Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ljubljana

Region: Ljubljana

Country: Slovenia

Internet Service Provider: Telemach

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '77.111.52.0 - 77.111.52.255'

% Abuse contact for '77.111.52.0 - 77.111.52.255' is 'abuse@telemach.si'

inetnum:        77.111.52.0 - 77.111.52.255
netname:        Telemach-NET
descr:          Broadband Network Services
country:        SI
remarks:        INFRA-AW
admin-c:        TRTB1-RIPE
tech-c:         TRTB1-RIPE
status:         ASSIGNED PA
mnt-by:         TELEMACH-MNT
mnt-lower:      TELEMACH-MNT
mnt-routes:     TELEMACH-MNT
created:        2018-01-16T08:21:26Z
last-modified:  2018-01-16T08:21:26Z
source:         RIPE # Filtered

role:           Telemach RIPE Team BBN
address:        Telemach d.o.o.
address:        Brnciceva ulica 49A
address:        SI-1231 Ljubljana-Crnuce
address:        Slovenia
phone:          +386 591 88600
admin-c:        AR1264-RIPE
tech-c:         MS10243-RIPE
tech-c:         GN1562-RIPE
tech-c:         JL12686-RIPE
nic-hdl:        TRTB1-RIPE
mnt-by:         TELEMACH-MNT
created:        2009-09-25T09:49:27Z
last-modified:  2020-12-03T16:43:17Z
source:         RIPE # Filtered
abuse-mailbox:  abuse@telemach.si

% Information related to '77.111.0.0/18AS3212'

route:          77.111.0.0/18
descr:          TELEMACH, Provider Aggregated Block
remarks:        ===========================================================
remarks:        TELEMACH - Network Operation Center
remarks:
remarks:        mail:  noc@telemach.net
remarks:        phone: +386 1 51 88 600 or 51 88 630
remarks:        fax:   +386 1 51 88 601
remarks:
remarks:        Please send abuse & spam notification to abuse@telemach.net
remarks:        ===========================================================
origin:         AS3212
mnt-by:         TELEMACH-MNT
created:        2015-10-19T07:32:25Z
last-modified:  2018-01-16T06:37:12Z
source:         RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 77.111.52.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25903
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;77.111.52.140.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041400 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 14 16:50:46 CST 2026
;; MSG SIZE  rcvd: 106
Host info
140.52.111.77.in-addr.arpa domain name pointer 77-111-52-140.dynamic.telemach.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.52.111.77.in-addr.arpa	name = 77-111-52-140.dynamic.telemach.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.63.109.106 attackbots
Unauthorized connection attempt detected from IP address 197.63.109.106 to port 22
2020-01-06 01:14:48
83.103.215.60 attackspam
Unauthorized connection attempt detected from IP address 83.103.215.60 to port 8000
2020-01-06 00:59:23
177.139.76.101 attack
Unauthorized connection attempt detected from IP address 177.139.76.101 to port 80
2020-01-06 01:23:43
88.247.99.152 attack
Unauthorized connection attempt detected from IP address 88.247.99.152 to port 88
2020-01-06 00:58:49
109.111.133.163 attackspambots
Unauthorized connection attempt detected from IP address 109.111.133.163 to port 23
2020-01-06 01:28:00
93.227.150.188 attackspam
Unauthorized connection attempt detected from IP address 93.227.150.188 to port 80
2020-01-06 00:58:00
109.111.140.224 attackspambots
Unauthorized connection attempt detected from IP address 109.111.140.224 to port 8080
2020-01-06 01:27:27
115.22.100.47 attackbots
Unauthorized connection attempt detected from IP address 115.22.100.47 to port 5555 [J]
2020-01-06 00:54:59
197.45.175.129 attack
Unauthorized connection attempt detected from IP address 197.45.175.129 to port 81 [J]
2020-01-06 01:15:23
186.4.143.207 attackspam
Unauthorized connection attempt detected from IP address 186.4.143.207 to port 82
2020-01-06 01:18:50
187.121.162.99 attackbotsspam
Unauthorized connection attempt detected from IP address 187.121.162.99 to port 4567 [J]
2020-01-06 01:17:59
110.77.154.191 attack
Unauthorized connection attempt detected from IP address 110.77.154.191 to port 445
2020-01-06 00:55:56
37.6.186.197 attack
Unauthorized connection attempt detected from IP address 37.6.186.197 to port 23
2020-01-06 01:08:20
176.121.71.18 attackbotsspam
Unauthorized connection attempt detected from IP address 176.121.71.18 to port 5555 [J]
2020-01-06 01:24:09
78.186.66.64 attackspam
Unauthorized connection attempt detected from IP address 78.186.66.64 to port 8080 [J]
2020-01-06 01:01:05

Recently Reported IPs

155.208.115.111 122.192.203.123 121.234.219.110 2606:4700:10::6814:9787
2606:4700:10::6814:6433 2606:4700:10::ac43:2322 2606:4700:10::6816:2417 2606:4700:10::6816:490
2606:4700:10::6814:4697 2606:4700:10::ac43:2562 63.232.155.25 183.166.22.10
203.146.170.188 242.128.62.222 188.166.21.242 120.82.65.255
2606:4700:10::6816:3345 2606:4700:10::6814:6632 109.167.82.115 171.213.223.100