Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.207.96.0 - 103.207.99.255'

% Abuse contact for '103.207.96.0 - 103.207.99.255' is 'abuse@jks.co.id'

inetnum:        103.207.96.0 - 103.207.99.255
netname:        JKSNET-ID
descr:          PT Jaya Kartha Solusindo
descr:          Internet Service Provider
descr:          Jl. Tegal Dukuh Selatan No.88X
descr:          Padangsambian, Denpasar Barat
descr:          Denpasar, Bali, 80117
admin-c:        JT1398-AP
tech-c:         JT1398-AP
country:        ID
mnt-by:         MNT-APJII-ID
mnt-lower:      MAINT-ID-JKS
mnt-irt:        IRT-JKS-ID
mnt-routes:     MAINT-ID-JKS
status:         ALLOCATED PORTABLE
last-modified:  2016-01-25T07:18:37Z
source:         APNIC

irt:            IRT-JKS-ID
address:        PT Jaya Kartha Solusindo
address:        Jl. Tegal Dukuh Selatan No.88X
address:        Padangsambian, Denpasar Barat
address:        Denpasar, Bali, 80117
e-mail:         info@jks.co.id
abuse-mailbox:  abuse@jks.co.id
admin-c:        JT1398-AP
tech-c:         JT1398-AP
auth:           # Filtered
mnt-by:         MAINT-ID-JKS
last-modified:  2025-09-04T04:54:23Z
source:         APNIC

person:         Jeschae Thosuly
address:        Jl. Tegal Dukuh Selatan No.88X
address:        Bali 80117, Indonesia
country:        ID
phone:          +62-361-9005077
e-mail:         jetho@jks.co.id
nic-hdl:        JT1398-AP
mnt-by:         MAINT-ID-JKS
fax-no:         +62-361-9005077
last-modified:  2016-01-25T07:24:55Z
source:         APNIC

% Information related to '103.207.96.0/22AS134643'

route:          103.207.96.0/22
descr:          Route Object for JKSNET
descr:          Internet Service Provider
descr:          Jl. Tegal Dukuh Selatan No.88X
descr:          Padangsambian, Denpasar Barat
descr:          Denpasar, Bali, 80117
origin:         AS134643
mnt-by:         MAINT-ID-JKS
last-modified:  2016-01-28T04:03:04Z
source:         APNIC

% Information related to '103.207.96.0 - 103.207.99.255'

inetnum:        103.207.96.0 - 103.207.99.255
netname:        JKSNET-ID
descr:          PT Jaya Kartha Solusindo
descr:          Internet Service Provider
descr:          Jl. Tegal Dukuh Selatan No.88X
descr:          Padangsambian, Denpasar Barat
descr:          Denpasar, Bali, 80117
admin-c:        JT1398-AP
tech-c:         JT1398-AP
country:        ID
mnt-by:         MNT-APJII-ID
mnt-lower:      MAINT-ID-JKS
mnt-irt:        IRT-JKS-ID
mnt-routes:     MAINT-ID-JKS
status:         ALLOCATED PORTABLE
last-modified:  2016-01-25T07:18:37Z
source:         IDNIC

irt:            IRT-JKS-ID
address:        PT Jaya Kartha Solusindo
address:        Jl. Tegal Dukuh Selatan No.88X
address:        Padangsambian, Denpasar Barat
address:        Denpasar, Bali, 80117
e-mail:         info@jks.co.id
abuse-mailbox:  abuse@jks.co.id
admin-c:        JT1398-AP
tech-c:         JT1398-AP
auth:           # Filtered
mnt-by:         MAINT-ID-JKS
last-modified:  2016-01-05T07:16:50Z
source:         IDNIC

person:         Jeschae Thosuly
address:        Jl. Tegal Dukuh Selatan No.88X
address:        Bali 80117, Indonesia
country:        ID
phone:          +62-361-9005077
e-mail:         jetho@jks.co.id
nic-hdl:        JT1398-AP
mnt-by:         MAINT-ID-JKS
fax-no:         +62-361-9005077
last-modified:  2016-01-25T07:24:55Z
source:         IDNIC

% Information related to '103.207.96.0/22AS134643'

route:          103.207.96.0/22
descr:          Route Object for JKSNET
descr:          Internet Service Provider
descr:          Jl. Tegal Dukuh Selatan No.88X
descr:          Padangsambian, Denpasar Barat
descr:          Denpasar, Bali, 80117
origin:         AS134643
mnt-by:         MAINT-ID-JKS
last-modified:  2016-01-28T04:03:04Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.207.99.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18135
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.207.99.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110601 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 05:31:06 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 1.99.207.103.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 103.207.99.1.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
159.203.203.64 attackspam
port scan and connect, tcp 143 (imap)
2019-09-06 12:08:56
49.81.231.186 attackbots
Brute force attempt
2019-09-06 11:54:35
110.88.25.14 attackspam
Fail2Ban - FTP Abuse Attempt
2019-09-06 12:30:53
112.85.42.177 attackbotsspam
$f2bV_matches
2019-09-06 11:54:17
54.38.185.87 attackbotsspam
Sep  6 06:12:28 markkoudstaal sshd[13046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.87
Sep  6 06:12:30 markkoudstaal sshd[13046]: Failed password for invalid user 1 from 54.38.185.87 port 46828 ssh2
Sep  6 06:16:51 markkoudstaal sshd[13396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.185.87
2019-09-06 12:24:34
205.185.125.82 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2019-09-06 11:56:14
46.101.255.104 attackbotsspam
Sep  5 16:01:38 hcbb sshd\[27141\]: Invalid user ftpadmin from 46.101.255.104
Sep  5 16:01:38 hcbb sshd\[27141\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.255.104
Sep  5 16:01:40 hcbb sshd\[27141\]: Failed password for invalid user ftpadmin from 46.101.255.104 port 36360 ssh2
Sep  5 16:10:52 hcbb sshd\[28360\]: Invalid user sysop from 46.101.255.104
Sep  5 16:10:52 hcbb sshd\[28360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.255.104
2019-09-06 11:49:17
14.63.165.49 attack
Sep  5 19:17:40 aat-srv002 sshd[32607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.165.49
Sep  5 19:17:42 aat-srv002 sshd[32607]: Failed password for invalid user 1234567890 from 14.63.165.49 port 49610 ssh2
Sep  5 19:22:50 aat-srv002 sshd[32750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.165.49
Sep  5 19:22:53 aat-srv002 sshd[32750]: Failed password for invalid user root123 from 14.63.165.49 port 43505 ssh2
...
2019-09-06 11:54:55
140.143.157.33 attack
Sep  5 22:36:48 aat-srv002 sshd[6171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.157.33
Sep  5 22:36:50 aat-srv002 sshd[6171]: Failed password for invalid user mumbleserver from 140.143.157.33 port 44046 ssh2
Sep  5 22:41:01 aat-srv002 sshd[6315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.157.33
Sep  5 22:41:03 aat-srv002 sshd[6315]: Failed password for invalid user svnuser from 140.143.157.33 port 54390 ssh2
...
2019-09-06 11:57:11
111.177.32.83 attackbots
Sep  6 06:50:07 intra sshd\[35940\]: Invalid user ansible from 111.177.32.83Sep  6 06:50:10 intra sshd\[35940\]: Failed password for invalid user ansible from 111.177.32.83 port 34308 ssh2Sep  6 06:55:00 intra sshd\[36029\]: Invalid user demo from 111.177.32.83Sep  6 06:55:02 intra sshd\[36029\]: Failed password for invalid user demo from 111.177.32.83 port 49618 ssh2Sep  6 06:59:52 intra sshd\[36081\]: Invalid user nagios from 111.177.32.83Sep  6 06:59:54 intra sshd\[36081\]: Failed password for invalid user nagios from 111.177.32.83 port 36676 ssh2
...
2019-09-06 12:10:07
138.118.123.248 attackspambots
Automatic report - Port Scan Attack
2019-09-06 12:21:33
61.37.82.220 attack
Sep  5 18:13:29 sachi sshd\[31624\]: Invalid user vncuser from 61.37.82.220
Sep  5 18:13:29 sachi sshd\[31624\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220
Sep  5 18:13:32 sachi sshd\[31624\]: Failed password for invalid user vncuser from 61.37.82.220 port 51500 ssh2
Sep  5 18:18:10 sachi sshd\[32053\]: Invalid user test from 61.37.82.220
Sep  5 18:18:10 sachi sshd\[32053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.37.82.220
2019-09-06 12:25:01
81.174.227.27 attackspambots
Sep  5 23:55:05 ny01 sshd[1854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.174.227.27
Sep  5 23:55:07 ny01 sshd[1854]: Failed password for invalid user odoo from 81.174.227.27 port 50790 ssh2
Sep  5 23:59:25 ny01 sshd[2725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.174.227.27
2019-09-06 12:01:42
157.230.7.0 attack
Sep  5 23:46:58 plusreed sshd[11888]: Invalid user sinusbot1 from 157.230.7.0
...
2019-09-06 11:59:45
94.191.47.240 attackbotsspam
Sep  5 20:52:42 mail sshd\[15264\]: Invalid user ts2 from 94.191.47.240 port 43002
Sep  5 20:52:42 mail sshd\[15264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.240
Sep  5 20:52:45 mail sshd\[15264\]: Failed password for invalid user ts2 from 94.191.47.240 port 43002 ssh2
Sep  5 20:56:36 mail sshd\[15722\]: Invalid user testuser from 94.191.47.240 port 35464
Sep  5 20:56:36 mail sshd\[15722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.47.240
2019-09-06 11:57:44

Recently Reported IPs

139.59.134.212 147.33.60.219 143.110.255.1 135.119.89.68
182.109.53.18 182.109.53.214 154.12.95.211 166.0.199.103
185.32.4.9 180.153.236.81 180.153.236.228 172.95.16.103
204.117.214.10 45.128.199.173 45.128.199.163 38.55.205.96
124.29.214.132 43.129.52.248 61.189.37.59 47.89.232.167