The Simple Answer to a Complicated Question: What is the +62 Country Code?
The international dialing code +62 is the country code assigned to the Republic of Indonesia. This designation is managed by the International Telecommunication Union (ITU), the United Nations agency responsible for global information and communication technologies. Within Indonesia, the nation’s telephone numbering plan is regulated by the Indonesian Telecommunication Regulatory Authority under Law Number 36 of 1999.
For anyone in the United States needing to place a call to Indonesia, the process involves a specific sequence. The structure of Indonesian phone numbers differs for landlines and mobile phones, a crucial distinction that has implications for the widespread scams originating from the region.
How to Call Indonesia from the USA
Placing a call from the United States to an Indonesian number requires following the international dialing format :
- Dial the U.S. Exit Code (011): This code signals to the network that you are making an international call.
- Dial the Indonesia Country Code (62): This routes the call to the Indonesian telephone network.
- Dial the Area Code or Mobile Prefix (Omitting the ‘0’): This is the most critical step. When dialing locally within Indonesia, area codes and mobile prefixes begin with a ‘0’. For international calls, this leading ‘0’ must be dropped. For example, the area code for Jakarta is 21, and a mobile prefix might be 815.
- Dial the Subscriber’s Number: This is the final, local portion of the phone number.
Landline vs. Mobile Number Formats
The structure of the number you dial after the +62 country code depends on whether you are calling a fixed landline or a mobile phone:
- Landlines: These numbers use geographic area codes that correspond to a specific city or region. For instance, Jakarta uses the area code 21, and Surabaya uses 31. A complete international call to a Jakarta landline would look like:
+62-21-xxxx-xxxx
. The total length is typically 11 digits, including the country code. - Mobile Phones: Indonesian mobile numbers (GSM or CDMA) do not use geographic area codes. They have a mobile prefix, which usually begins with the digit ‘8’ after the country code (e.g., +62 8xx…). A complete international call to a mobile phone would look like:
+62-8xx-xxxx-xxxxx
. These numbers are typically 12 digits long, including the country code.
This structural difference is significant. The non-geographic nature of mobile numbers provides a layer of anonymity for the user, as the number itself does not reveal a specific city or province. This feature makes mobile numbers, and by extension the WhatsApp accounts linked to them, the preferred tool for scammers who wish to obscure their location while conducting illicit activities on a global scale.
Calling Indonesia from the USA – Quick Reference
Example Call to a Jakarta Landline: 011-62-21-xxxx-xxxx
Example Call to an Indonesian Mobile Phone: 011-62-815-xxxx-xxxxx
The Real Reason You’re Here: Unsolicited WhatsApp Contact from +62 Numbers

While the technical details of the +62 country code are straightforward, the reality for most Americans encountering this number is far more unsettling. If you are reading this report, it is highly probable that you have received an unexpected, unsolicited message or call on WhatsApp from a number beginning with +62.
It is critical to understand that this is almost certainly not a simple “wrong number.” You are likely a target in a massive, coordinated, and fraudulent international campaign. This wave of scams originates not only from Indonesia (+62) but also from a host of other countries, most notably Vietnam (+84), Malaysia (+60), Kenya (+254), and Ethiopia (+251). These campaigns are industrial in scale, targeting millions of users across the globe, including a significant number in the United States.
The initial contact is designed to be a trap. The first message is often disarmingly polite and vague, such as, “Hello, sorry to disturb you. Can we talk for a few minutes?”. The primary goal of this initial message is not to execute the scam itself, but to act as a low-cost filter. By responding—even with a message like “Wrong number” or “Who is this?”—you confirm two critical pieces of information for the scammer: that your phone number is active and that you are a person who engages with unknown contacts. This simple action immediately elevates your number’s value, moving it from a list of millions of potential targets to a smaller, more valuable list of confirmed and responsive individuals ripe for the next stage of the fraud.
The use of an unfamiliar international number is a calculated psychological tactic. For an American user, a call from a domestic area code is easily identified and dismissed as robocalling or local spam. However, a call from Indonesia or Vietnam is an anomaly. It disrupts normal patterns and can trigger curiosity (“Do I know someone there?”) or confusion, making the recipient more likely to lower their guard and engage. This initial engagement is precisely what the scammers are counting on to open the door to their fraudulent schemes.
Anatomy of a Scam: Deconstructing the Most Common Frauds from +62 Numbers
Once a target has been qualified through an initial response, scammers deploy a variety of sophisticated and psychologically manipulative schemes. These frauds are not siloed; they often blend elements of different tactics to increase their effectiveness.
The “Money-for-Likes” Job Scam (Task Scam)
This is currently one of the most prevalent and dangerous scams originating from +62 numbers. It is a multi-stage operation designed to build and then betray trust.
- The Pitch: The scam begins with an unsolicited WhatsApp message from a person claiming to be a recruiter for a well-known or legitimate-sounding company. They offer a lucrative, fully remote, part-time job with incredibly simple duties, such as “optimizing hotel data,” liking YouTube videos, or following TikTok accounts for a high daily wage.
- The Hook (Building Trust): To overcome initial skepticism, the scammer assigns the victim a few simple tasks and then actually pays them a small amount of money, often via a P2P payment app or directly to their bank account. This small, successful transaction is a powerful psychological tool. It leverages the principle of
reciprocity—the scammer gave you something, so you feel a sense of obligation. It also provides “proof” that the job is legitimate, effectively lowering the victim’s defenses.
- The Trap (The “Investment”): Once trust is established, the scammer introduces more advanced “premium tasks” or an “upgraded membership” that promises significantly higher earnings. However, to access these tasks, the victim must first make an upfront payment, purchase cryptocurrency, or deposit their own money into a fraudulent platform controlled by the scammer.
- The Squeeze: After the victim invests their money, the scammer either vanishes or, more commonly, invents a series of new problems. They may claim there are “taxes” to be paid, “withdrawal fees” to be covered, or “system errors” that require an additional payment to resolve. This preys on the
sunk-cost fallacy: the victim, having already invested money, feels compelled to invest more to avoid losing their initial stake, leading to a devastating cycle of financial loss.
Impersonation & Phishing: The “Hi Mom” and Deepfake Threats
These scams rely on deception and the exploitation of personal relationships or trust in authority.
- Impersonation Scams: Scammers create fake WhatsApp profiles, often using photos stolen from social media, to pose as a friend or family member. They will message the victim claiming to have a new phone number and then invent a sudden emergency—”I’ve lost my wallet and phone, I need you to send me money for a cab”—to trick the victim into sending funds before they have time to think critically.
- Phishing Scams: These attacks use malicious links sent via WhatsApp. The message may appear to be an official notification from WhatsApp about account verification, a password reset link, or an enticing offer for a fake promotion. Clicking the link directs the user to a counterfeit website designed to harvest login credentials, credit card details, or install malware on the device.
- The AI-Powered Evolution – Deepfakes: A disturbingly sophisticated threat emerging from Indonesia involves the use of AI-generated deepfakes. Police have uncovered scams where criminals use AI to create highly realistic videos of public figures, such as Indonesian President Prabowo Subianto, appearing to offer financial aid to citizens. Victims who see the video are directed to contact a WhatsApp number, where they are told to pay an “administrative fee” to receive the promised (and non-existent) government funds. This tactic demonstrates the escalating technical capabilities of these criminal organizations.
High-Yield Investment and Crypto Scams
These scams often play a longer game, building rapport before striking.
- The Lure: A scammer, sometimes posing as a potential romantic interest (a romance scam) or a newfound friend, will cultivate a relationship with the victim over weeks or even months. Once trust is established, they will casually mention a “secret” or “can’t-miss” investment opportunity, almost always involving cryptocurrency.
- The Fake Platform: The victim is guided to a professional-looking but entirely fraudulent investment website or mobile app controlled by the scammer. After the victim transfers cryptocurrency to the platform, the website’s interface will show their investment growing at an incredible rate, reinforcing their belief that they are making a fortune.
- The Cash-Out Block: When the victim attempts to withdraw their “profits,” the scam is revealed. The website will block the withdrawal, and the scammer will claim that the victim must first pay exorbitant taxes, transaction fees, or a “minimum withdrawal deposit” to unlock their funds. Any additional money sent is stolen, and the scammer eventually disappears.
The Source: Understanding Indonesia’s Role in the Global Scam Network
The prevalence of scams originating from +62 numbers is not an accident but the result of a confluence of demographic, technological, and socioeconomic factors that have created a fertile ground for cybercrime. Indonesia represents a “perfect storm” for the proliferation of mobile-based fraud.
The sheer scale of the country is the first factor. As the world’s fourth most populous nation, with a 2024 population estimated to be over 280 million, Indonesia provides a massive pool of both potential targets and potential recruits for criminal enterprises. The population is also notably young, with a median age of around 30, indicating a digitally native generation comfortable with mobile technology.
This demographic reality is coupled with a digital explosion. In early 2024, Indonesia was home to 185.3 million internet users and a staggering 353.3 million active cellular mobile connections—a figure equivalent to 126.8% of the total population, highlighting the widespread use of multiple SIM cards and devices. Platforms like WhatsApp, YouTube, and TikTok are deeply integrated into daily life, making WhatsApp the perfect, low-cost medium for scammers to reach millions.
However, this rapid technological adoption has outpaced the development of digital literacy. While internet penetration in urban centers like Jakarta is high, a significant digital literacy gap persists, particularly in rural areas and among certain demographics. Many users are not equipped to recognize the sophisticated social engineering and phishing tactics used in modern scams, making them vulnerable. This environment, combined with economic pressures and the allure of easy money, can make participating in scam operations an attractive prospect for some individuals.
This is not solely an Indonesian problem but part of a larger, highly organized regional cybercrime ecosystem. Law enforcement reports indicate that transnational criminal syndicates operate across Southeast Asia, often from under-regulated special economic zones and border areas. These groups run a highly industrialized “criminal service economy,” leveraging advanced technologies like AI and cryptocurrency to conduct fraud on a global scale, with Southeast Asia serving as a key operational hub and testing ground.
Indonesia: Digital & Demographic Snapshot (2024-2025)
Metric | Data | Source(s) |
Total Population (2024 Est.) | 280-284 million | |
Global Population Rank | 4th | |
Median Age | 30.4 years | |
Internet Users (Jan 2024) | 185.3 million | |
Internet Penetration | 66.5% | |
Active Mobile Connections | 353.3 million (126.8% of pop.) | |
Active Social Media Users | 139 million | |
Capital | Jakarta | |
Currency | Indonesian Rupiah (IDR) |
Your Digital Defense: A Step-by-Step Guide to Protecting Yourself
While these scams are sophisticated, users can take clear, actionable steps to build a strong digital defense. The most effective strategy is proactive, focusing on preventing engagement rather than trying to recover from a successful attack.
The First Rule: Do Not Engage
The single most effective defense is to never reply to unsolicited messages and never answer calls from unknown international numbers. As established, any form of engagement confirms your number is active and makes you a priority target for more persistent and manipulative scams.
Using WhatsApp’s Built-in Tools
WhatsApp provides several tools to help secure your account. It is highly recommended that all users enable these features.
- Block & Report: If you receive a suspicious message, immediately use the “Block and Report” function. This not only prevents the scammer from contacting you again but also sends a report to WhatsApp. This data helps WhatsApp’s artificial intelligence and machine learning systems identify and ban fraudulent accounts on a mass scale, protecting the wider community.
- Privacy Settings: Navigate to your WhatsApp privacy settings and adjust who can see your personal information. It is strongly advised to set your “Last Seen & Online,” “Profile Photo,” and “About” information to “My Contacts”. This prevents unknown numbers from gathering personal details that could be used in impersonation scams.
- Two-Step Verification: This is a crucial security feature that adds a six-digit PIN to your account. When you register your phone number with WhatsApp again, you will be required to enter this PIN, preventing a scammer from hijacking your account even if they manage to compromise your SIM card or intercept an SMS verification code.
Recognizing the Red Flags: A Scammer’s Checklist
Train yourself to recognize the common hallmarks of a scam. Be skeptical of any message that includes the following:
- Unsolicited Contact: The message comes from an unknown number with an offer or request you were not expecting.
- Urgency and Emotion: The message creates a sense of panic, excitement, or fear. Look for words like “urgent,” “emergency,” “act now,” or “limited time offer”.
- Too Good to Be True: The offer is unrealistic. A job paying hundreds of dollars a day for liking videos, a free high-end gadget, or a guaranteed high-return investment are all major red flags.
- Poor Grammar and Spelling: Many scam messages are riddled with grammatical errors and awkward phrasing.
- Requests for Money or Personal Information: Legitimate companies will never use WhatsApp to ask you for upfront fees, bank details, or your Social Security number.
- Suspicious Links or Attachments: Never click on links or download files from unknown senders.
- Unprofessional Communication: For job scams, an entire interview process conducted exclusively via a messaging app like WhatsApp is a definitive sign of fraud.
When Scams Succeed: How to Report Fraud to U.S. Authorities
If you fall victim to a scam, reporting the incident to federal authorities is a critical step. While it may not lead to the direct recovery of your funds, your report provides vital data for law enforcement agencies to combat these criminal networks. The modern fight against global cybercrime is a data-driven effort; each individual report is a piece of a larger puzzle that helps investigators identify trends, track criminal infrastructure, and build cases for prosecution.
Reporting to the Federal Trade Commission (FTC)
The FTC is the primary U.S. agency for collecting reports on consumer fraud.
- Main Portal: Report the scam at the official website: ReportFraud.ftc.gov. The site will guide you through a process of detailing what happened.
- International Scams: For fraud that crosses international borders, the FTC also operates a specific portal in partnership with agencies from other countries: econsumer.gov.
Your report is entered into the Consumer Sentinel Network, a secure database accessible to thousands of civil and criminal law enforcement partners worldwide.
Reporting to the FBI’s Internet Crime Complaint Center (IC3)
The IC3 is the central hub for the Federal Bureau of Investigation (FBI) to receive and process complaints of cybercrime.
- Official Portal: File a complaint at ic3.gov.
- Purpose: The information you provide helps the FBI track threats, analyze criminal methods, and share intelligence with its vast network of federal, state, and local law enforcement partners. In some cases, timely reporting can help authorities trace and freeze stolen funds.
What to Include in Your Report
When filing a report with the FTC or IC3, provide as much detail as possible:
- The scammer’s full WhatsApp phone number (including the +62 country code).
- Screenshots of the entire conversation.
- Any names, email addresses, or websites the scammer used.
- Any malicious links they sent.
- Details of all financial transactions, including dates, amounts, payment methods, and any cryptocurrency wallet addresses involved.
By taking these steps, victims can move from a position of helplessness to one of empowerment, contributing directly to the broader law enforcement effort to dismantle the global networks behind these fraudulent calls and messages.