IP Address Inspector

ATTENTION
  • This IP has not seen any suspicious activity within the last 3 months. This IP is most likely clean and trustworthy now. (This record will remain public for historical purposes, however.)

127.0.0.1

We don't have data on this IP currently. If you know something, you may leave a comment.

Lookup IP In: Domain Tools | SpamHaus | Spamcop | SenderBase | Google Groups | Google

Geographic Location Japan Japan

First Bad Host Appearance approximately 8 years, 8 months, 3 weeks ago
Last Bad Host Appearance within 8 years, 8 months, 3 weeks
Bad Host Appearances 6 appearance(s) in spam e-mail or spam post urls

IPs In The Neighborhood
126.255.255.255 Japan
127.0.0.0 Japan
127.0.0.2 Japan
127.0.0.3 Japan
127.0.0.4 Japan
127.0.0.5 Japan
127.0.0.6 Japan
127.0.0.7 Japan
127.0.0.8 Japan
127.0.0.9 Japan
127.0.0.10 Japan
127.0.0.11 Japan
127.0.0.12 Japan
127.0.0.13 Japan
127.0.0.15 Japan
127.0.0.16 Japan
127.0.0.17 Japan
127.0.0.18 Japan
127.0.0.20 Japan
127.0.0.22 Japan
127.0.0.25 Japan
127.0.0.27 Japan
127.0.0.28 Japan
127.0.0.32 Japan
127.0.0.38 Japan
127.0.0.41 Japan
127.0.0.42 Japan
127.0.0.44 Japan
127.0.0.46 Japan
127.0.0.53 Unknown
127.0.0.54 Japan
127.0.0.55 | H Japan
127.0.0.56 Japan
127.0.0.66 Japan
127.0.0.81 Japan
127.0.0.99 Japan
127.0.0.100 Japan
127.0.0.101 Japan
127.0.0.102 Japan
127.0.0.127 Japan
127.0.0.132 Japan
127.0.0.153 Japan
127.0.0.199 Japan
127.0.0.200 Japan
127.0.0.202 Japan
127.0.0.207 Japan
127.0.0.222 Japan
D.Lester commented...
IP 127.0.0.1 Received: from mail.estudioizastoll.com ([127.0.0.1])
by localhost (mail.estudioizastoll.com [127.0.0.1]) (amavisd-new, port 10026)
with ESMTP id MlfNK40ebyWZ for ;
Thu, 14 Feb 2019 08:04:25 -0500 (PET)
Received: from [192.10.2.29] (cpe-68-203-146-6.tx.res.rr.com [68.203.146.6])
by mail.estudioizastoll.com (Postfix) with ESMTPSA id 1ED084437CA
February 14 2019 04:51 PM

P.Cruse commented...
Sent spam about Chinese mould manufacturer
October 29 2017 04:56 AM

J.Hyde4 commented...
Red Herring -- attack on admin login
March 24 2016 04:46 AM

S.Munson commented...
this is IP used to get scams into your email box - this source is used as a carrier to allow other sources to get into your computer - kind of "backdoor" entry for other scam emails
November 13 2014 08:22 PM

S.L7 commented...
ATTENTION!!
This is the address of the best hacker I never knew...

It unlock all my protection, he/she had see all my files and had a complete access to my computer.
March 15 2014 03:31 PM

N.Padilla commented...
I need Ip address
February 22 2014 02:16 PM

R.Savori commented...
This IP address keeps accessing my computer. It seems capable of breaking through any firewall. A super hacker is on the loose.
January 20 2014 02:26 AM

J.Hewitt2 commented...
This person keeps spamming my site, I'm not sure why.

My site is localhost:80
September 13 2013 02:33 PM

W.Carter3 commented...
Just left a spam blog on my site
January 28 2013 02:34 AM

B.Sjoberg commented...
I hope people here are kidding. :-/

I mean, I assume most people who know enough to find an email's originating IP address also know what the loopback address is...right?
January 01 2013 08:54 PM

S.F6 commented...
Business Proposal
e430616713@exchange.1and1.com
I Have A Business Proposal For You For More Information Please Get Back To Me Via Email : chen.li78@yahoo.cn
X-Apparently-To: stephen01273@yahoo.co.uk via 188.125.83.109; Thu, 06 Sep 2012 15:07:04 +0000
X-YahooFilteredBulk: 74.208.4.194
Received-SPF: none (domain of wedswest.com does not designate permitted sender hosts)
X-Originating-IP: [74.208.4.194]
Authentication-Results: mta1048.mail.ird.yahoo.com from=exchange.1and1.com; domainkeys=neutral (no sig); from=exchange.1and1.com; dkim=neutral (no sig)
Received: from 127.0.0.1 (EHLO mout.perfora.net) (74.208.4.194)
by mta1048.mail.ird.yahoo.com with SMTP; Thu, 06 Sep 2012 15:07:03 +0000
Received: from winxedgeus01.exchange.xchg (winxedgeus01.lxa.perfora.net [172.23.130.53])
Received: from WINXHUBUS05.exchange.xchg (172.23.130.24) by
winxedgeus01.exchange.xchg (172.23.130.53) with Microsoft SMTP Server (TLS)
id 8.3.245.1; Thu, 6 Sep 2012 11:06:44 -0400
Received: from ntxbeus04.exchange.xchg (172.23.130.26) by
winxhubus05.exchange.xchg (172.23.130.24) with Microsoft SMTP Server id
8.3.245.1; Thu, 6 Sep 2012 11:06:22 -0400
Received: from ntxfeus04.exchange.xchg ([172.23.130.37]) by
ntxbeus04.exchange.xchg with Microsoft SMTPSVC(6.0.3790.4675)
Received: from [192.168.1.100] ([31.109.19.37]) by ntxfeus04.exchange.xchg
over TLS secured channel with Microsoft SMTPSVC(6.0.3790.4675
To: Recipients
From:
Date: Thu, 6 Sep 2012 16:06:03 +0100
Reply-To: chen.li78@yahoo.cn
Message-ID:
September 11 2012 06:58 AM

M.Wilkerson commented...
this ip 127.0.0.1 is being used as a loop.
June 23 2012 03:27 AM

A.Lee9 commented...
It's great that you guys know how to use the message source.

127.0.0.1 is not a bad IP address.

It is your own computer's localhost IP. Completely harmless.


Besides, the one that says "X-Originating IP" or the very last IP that you see before you see the email addresses is the proper IP address to report. The other ones you are reporting are internet traffic and not the right IP addresses. They are not the offending IP addresses.
January 17 2012 02:43 AM

M.Davis15 commented...
Received: from smtp2.elo.com.br (Not Verified[189.23.132.117]) by
anti-spam.mic.ul.ie with MailMarshal (v6,7,2,8378) id ; Fri,
16 Dec 2011 01:49:46 +0000
Received: from mail.ceuma.br (mail.ceuma.br [189.22.181.197]) by
smtp2.elo.com.br (Postfix) with ESMTP id A6B271D618C; Thu, 15 Dec 2011
22:52:16 -0300 (BRT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.ceuma.br
(Postfix) with ESMTP id A6A176044D6C7; Thu, 15 Dec 2011 22:49:34 -0300 (BRT)
X-Virus-Scanned: amavisd-new at mail.ceuma.br
Received: from mail.ceuma.br ([127.0.0.1]) by localhost (mail.ceuma.br
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZjYKg0SRRPVY; Thu, 15
Dec 2011 22:49:34 -0300 (BRT)
Received: from mail.ceuma.br (localhost.localdomain [127.0.0.1]) by
mail.ceuma.br (Postfix) with ESMTP id 4BAA26047D49C; Thu, 15 Dec 2011
22:47:52 -0300 (BRT)
Date: Thu, 15 Dec 2011 22:47:52 -0300
From: "HELPDISK@Ugent.be"
Reply-To: "webmaster_client_shaw@xnmsn.com"
Message-ID:
Subject: ugent.be has received advice to suspend your account
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Originating-IP: [82.128.15.192]
X-Mailer: Zimbra 6.0.7_GA_2473.DEBIAN5_64 (zclient/6.0.7_GA_2473.DEBIAN5_64)
To: undisclosed-recipients:;
Return-Path: nutricao@ceuma.br
December 15 2011 08:55 PM

M.Davis15 commented...
Return-path:
Received: from smtp2.elo.com.br ([unknown] [189.23.132.117])
by vms172107.mailsrvcs.net
(Sun Java(tm) System Messaging Server 7u2-7.02 32bit (built Apr 16 2009))
with ESMTP id for x;
Mon, 28 Nov 2011 14:17:07 -0600 (CST)
Received: from mail.ceuma.br (mail.ceuma.br [189.22.181.197])
by smtp2.elo.com.br (Postfix) with ESMTP id EC3351D6260 for ;
Mon, 28 Nov 2011 17:18:46 -0300 (BRT)
Received: from localhost (localhost.localdomain [127.0.0.1])
by mail.ceuma.br (Postfix) with ESMTP id 74A326046C1E1 for ;
Mon, 28 Nov 2011 17:16:39 -0300 (BRT)
Received: from mail.ceuma.br ([127.0.0.1])
by localhost (mail.ceuma.br [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id yrSb-kwujmxj; Mon, 28 Nov 2011 17:16:38 -0300 (BRT)
Received: from tw38.webservidor.net (tw38.webservidor.net [189.113.9.205])
by mail.ceuma.br (Postfix) with ESMTP id E4F356046B5B0 for
; Mon, 28 Nov 2011 17:16:37 -0300 (BRT)
Received: by tw38.webservidor.net (Postfix, from userid 500)
id 4B18E7A85C0; Mon, 28 Nov 2011 15:16:35 -0500 (EST)
Date: Mon, 28 Nov 2011 15:16:35 -0500 (EST)
From: Centro de Estudos Internacionais - CEI
Subject: Doutorado em Ciencias Juridicas e Sociais a partir de R$ 624,00 na
Argentina
X-Originating-IP: [189.23.132.117]
To: x
Reply-to: info@ceinter.com.br
Message-id:
MIME-version: 1.0
Content-type: multipart/alternative;
boundary="Boundary_(ID_0sltQWQ+bIg03g0OzWEeyQ)"; charset=UTF-8
X-Virus-Scanned: amavisd-new at mail.ceuma.br
Original-recipient: rfc822;x
November 28 2011 08:07 PM

M.Davis15 commented...
rec'd spam from this IP
November 25 2011 11:26 AM

M.Davis15 commented...
rec'd spam from this IP
November 25 2011 10:55 AM

M.Davis15 commented...
Return-path:
Received: from smtp2.elo.com.br ([unknown] [189.23.132.117])
by vms172071.mailsrvcs.net
(Sun Java(tm) System Messaging Server 7u2-7.02 32bit (built Apr 16 2009))
with ESMTP id for mbd7@gte.net;
Thu, 24 Nov 2011 22:15:51 -0600 (CST)
Received: from mail.ceuma.br (mail.ceuma.br [189.22.181.197])
by smtp2.elo.com.br (Postfix) with ESMTP id C637F1D622F for ;
Fri, 25 Nov 2011 01:49:41 -0300 (BRT)
Received: from localhost (localhost.localdomain [127.0.0.1])
by mail.ceuma.br (Postfix) with ESMTP id B16C06048BF26 for ;
Fri, 25 Nov 2011 01:47:51 -0300 (BRT)
Received: from mail.ceuma.br ([127.0.0.1])
by localhost (mail.ceuma.br [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id hVWIzPdQ2OoM; Fri, 25 Nov 2011 01:47:50 -0300 (BRT)
Received: from feedback-reactivo.com (unknown [195.22.8.173])
by mail.ceuma.br (Postfix) with ESMTPS id 7DFF460450AFC for
; Fri, 25 Nov 2011 01:47:49 -0300 (BRT)
Received: from feedback by sd4.g3tech.com.pt with local (Exim 4.69)
(envelope-from )
id 1RTnhQ-0007OO-Ki for nutricao@ceuma.br; Fri, 25 Nov 2011 04:47:44 +0000
Date: Fri, 25 Nov 2011 04:50:21 +0100
From: "C-Date"
Subject: Relacionamento sem compromisso.
X-Originating-IP: [189.23.132.117]
To: nutricao@ceuma.br
Reply-to: marketing@feedback-reactivo.com
Message-id:
MIME-version: 1.0
Content-type: text/html; CHARSET=US-ASCII
Content-transfer-encoding: 7BIT
Original-recipient: rfc822;nutricao@ceuma.br
November 25 2011 10:14 AM

E.Stone commented...
Used By Spammers through Proxy servers to hide.
November 18, 2011, 03:50:27 EST5EDT -05:00 Version 0.1.2
IP Address : 127.0.0.1 , ,
Remote Host : localhost.localdomain
Client IP :
Proxy IP : 72.178.138.234 Waco, Texas, United States
Proxy Host : cpe-72-178-138-234.hot.res.rr.com
User Agent : Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/532.2 (KHTML, like Gecko) Chrome/4.0.221.7 Safari/532.2
Referer : http://www.libyanyouths.com/vb/ext.php?ref=http://www.bridge-spielen.net
November 18 2011 04:50 AM

E.Stone commented...
Used By Spammers through Proxy servers to hide.
November 16, 2011, 01:53:32 EST5EDT -05:00
IP Address : 127.0.0.1 , ,
Remote Host : localhost.localdomain
Client IP :
Proxy IP : 211.139.10.174 Guizhou, Guangdong, China
Proxy Host : 211.139.10.174
User Agent : Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322) Babya Discoverer 8.0:
November 16 2011 01:57 AM

J.Romaine2 commented...
From: Chugai Inc.
Subject: Representative Request
September 27 2011 02:29 PM

C.Climateski commented...
This IP address has been connected to fraudulent purchase of goods online, arising from London UK.
February 09 2011 05:12 AM

P.Veo commented...
this IP has been blocked more than once for "malicious intrusions" by my security software
December 27 2010 01:40 AM

J.Kim9 commented...
person has IP address from Nigeria. He is a Nigerian 416 scammer, but says he is from UK. Email address willschris01@yahoo.com.au
December 22 2010 02:24 PM

M.Ulm commented...
its a spammer
October 02 2010 10:51 AM

H.NYGAARD commented...
person has a IP address received from in Lagos Nigeria.. but says he is in London UK. IP address 82.128.3.73 & 82.128.38.125..
BIG BIG SCAM
July 30 2010 12:01 PM

H.Landeholm commented...
OMG THIS IP IS SPAMMING ME! WHAT TO DO??!?

(joke)
January 14 2010 11:39 AM

V.Gar commented...
Sapm
From: BANK MANAGER [mailto:mrkenjam@live.com]
Sent: Sunday, September 27, 2009 7:10 AM
To: undisclosed recipients:
Subject: CAN I TRUST YOU ???

Header info:

X-Message-Delivery: Vj0xLjE7dXM9MDtsPTA7YT0wO0Q9MjtTQ0w9NA==
X-Message-Status: n:0
X-SID-PRA: BANK MANAGER
X-Message-Info: 6sSXyD95QpUrVDJqGGgdZc8R62m42VFTrmlIpY0KBdG9Wz/zQmL7yRO0q6ttHBThxTscV0Gmo7scbVAnFzY9EvL2aacS10Rz
Received: from n18.bullet.mail.mud.yahoo.com ([68.142.206.145]) by col0-mc1-f46.Col0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);
Sun, 27 Sep 2009 05:10:21 -0700
Received: from [209.191.108.96] by n18.bullet.mail.mud.yahoo.com with NNFMP; 27 Sep 2009 12:10:20 -0000
Received: from [68.142.201.247] by t3.bullet.mud.yahoo.com with NNFMP; 27 Sep 2009 12:10:20 -0000
Received: from [127.0.0.1] by omp408.mail.mud.yahoo.com with NNFMP; 27 Sep 2009 12:10:20 -0000
X-Yahoo-Newman-Property: ymail-3
X-Yahoo-Newman-Id: 906149.18099.bm@omp408.mail.mud.yahoo.com
Received: (qmail 41370 invoked by uid 60001); 27 Sep 2009 12:10:14 -0000
Message-ID:
X-YMail-OSG: 2dCdrRIVM1kihKOHULiUHkb8I9jGIqN1LiH7v.5rRSZBZj47jII9agmaVMwzC5i63W3g5yEAYK_RSpM-
Received: from [41.213.126.5] by web111004.mail.gq1.yahoo.com via HTTP; Sun, 27 Sep 2009 05:10:14 PDT
X-RocketSRV: showStationery=157422066@mc.mail.yahoo.com
X-RocketYMMF: mobicplazashop
X-Mailer: YahooMailClassic/7.0.14 YahooMailWebService/0.7.347.3
Date: Sun, 27 Sep 2009 05:10:14 -0700 (PDT)
From: BANK MANAGER
Reply-To: mrkenjamesbanker@gmail.com
Subject: CAN I TRUST YOU ???
To: undisclosed recipients: ;
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1488340586-1254053414=:40615"
Return-Path: mrkenjam@live.com
X-OriginalArrivalTime: 27 Sep 2009 12:10:21.0428 (UTC) FILETIME=[7C614340:01CA3F6B
September 27 2009 02:56 PM

J.NotTellingYo commented...
Sweet localhost. :P
December 31 2008 12:27 AM

Page generated on: February 17 2019 04:41:58 AM
megangoodman535@outlook.com tanishacollier247@vbwebmail.com marcgrossman262@yahoo.com marcgrossman262@gmail.com
do not follow this link

Privacy Policy | Terms of Use | About Project Honey Pot | FAQ | Cloudflare Site Protection | Contact Us

Copyright © 2004–19, Unspam Technologies, Inc. All rights reserved.

Advertisements displayed on this page are not necessarily endorsed by Project Honey Pot

contact | wiki | email