IP Address: 162.142.125.123


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
2 days ago
[probe-168-134] 2026-02-16 02:34:13, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
2 days ago
ipban 2.0.1 - 14
BruteForce
RDP
2 days ago
[rede-188] 2026-02-15 13:58:08, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 days ago
fail2ban
Hacking
HTTP
8 days ago
[probe-44-49] 2026-02-10 01:03:49, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 days ago
[probe-44-49] 2026-02-09 01:54:09, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /82berpujky3tik
PortScan
HTTP
9 days ago
[rede-188] 2026-02-08 09:01:46, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
13 days ago
[probe-68-69] 2026-02-04 21:02:36, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
13 days ago
[probe-44-49] 2026-02-04 11:01:58, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /bx0tuqlyh
PortScan
HTTP
15 days ago
fail2ban
BruteForce
dovecot
16 days ago
Connection to port 5900 from port 4770
BruteForce
VNC
Anonymous
16 days ago
ipban 2.0.0 - 14
BruteForce
RDP
tuya
16 days ago
ipban 2.0.1 - 14
BruteForce
RDP
17 days ago
[probe-168-134] 2026-01-31 22:03:23, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /5bpkqu4j_6qa51
PortScan
HTTP
18 days ago
[probe-44-49] 2026-01-30 12:05:39, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
19 days ago
[probe-44-49] 2026-01-29 13:49:23, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /tzsr__n5tzx48ietq
PortScan
HTTP
20 days ago
[probe-168-134] 2026-01-28 11:03:52, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /vtv5q_xjov19v6w5y
PortScan
HTTP
23 days ago
[arem1] 2026-01-25 09:03:41, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /68xy8y90ph1reyge
PortScan
HTTP
EugeneK
27 days ago
ipban 2.0.1 - 14
BruteForce
RDP
one month ago
[probe-168-134] 2026-01-17 10:05:48, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
ric404
one month ago
ipban 3.0.0 - 4653
BruteForce
RDP
one month ago
[probe-68-69] 2026-01-15 12:18:00, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-15 06:54:05, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-01-13 07:09:07, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-01-11 23:34:46, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-10 09:46:17, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 3.0.0 - 14
BruteForce
RDP
one month ago
[probe-68-69] 2026-01-01 19:11:09, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
one month ago
[arem1] 2025-12-29 10:31:18, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
one month ago
ipban 2.0.0 - 14
BruteForce
RDP
one month ago
[probe-68-69] 2025-12-26 18:56:02, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[rede-188] 2025-12-23 10:04:15, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
2 months ago
[probe-68-69] 2025-12-10 12:02:20, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Anonymous
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
RLorenz
2 months ago
ipban 1.8.1 - 14
BruteForce
RDP
2 months ago
fail2ban
BruteForce
dovecot
2 months ago
Connection to port 22 from port 11282
BruteForce
SSH
ric404
2 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
3 months ago
fail2ban
BruteForce
dovecot
imcas
3 months ago
ipban 1.9.0 - 400
BruteForce
Apache
EugeneK
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
[arem1] 2025-11-10 11:52:05, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-11-08 07:43:54, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
3 months ago
[arem1] 2025-10-27 06:15:46, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
fail2ban
BruteForce
postfix
4 months ago
[arem1] 2025-10-21 02:29:43, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[rede-188] 2025-10-19 14:54:47, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
fail2ban
BruteForce
dovecot
4 months ago
[probe-168-134] 2025-10-14 13:51:26, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
Connection to port 3306 from port 44790
BruteForce
MySQL
4 months ago
[probe-68-69] 2025-10-08 07:56:09, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-68-69] 2025-10-06 20:46:00, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[rede-188] 2025-10-05 20:45:34, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
4 months ago
Connection to port 23 from port 52200
BruteForce
Telnet
RLorenz
4 months ago
ipban 1.8.1 - 14
BruteForce
RDP
rewired
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
5 months ago
fail2ban
BruteForce
dovecot
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
[arem1] 2025-09-21 05:50:31, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-21 02:49:39, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-20 22:24:41, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-18 12:49:13, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-17 17:29:17, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
Connection to port 2222 from port 58328
PortScan
Port 2222
5 months ago
[probe-44-49] 2025-09-09 17:04:34, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
NoirBit
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Kamil
5 months ago
fail2ban
BruteForce
postfix
5 months ago
[probe-44-49] 2025-08-30 02:48:53, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
5 months ago
[probe-168-134] 2025-08-29 07:01:41, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[rede-188] 2025-08-29 00:18:09, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-08-28 23:36:47, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-08-25 17:03:15, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
6 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
6 months ago
[probe-44-49] 2025-08-18 04:47:41, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-15 09:47:35, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
6 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
6 months ago
[probe-44-49] 2025-08-12 09:26:18, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
6 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
6 months ago
[probe-68-69] 2025-07-28 13:23:02, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-07-24 06:31:43, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: POST /
PortScan
HTTP
Anonymous
7 months ago
ipban 2.0.0 - 14
BruteForce
RDP
imcas
7 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
7 months ago
[arem1] 2025-07-17 05:54:35, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-07-16 03:53:49, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
7 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
7 months ago
[probe-68-69] 2025-07-14 05:21:23, Client: 162.142.125.123, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Contact IPThreat