City: Ljubljana
Region: Ljubljana
Country: Slovenia
Internet Service Provider: Telemach
Hostname: unknown
Organization: unknown
Usage Type: unknown
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '77.111.52.0 - 77.111.52.255'
% Abuse contact for '77.111.52.0 - 77.111.52.255' is 'abuse@telemach.si'
inetnum: 77.111.52.0 - 77.111.52.255
netname: Telemach-NET
descr: Broadband Network Services
country: SI
remarks: INFRA-AW
admin-c: TRTB1-RIPE
tech-c: TRTB1-RIPE
status: ASSIGNED PA
mnt-by: TELEMACH-MNT
mnt-lower: TELEMACH-MNT
mnt-routes: TELEMACH-MNT
created: 2018-01-16T08:21:26Z
last-modified: 2018-01-16T08:21:26Z
source: RIPE # Filtered
role: Telemach RIPE Team BBN
address: Telemach d.o.o.
address: Brnciceva ulica 49A
address: SI-1231 Ljubljana-Crnuce
address: Slovenia
phone: +386 591 88600
admin-c: AR1264-RIPE
tech-c: MS10243-RIPE
tech-c: GN1562-RIPE
tech-c: JL12686-RIPE
nic-hdl: TRTB1-RIPE
mnt-by: TELEMACH-MNT
created: 2009-09-25T09:49:27Z
last-modified: 2020-12-03T16:43:17Z
source: RIPE # Filtered
abuse-mailbox: abuse@telemach.si
% Information related to '77.111.0.0/18AS3212'
route: 77.111.0.0/18
descr: TELEMACH, Provider Aggregated Block
remarks: ===========================================================
remarks: TELEMACH - Network Operation Center
remarks:
remarks: mail: noc@telemach.net
remarks: phone: +386 1 51 88 600 or 51 88 630
remarks: fax: +386 1 51 88 601
remarks:
remarks: Please send abuse & spam notification to abuse@telemach.net
remarks: ===========================================================
origin: AS3212
mnt-by: TELEMACH-MNT
created: 2015-10-19T07:32:25Z
last-modified: 2018-01-16T06:37:12Z
source: RIPE # Filtered
% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.111.52.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;77.111.52.140. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041400 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 16:50:46 CST 2026
;; MSG SIZE rcvd: 106
140.52.111.77.in-addr.arpa domain name pointer 77-111-52-140.dynamic.telemach.net.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
140.52.111.77.in-addr.arpa name = 77-111-52-140.dynamic.telemach.net.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 197.63.109.106 | attackbots | Unauthorized connection attempt detected from IP address 197.63.109.106 to port 22 |
2020-01-06 01:14:48 |
| 83.103.215.60 | attackspam | Unauthorized connection attempt detected from IP address 83.103.215.60 to port 8000 |
2020-01-06 00:59:23 |
| 177.139.76.101 | attack | Unauthorized connection attempt detected from IP address 177.139.76.101 to port 80 |
2020-01-06 01:23:43 |
| 88.247.99.152 | attack | Unauthorized connection attempt detected from IP address 88.247.99.152 to port 88 |
2020-01-06 00:58:49 |
| 109.111.133.163 | attackspambots | Unauthorized connection attempt detected from IP address 109.111.133.163 to port 23 |
2020-01-06 01:28:00 |
| 93.227.150.188 | attackspam | Unauthorized connection attempt detected from IP address 93.227.150.188 to port 80 |
2020-01-06 00:58:00 |
| 109.111.140.224 | attackspambots | Unauthorized connection attempt detected from IP address 109.111.140.224 to port 8080 |
2020-01-06 01:27:27 |
| 115.22.100.47 | attackbots | Unauthorized connection attempt detected from IP address 115.22.100.47 to port 5555 [J] |
2020-01-06 00:54:59 |
| 197.45.175.129 | attack | Unauthorized connection attempt detected from IP address 197.45.175.129 to port 81 [J] |
2020-01-06 01:15:23 |
| 186.4.143.207 | attackspam | Unauthorized connection attempt detected from IP address 186.4.143.207 to port 82 |
2020-01-06 01:18:50 |
| 187.121.162.99 | attackbotsspam | Unauthorized connection attempt detected from IP address 187.121.162.99 to port 4567 [J] |
2020-01-06 01:17:59 |
| 110.77.154.191 | attack | Unauthorized connection attempt detected from IP address 110.77.154.191 to port 445 |
2020-01-06 00:55:56 |
| 37.6.186.197 | attack | Unauthorized connection attempt detected from IP address 37.6.186.197 to port 23 |
2020-01-06 01:08:20 |
| 176.121.71.18 | attackbotsspam | Unauthorized connection attempt detected from IP address 176.121.71.18 to port 5555 [J] |
2020-01-06 01:24:09 |
| 78.186.66.64 | attackspam | Unauthorized connection attempt detected from IP address 78.186.66.64 to port 8080 [J] |
2020-01-06 01:01:05 |