Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osaka

Region: Osaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.96.15.4 attackspambots
20/8/27@09:01:55: FAIL: Alarm-Network address from=103.96.15.4
20/8/27@09:01:55: FAIL: Alarm-Network address from=103.96.15.4
...
2020-08-27 22:33:25
103.96.16.24 attack
Port Scan
...
2020-08-11 22:24:28
103.96.150.135 attackbots
20 attempts against mh_ha-misbehave-ban on dawn
2020-06-04 13:01:57
103.96.150.135 attack
20 attempts against mh-misbehave-ban on beach
2020-06-03 18:54:46
103.96.149.222 attackspambots
PHP Info File Request - Possible PHP Version Scan
2020-05-16 00:04:26
103.96.12.61 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-03 16:48:42
103.96.18.133 attack
Sun, 21 Jul 2019 07:36:08 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 22:44:58
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.96.1.0 - 103.96.1.255'

% Abuse contact for '103.96.1.0 - 103.96.1.255' is 'abuse@unrivalednet.com'

inetnum:        103.96.1.0 - 103.96.1.255
netname:        Unrivalednet
descr:          Unrivalednet
country:        JP
admin-c:        DG605-AP
tech-c:         DG605-AP
abuse-c:        DG605-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-DFGROUP-JP
mnt-irt:        IRT-DFGROUP-JP
last-modified:  2025-05-29T10:30:10Z
source:         APNIC

irt:            IRT-DFGROUP-JP
address:        5851 West Side Ave, North Bergen, NJ, US
e-mail:         abuse@unrivalednet.com
abuse-mailbox:  abuse@unrivalednet.com
admin-c:        DG605-AP
tech-c:         DG605-AP
auth:           # Filtered
remarks:        abuse@unrivalednet.com was validated on 2025-10-28
mnt-by:         MAINT-DFGROUP-JP
last-modified:  2025-11-18T00:35:02Z
source:         APNIC

role:           Df group
address:        5851 West Side Ave, North Bergen, NJ, US
country:        JP
phone:          +1 612 567 3848
e-mail:         abuse@unrivalednet.com
admin-c:        DG605-AP
tech-c:         DG605-AP
nic-hdl:        DG605-AP
mnt-by:         MAINT-DFGROUP-JP
last-modified:  2023-08-14T08:26:10Z
source:         APNIC

% Information related to '103.96.1.0/24AS149296'

route:          103.96.1.0/24
descr:          joy
origin:         AS149296
mnt-by:         MAINT-DFGROUP-JP
last-modified:  2025-08-31T03:55:17Z
source:         APNIC

% Information related to '103.96.1.0/24AS152475'

route:          103.96.1.0/24
descr:          joy
origin:         AS152475
mnt-by:         MAINT-DFGROUP-JP
last-modified:  2025-11-20T06:48:43Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.96.1.160
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4854
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.96.1.160.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026031300 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 13 14:30:45 CST 2026
;; MSG SIZE  rcvd: 105
Host info
160.1.96.103.in-addr.arpa domain name pointer undefined.hostname.localhost.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
160.1.96.103.in-addr.arpa	name = undefined.hostname.localhost.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.161.104.11 attackbots
Sat, 20 Jul 2019 21:55:14 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:04:06
51.83.78.56 attackspambots
Jul 21 04:31:26 SilenceServices sshd[12313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.78.56
Jul 21 04:31:27 SilenceServices sshd[12313]: Failed password for invalid user john from 51.83.78.56 port 43504 ssh2
Jul 21 04:37:00 SilenceServices sshd[15124]: Failed password for root from 51.83.78.56 port 35852 ssh2
2019-07-21 10:57:11
39.45.235.140 attack
Sat, 20 Jul 2019 21:55:20 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:44:05
1.1.214.212 attack
Sat, 20 Jul 2019 21:55:20 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:48:37
102.184.86.209 attackspambots
Sat, 20 Jul 2019 21:55:27 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:28:32
14.249.141.161 attack
Sat, 20 Jul 2019 21:55:28 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:26:31
94.41.0.157 attackspam
Sat, 20 Jul 2019 21:55:19 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:49:46
27.5.231.194 attackbotsspam
Sat, 20 Jul 2019 21:55:18 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:54:55
36.79.195.15 attack
Sat, 20 Jul 2019 21:55:25 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:30:48
41.41.20.203 attackspam
Sat, 20 Jul 2019 21:55:19 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:50:54
94.213.245.72 attackspam
Sat, 20 Jul 2019 21:55:18 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:53:48
125.90.205.173 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-20 20:45:21,081 INFO [amun_request_handler] PortScan Detected on Port: 139 (125.90.205.173)
2019-07-21 10:55:55
179.108.32.33 attack
Sat, 20 Jul 2019 21:55:15 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:02:13
102.140.226.183 attack
Sat, 20 Jul 2019 21:55:15 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 11:03:11
190.74.72.25 attack
Sat, 20 Jul 2019 21:55:20 +0000 likely compromised host or open proxy. ddos rate spidering
2019-07-21 10:45:58

Recently Reported IPs

223.104.124.112 61.166.210.53 221.13.93.113 118.212.121.58
15.9.0.167 3.254.70.213 10.50.0.62 225.67.122.218
27.47.42.237 27.47.42.85 212.135.214.5 61.48.133.81
34.38.53.187 38.55.172.148 125.71.95.85 20.87.107.130
163.176.138.17 8.136.203.46 52.200.238.15 52.30.206.37