Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.99.196.10 attack
A spam blank email was sent from this SMTP server. All To headers of this kind of spam emails were "To: undisclosed-recipients:;".
2019-12-04 05:38:27
103.99.196.10 attackbots
Autoban   103.99.196.10 AUTH/CONNECT
2019-11-18 17:30:51
103.99.196.55 attackbotsspam
Unauthorized connection attempt from IP address 103.99.196.55 on Port 445(SMB)
2019-08-28 07:11:24
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.99.196.0 - 103.99.199.255'

% Abuse contact for '103.99.196.0 - 103.99.199.255' is 'SKYNETBROADBANDINDIA@GMAIL.COM'

inetnum:        103.99.196.0 - 103.99.199.255
netname:        SKYNETBR
descr:          Skynet Broadband
admin-c:        MS2171-AP
tech-c:         MA1147-AP
country:        IN
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-SKYNETBR
mnt-routes:     MAINT-IN-IRINN
mnt-irt:        IRT-SKYNETBR-IN
status:         ASSIGNED PORTABLE
last-modified:  2025-08-11T22:49:52Z
source:         APNIC

irt:            IRT-SKYNETBR-IN
address:        WZ 28 SANT NAGAR EXTN TILAK NAGAR,New Delhi,Delhi-110018
e-mail:         SKYNETBROADBANDINDIA@GMAIL.COM
abuse-mailbox:  SKYNETBROADBANDINDIA@GMAIL.COM
admin-c:        MA1147-AP
tech-c:         MA1147-AP
auth:           # Filtered
mnt-by:         MAINT-IN-SKYNETBR
mnt-by:         MAINT-IN-IRINN
last-modified:  2026-04-17T06:08:04Z
source:         APNIC

role:           MANAGER ADMIN
address:        WZ 28 SANT NAGAR EXTN TILAK NAGAR,New Delhi,Delhi-110018
country:        IN
phone:          +91 0112502622
e-mail:         SKYNETBROADBANDINDIA@GMAIL.COM
admin-c:        MS2171-AP
tech-c:         MS2171-AP
nic-hdl:        MA1147-AP
mnt-by:         MAINT-IN-SKYNETBR
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:00:58Z
source:         APNIC

person:         MANPREET SINGH
address:        WZ 28 SANT NAGAR EXTN TILAK NAGAR,New Delhi,Delhi-110018
country:        IN
phone:          +91 0112502622
e-mail:         SKYNETBROADBANDINDIA@GMAIL.COM
nic-hdl:        MS2171-AP
mnt-by:         MAINT-IN-SKYNETBR
mnt-by:         MAINT-IN-IRINN
last-modified:  2025-09-27T10:00:58Z
source:         APNIC

% Information related to '103.99.196.0/24AS140112'

route:          103.99.196.0/24
descr:          Skynet Broadband
origin:         AS140112
mnt-by:         MAINT-IN-SKYNETBR
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:21:03Z
source:         APNIC

% Information related to '103.99.196.0/24AS141275'

route:          103.99.196.0/24
descr:          Route Object
country:        IN
origin:         AS141275
mnt-by:         MAINT-IN-SKYNETBR
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:21:03Z
source:         APNIC

% Information related to '103.99.196.0/24AS17665'

route:          103.99.196.0/24
descr:          Route Object
country:        IN
origin:         AS17665
mnt-by:         MAINT-IN-SKYNETBR
mnt-by:         MAINT-IN-IRINN
mnt-routes:     MAINT-IN-IRINN
last-modified:  2025-12-14T22:21:03Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.99.196.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.99.196.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051600 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 16 22:01:58 CST 2026
;; MSG SIZE  rcvd: 105
Host info
1.196.99.103.in-addr.arpa domain name pointer dynamic.maxnetdigital.in.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.196.99.103.in-addr.arpa	name = dynamic.maxnetdigital.in.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.118.46.160 attackbotsspam
Listed on    zen-spamhaus   / proto=6  .  srcport=54829  .  dstport=1433  .     (2631)
2020-09-27 19:27:08
181.10.16.2 attackspam
181.10.16.2 - - \[26/Sep/2020:13:33:49 -0700\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25181.10.16.2 - - \[26/Sep/2020:13:33:49 -0700\] "POST /index.php/admin HTTP/1.1" 404 20407181.10.16.2 - - \[26/Sep/2020:13:33:49 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 20411
...
2020-09-27 19:33:36
65.52.11.113 attackbotsspam
Invalid user 245 from 65.52.11.113 port 44775
2020-09-27 19:57:11
106.12.133.225 attackspambots
Sep 27 13:39:14 santamaria sshd\[27856\]: Invalid user shun from 106.12.133.225
Sep 27 13:39:14 santamaria sshd\[27856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.133.225
Sep 27 13:39:16 santamaria sshd\[27856\]: Failed password for invalid user shun from 106.12.133.225 port 36374 ssh2
...
2020-09-27 19:40:23
45.178.2.163 attackspam
45.178.2.163 - - \[26/Sep/2020:13:33:30 -0700\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 2045945.178.2.163 - - \[26/Sep/2020:13:33:30 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 2041145.178.2.163 - - \[26/Sep/2020:13:33:30 -0700\] "POST /index.php/admin/index/ HTTP/1.1" 404 20435
...
2020-09-27 19:53:25
103.55.91.131 attackspam
Sep 27 05:39:28 george sshd[10229]: Failed password for invalid user ts3srv from 103.55.91.131 port 61941 ssh2
Sep 27 05:44:30 george sshd[10270]: Invalid user sysop from 103.55.91.131 port 20658
Sep 27 05:44:30 george sshd[10270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.55.91.131 
Sep 27 05:44:32 george sshd[10270]: Failed password for invalid user sysop from 103.55.91.131 port 20658 ssh2
Sep 27 05:49:38 george sshd[10294]: Invalid user ftpuser from 103.55.91.131 port 64081
...
2020-09-27 19:45:14
192.241.235.126 attackbots
9200/tcp 587/tcp 2323/tcp...
[2020-09-20/26]4pkt,4pt.(tcp)
2020-09-27 19:38:51
165.232.64.90 attack
Sep 27 09:24:16 server sshd[842]: Failed password for invalid user zk from 165.232.64.90 port 34590 ssh2
Sep 27 09:34:40 server sshd[6544]: Failed password for invalid user test from 165.232.64.90 port 59874 ssh2
Sep 27 09:38:27 server sshd[8455]: Failed password for root from 165.232.64.90 port 42702 ssh2
2020-09-27 19:49:28
183.131.206.98 attack
445/tcp
[2020-09-27]1pkt
2020-09-27 19:39:53
118.24.11.226 attack
Sep 27 12:18:53 ip106 sshd[6845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.11.226 
Sep 27 12:18:54 ip106 sshd[6845]: Failed password for invalid user karim from 118.24.11.226 port 40250 ssh2
...
2020-09-27 19:57:47
20.188.58.70 attackspam
2020-09-26 UTC: (6x) - 13.239.5.146,219,admin,eglesilk,root(2x)
2020-09-27 19:43:20
190.121.225.140 attackspambots
Unauthorized SMTP/IMAP/POP3 connection attempt
2020-09-27 19:50:37
87.251.74.18 attackspambots
[H1.VM10] Blocked by UFW
2020-09-27 19:26:43
138.91.127.33 attack
Invalid user 252 from 138.91.127.33 port 4312
2020-09-27 19:59:13
193.201.214.51 attackbotsspam
 TCP (SYN) 193.201.214.51:42342 -> port 23, len 44
2020-09-27 20:04:52

Recently Reported IPs

246.40.56.158 48.45.206.112 2606:4700:10::6814:8798 2606:4700:10::ac43:2252
168.231.115.182 223.75.227.182 168.231.115.148 43.153.205.71
161.97.184.127 182.61.24.72 66.132.172.205 51.158.152.114
57.141.14.16 39.100.66.206 31.70.69.187 150.66.91.8
219.165.30.217 103.183.113.57 43.134.111.142 135.237.127.68