125 user=root |
2019-10-07 17:26:40 |
| 112.172.147.34 | attackbots | Oct 7 09:22:04 game-panel sshd[32645]: Failed password for root from 112.172.147.34 port 44078 ssh2 Oct 7 09:26:37 game-panel sshd[332]: Failed password for root from 112.172.147.34 port 27703 ssh2 |
2019-10-07 17:36:51 |
| 167.71.224.91 | attack | Oct 7 09:42:06 localhost sshd\[12922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.224.91 user=root Oct 7 09:42:07 localhost sshd\[12922\]: Failed password for root from 167.71.224.91 port 42608 ssh2 Oct 7 09:46:37 localhost sshd\[13349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.224.91 user=root |
2019-10-07 17:29:41 |