Share

IP Address Details

Whois information

NetRange: 77.0.0.0 - 77.255.255.255
CIDR: 77.0.0.0/8
NetName: 77-RIPE
NetHandle: NET-77-0-0-0-1
Parent: ()
NetType: Allocated to RIPE NCC
OriginAS:
Organization: RIPE Network Coordination Centre (RIPE)
RegDate: 2006-08-29
Updated: 2025-02-10
Comment: These addresses have been further assigned to users in the RIPE NCC region. Please note that the organization and point of contact details listed below are those of the RIPE NCC not the current address holder. ** You can find user contact information for the current address holder in the RIPE database at http://www.ripe.net/whois.
Ref: https://rdap.arin.net/registry/ip/77.0.0.0

ResourceLink: https://apps.db.ripe.net/db-web-ui/query
ResourceLink: whois.ripe.net

OrgName: RIPE Network Coordination Centre
OrgId: RIPE
Address: P.O. Box 10096
City: Amsterdam
StateProv:
PostalCode: 1001EB
Country: NL
RegDate:
Updated: 2013-07-29
Ref: https://rdap.arin.net/registry/entity/RIPE

ReferralServer: whois.ripe.net
ResourceLink: https://apps.db.ripe.net/db-web-ui/query

OrgTechHandle: RNO29-ARIN
OrgTechName: RIPE NCC Operations
OrgTechPhone: +31 20 535 4444
OrgTechEmail: hostmaster@ripe.net
OrgTechRef: https://rdap.arin.net/registry/entity/RNO29-ARIN

OrgAbuseHandle: ABUSE3850-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +31205354444
OrgAbuseEmail: abuse@ripe.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE3850-ARIN

DNS BlackList results:

  • BL.SPAMCOP.NET Not Listed
  • SBL.SPAMHAUS.ORG Not Listed
  • B.BARRACUDACENTRAL.ORG Not Listed
  • SPAM.SPAMRATS.COM Not Listed
  • Z.MAILSPIKE.NET Not Listed
  • CBL.ABUSEAT.ORG Not Listed

Most recent complaints

Complaint by Anonymous :

Santander phishing scam by User(77.251.139.246 ) with edge id FaGG1l00X5K9rNt03aGGGj sent on Sun, 24 Mar 2013 23:17:54 +0100 from email address onlinebanking@santander.co.uk, X-SourceIP: 77.251.139.246 with link to phishing URL at website: tommiller.brinkster.net/clientsites/ (NB:do not click on link ). ISP & Organization : UPC NL Host Name: dhcp-077-251-139-246.chello.nl Received: from fep12.mx.upcmail.net ([62.179.121.32])***; Sun, 24 Mar 2013 15:18:10 -0700 Received: from edge03.upcmail.net ([192.168.13.238]) by viefep12-int.chello.at (InterMail vM.8.01.05.05 201-2260-151-110-20120111) with ESMTP id <20130324221755.QASW14414.viefep12-int.chello.at@edge03.upcmail.net>; Sun, 24 Mar 2013 23:17:55 +0100 Received: from User ([77.251.139.246]) by edge03.upcmail.net with edge id FaGG1l00X5K9rNt03aGGGj; Sun, 24 Mar 2013 23:17:54 +0100 X-SourceIP: 77.251.139.246 From: "Santander Bank Plc"<onlinebanking@santander.co.uk> Subject: Santander Security & Privacy - Your Account Notification Date: Sun, 24 Mar 2013 23:18:14 +0100 *** X-Mailer: Microsoft Outlook Express 6.00.2800.1081 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081 Message-Id: <20130324221755.QASW14414.viefep12-int.chello.at@edge03.upcmail.net> Return-Path: onlinebanking@santander.co.uk X-OriginalArrivalTime: 24 Mar 2013 22:18:10.0989 (UTC) FILETIME=[783425D0:01CE28DD]

Reported on: 25th, Mar. 2013

Complaint by Anonymous :

SANTANDER SCAM ALERT:- fraudster using host dhcp-077-251-139-246.chello.nl to send constant phishing scams etc:- Received: from fep15.mx.upcmail.net ([62.179.121.35]) 888; Mon, 25 Mar 2013 08:08:59 -0700 Received: from edge03.upcmail.net ([192.168.13.238])by viefep15-int.chello.at (InterMail vM.8.01.05.05 201-2260-151-110-20120111) with ESMTP id <20130325150843.LUFU6033.viefep15-int.chello.at@edge03.upcmail.net>; Mon, 25 Mar 2013 16:08:43 +0100 Received: from User ([77.251.139.246])by edge03.upcmail.net with edge id Fr6p1l02A5K9rNt03r6pSU; Mon, 25 Mar 2013 16:08:41 +0100 X-SourceIP: 77.251.139.246 From: "Santander Bank Plc"<onlinebanking@santander.co.uk> Subject: 1 New Message Date: Mon, 25 Mar 2013 16:09:01 +0100 *** Message-Id: <20130325150843.LUFU6033.viefep15-int.chello.at@edge03.upcmail.net> Return-Path: onlinebanking@santander.co.uk X-OriginalArrivalTime: 25 Mar 2013 15:08:59.0847 (UTC) FILETIME=[ADBD7570:01CE296A]

Reported on: 25th, Mar. 2013

Complaint by Anonymous :

constant Phishing emails sent by criminal User of IP 77.251.139.246 . eg: Alliance&Leicester Phishing scam routed via host fep33.mx.upcmail.net ([62.179.121.51]) from User ([77.251.139.246])with edge id Hks91l0295K9rNt03ks9rT - - - - - - - Originating IP 77.251.139.246 ISP & Organization: UPC NL Host Name: dhcp-077-251-139-246.chello.nl Country: Netherlands - - - - Received: from fep33.mx.upcmail.net ([62.179.121.51]) by COL0-MC2-F2.Col0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4900); Sat, 30 Mar 2013 01:53:46 -0700 Received: from edge03.upcmail.net ([192.168.13.238]) by viefep33-int.chello.at (InterMail vM.8.01.05.05 201-2260-151-110-20120111) with ESMTP id <20130330085331.VLLU20148.viefep33-int.chello.at@edge03.upcmail.net>; Sat, 30 Mar 2013 09:53:31 +0100 Received: from User ([77.251.139.246]) by edge03.upcmail.net with edge id Hks91l0295K9rNt03ks9rT; Sat, 30 Mar 2013 09:53:31 +0100 X-SourceIP: 77.251.139.246 From: "Alliance&Leicester"<update@santander.co.uk> Subject: Your Account has been blocked Date: Sat, 30 Mar 2013 09:53:33 +0100 *** X-Mailer: Microsoft Outlook Express 6.00.2800.1081 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081 Message-Id: <20130330085331.VLLU20148.viefep33-int.chello.at@edge03.upcmail.net> Bcc: Return-Path: update@santander.co.uk X-OriginalArrivalTime: 30 Mar 2013 08:53:46.0529 (UTC) FILETIME=[16D28110:01CE2D24] link redirecting to phishing URL at www.dyvenpro.com(DO NOT CLICK ON LINKS - see http://urlquery.net/report.php?id=1687851)

Reported on: 30th, Mar. 2013

Complaint by Anonymous :

Alliance&Leicester/Santander phishing scam with link that redirects to phishing URL at www.dyvenpro.com/(DO NOT CLICK ON LINK) from securityupdate@santander.co.uk:- User ([77.251.139.246])by edge03.upcmail.net with edge id Hx6Q1l02F5K9rNt03x6RHx ; ----------- Received: from fep17.mx.upcmail.net ([62.179.121.37]) by SNT0-MC3-F20.Snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4900); Sat, 30 Mar 2013 14:07:52 -0700 Received: from edge03.upcmail.net ([192.168.13.238]) by viefep17-int.chello.at (InterMail vM.8.01.05.05 201-2260-151-110-20120111) with ESMTP id <20130330210738.OMKL11712.viefep17-int.chello.at@edge03.upcmail.net>; Sat, 30 Mar 2013 22:07:38 +0100 Received: from User ([77.251.139.246]) by edge03.upcmail.net with edge id Hx6Q1l02F5K9rNt03x6RHx; Sat, 30 Mar 2013 22:07:36 +0100 X-SourceIP: 77.251.139.246 From: "Alliance&Leicester/Santander"<securityupdate@santander.co.uk> Subject: Your Account has been blocked Date: Sat, 30 Mar 2013 22:07:38 +0100 *** X-Mailer: Microsoft Outlook Express 6.00.2800.1081 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1081 Message-Id: <20130330210738.OMKL11712.viefep17-int.chello.at@edge03.upcmail.net> Return-Path: securityupdate@santander.co.uk X-OriginalArrivalTime: 30 Mar 2013 21:07:52.0588 (UTC) FILETIME=[A451BCC0:01CE2D8A] Fraud Detected on your current account. Your account has been blocked due to fraud suspicious activity.</span> " href="http://www.dyvenpro.com/cache/index.php" target="_blank"> Click here</a> just verify your account details to allow us re-open your account. Thank you. Santander Online Banking

Reported on: 31st, Mar. 2013

Please help us keep Internet safer and cleaner by leaving a descriptive comment about 77.251.139.246 IP address

DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.

WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.

** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.