Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hāthras

Region: Uttar Pradesh

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.160.196.0 - 103.160.197.255'

% Abuse contact for '103.160.196.0 - 103.160.197.255' is 'info@jmdenterprise.co.in'

inetnum:        103.160.196.0 - 103.160.197.255
netname:        JMDENTRP
descr:          Jmd Enterprises
admin-c:        NA799-AP
tech-c:         NA799-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-lower:      MAINT-IN-JMDENTRP
mnt-lower:      MAINT-IN-IRINN
mnt-irt:        IRT-JMDENTRP-IN
mnt-routes:     MAINT-IN-JMDENTRP
mnt-routes:     MAINT-IN-IRINN
status:         ASSIGNED PORTABLE
last-modified:  2026-04-16T04:44:03Z
source:         APNIC

irt:            IRT-JMDENTRP-IN
address:        Shop No. 112, Sector 6 Market, Sector 6 , Bahadurgarh, Distt. Jhajjar, Haryana - 124507
e-mail:         admin@jmdenterprise.co.in
abuse-mailbox:  info@jmdenterprise.co.in
admin-c:        NA799-AP
tech-c:         NA799-AP
auth:           # Filtered
mnt-by:         MAINT-IN-JMDENTRP
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-04-17T06:06:15Z
source:         APNIC

role:           Network admin
address:        Shop No. 112, Sector 6 Market, Sector 6 , Bahadurgarh, Distt. Jhajjar, Haryana - 124507
country:        IN
phone:          +91 9812007320
e-mail:         admin@jmdenterprise.co.in
admin-c:        SK2459-AP
tech-c:         SK2459-AP
nic-hdl:        NA799-AP
mnt-by:         MAINT-IN-JMDENTRP
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:03:19Z
source:         APNIC

% Information related to '103.160.197.0/24AS135761'

route:          103.160.197.0/24
descr:          Bharat Digital Network Private Limited
origin:         AS135761
mnt-by:         MAINT-IN-BHARATIP
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
mnt-routes:     MAINT-IN-BHARATIP
last-modified:  2025-12-14T22:22:52Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.160.197.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22273
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.160.197.222.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026052300 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 23 14:00:27 CST 2026
;; MSG SIZE  rcvd: 108
Host info
222.197.160.103.in-addr.arpa domain name pointer static-103-160-197-222.unpl.net.
Nslookup info:
b'222.197.160.103.in-addr.arpa	name = static-103-160-197-222.unpl.net.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
121.27.57.251 attackspambots
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=24854 TCP DPT=8080 WINDOW=12092 SYN 
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=30922 TCP DPT=8080 WINDOW=15944 SYN 
Unauthorised access (Oct  7) SRC=121.27.57.251 LEN=40 TTL=49 ID=22031 TCP DPT=8080 WINDOW=57836 SYN 
Unauthorised access (Oct  6) SRC=121.27.57.251 LEN=40 TTL=49 ID=24503 TCP DPT=8080 WINDOW=12092 SYN 
Unauthorised access (Oct  6) SRC=121.27.57.251 LEN=40 TTL=49 ID=63019 TCP DPT=8080 WINDOW=12092 SYN
2019-10-07 18:04:34
109.116.196.174 attack
Oct  7 04:45:20 ms-srv sshd[23356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.116.196.174  user=root
Oct  7 04:45:23 ms-srv sshd[23356]: Failed password for invalid user root from 109.116.196.174 port 45782 ssh2
2019-10-07 17:54:11
162.209.215.34 attackspambots
ECShop Remote Code Execution Vulnerability
2019-10-07 17:44:44
222.186.15.204 attack
SSH Brute Force, server-1 sshd[25230]: Failed password for root from 222.186.15.204 port 49744 ssh2
2019-10-07 17:46:18
200.56.88.249 attackspam
Automatic report - Port Scan Attack
2019-10-07 17:29:24
54.38.184.235 attackspam
Unauthorized SSH login attempts
2019-10-07 17:23:24
222.186.52.107 attack
Oct  7 11:40:59 nextcloud sshd\[18748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107  user=root
Oct  7 11:41:01 nextcloud sshd\[18748\]: Failed password for root from 222.186.52.107 port 59094 ssh2
Oct  7 11:41:28 nextcloud sshd\[19670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.107  user=root
...
2019-10-07 17:51:47
111.252.199.52 attackbots
Telnet Server BruteForce Attack
2019-10-07 17:37:22
89.40.122.128 attackspambots
Oct  7 11:40:32 meumeu sshd[20176]: Failed password for root from 89.40.122.128 port 57010 ssh2
Oct  7 11:44:07 meumeu sshd[20704]: Failed password for root from 89.40.122.128 port 41198 ssh2
...
2019-10-07 17:47:55
170.130.126.214 attack
php WP PHPmyadamin ABUSE blocked for 12h
2019-10-07 18:08:11
149.56.44.101 attack
Oct  6 17:38:10 kapalua sshd\[4166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
Oct  6 17:38:13 kapalua sshd\[4166\]: Failed password for root from 149.56.44.101 port 47944 ssh2
Oct  6 17:42:11 kapalua sshd\[4676\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
Oct  6 17:42:12 kapalua sshd\[4676\]: Failed password for root from 149.56.44.101 port 59834 ssh2
Oct  6 17:46:08 kapalua sshd\[5041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.ip-149-56-44.net  user=root
2019-10-07 17:30:51
115.77.187.18 attackspambots
Oct  7 05:46:09 lnxmysql61 sshd[1646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.77.187.18
2019-10-07 17:31:07
14.29.237.125 attack
Oct  6 20:07:22 php1 sshd\[9631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.237.125  user=root
Oct  6 20:07:24 php1 sshd\[9631\]: Failed password for root from 14.29.237.125 port 36638 ssh2
Oct  6 20:11:42 php1 sshd\[10249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.237.125  user=root
Oct  6 20:11:44 php1 sshd\[10249\]: Failed password for root from 14.29.237.125 port 41078 ssh2
Oct  6 20:16:19 php1 sshd\[10817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.29.237.125  user=root
2019-10-07 17:26:40
112.172.147.34 attackbots
Oct  7 09:22:04 game-panel sshd[32645]: Failed password for root from 112.172.147.34 port 44078 ssh2
Oct  7 09:26:37 game-panel sshd[332]: Failed password for root from 112.172.147.34 port 27703 ssh2
2019-10-07 17:36:51
167.71.224.91 attack
Oct  7 09:42:06 localhost sshd\[12922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.224.91  user=root
Oct  7 09:42:07 localhost sshd\[12922\]: Failed password for root from 167.71.224.91 port 42608 ssh2
Oct  7 09:46:37 localhost sshd\[13349\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.224.91  user=root
2019-10-07 17:29:41

Recently Reported IPs

34.38.143.207 36.139.224.230 195.201.124.121 2606:4700:10::6814:8768
74.222.3.127 36.106.167.84 185.194.216.236 1.24.16.11
2606:4700:10::6814:7236 2606:4700:10::6814:9556 14.207.194.163 2606:4700:10::6814:5760
2606:4700:10::6814:5132 2606:4700:10::6816:407d 69.5.169.78 69.5.169.64
69.5.169.50 69.5.169.39 103.173.7.219 2606:4700:10::6816:4391