IP Address: 162.142.125.201


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
14 hours ago
[probe-44-49] 2026-02-15 17:46:53, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 days ago
[probe-44-49] 2026-02-13 04:52:35, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /b6na_nk3v7fh2nz_
PortScan
HTTP
3 days ago
[probe-44-49] 2026-02-12 19:01:36, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /qzye5q5mjo4h_o22
PortScan
HTTP
5 days ago
[probe-44-49] 2026-02-10 20:07:45, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /c25g53d6nfy
PortScan
HTTP
imcas
11 days ago
ipban 1.9.0 - 400
BruteForce
Apache
13 days ago
[rede-188] 2026-02-02 18:01:29, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /xf2as6ugxhki8qkpf
PortScan
HTTP
15 days ago
[arem1] 2026-01-31 10:33:20, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
16 days ago
[probe-44-49] 2026-01-30 12:07:15, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
21 days ago
[arem1] 2026-01-25 20:06:01, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /qvvy0mx7lhk
PortScan
HTTP
22 days ago
[probe-68-69] 2026-01-24 22:01:17, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /g9fj91es34jpd2r
PortScan
HTTP
23 days ago
Connection to port 143 from port 53620
PortScan
Port 143
27 days ago
ipban 2.0.0 - 14
BruteForce
RDP
27 days ago
ipban 1.8.0
BruteForce
RDP
29 days ago
[probe-68-69] 2026-01-17 09:59:40, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 2.0.0 - 5152
BruteForce
RDP
ric404
one month ago
ipban 3.0.0 - 4653
BruteForce
RDP
one month ago
[arem1] 2025-12-26 09:09:41, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
NoirBit
one month ago
ipban 2.0.0 - 14
BruteForce
RDP
2 months ago
fail2ban
BruteForce
dovecot
2 months ago
[arem1] 2025-12-09 15:03:53, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2025-12-09 08:24:25, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
NoirBit
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
2 months ago
[probe-168-134] 2025-12-02 08:06:14, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[arem1] 2025-11-29 21:57:13, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
Connection to port 11211 from port 32020
DDos
Memcached
Anonymous
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
2 months ago
[rede-188] 2025-11-23 08:30:36, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-68-69] 2025-11-21 06:00:21, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2025-11-18 22:28:41, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2025-11-18 07:59:57, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
[rede-188] 2025-10-31 00:24:41, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 3.1.0
BruteForce
ApacheWampServer
4 months ago
fail2ban
BruteForce
postfix
4 months ago
[rede-188] 2025-10-14 22:09:07, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-68-69] 2025-10-08 11:45:49, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
Connection to port 3306 from port 42016
BruteForce
MySQL
5 months ago
[probe-44-49] 2025-09-05 09:24:54, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-68-69] 2025-09-04 19:55:48, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
fail2ban
BruteForce
dovecot
tuya
5 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
tuya
5 months ago
ipban 2.0.1 - 14
BruteForce
RDP
6 months ago
[probe-44-49] 2025-08-20 06:01:05, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-168-134] 2025-08-19 22:13:26, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-168-134] 2025-08-16 04:01:08, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
fail2ban
BruteForce
dovecot
6 months ago
[probe-44-49] 2025-08-09 07:46:20, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[rede-188] 2025-08-05 14:06:20, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-68-69] 2025-08-04 21:00:18, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-01 16:29:00, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-07-25 22:33:18, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-24 18:59:17, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-23 08:00:46, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
7 months ago
[rede-188] 2025-07-13 15:24:41, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-07-09 03:59:35, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-05 07:50:53, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-03 07:53:09, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
ipban 2.0.0 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-07-01 15:56:50, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-07-01 09:57:38, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-06-30 21:50:27, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
7 months ago
ipban 2.0.0 - 14
BruteForce
RDP
7 months ago
fail2ban
BruteForce
dovecot
imcas
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
Connection to port 22 from port 54394
BruteForce
SSH
8 months ago
[probe-44-49] 2025-06-20 05:54:04, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
8 months ago
ipban 2.0.1 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-06-19 04:57:27, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
8 months ago
Connection to port 389 from port 56538
BruteForce
LDAP
8 months ago
[probe-44-49] 2025-06-15 07:29:23, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-14 16:51:20, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-168-134] 2025-06-08 00:45:01, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-06-06 02:25:05, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-05 12:11:21, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
ipban 1.8.0
BruteForce
RDP
imcas
8 months ago
ipban 1.9.0 - 400
BruteForce
Apache
9 months ago
[probe-44-49] 2025-05-19 02:53:11, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
Connection to port 1433 from port 45000
BruteForce
MSSQL
9 months ago
[probe-44-49] 2025-05-13 01:46:43, Client: 162.142.125.201, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
9 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
Anonymous
10 months ago
ipban 2.0.0 - 14
BruteForce
RDP
10 months ago
Connection to port 3389 from port 36838
BruteForce
RDP
11 months ago
Censys.io.Scanner
Hacking
IPS
Anonymous
11 months ago
ipban 2.0.1
BruteForce
RDP
EugeneK
11 months ago
ipban 2.0.0 - 14
BruteForce
RDP
11 months ago
ipban 1.8.0
BruteForce
RDP
11 months ago
ipban 1.8.0
BruteForce
RDP
11 months ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
imcas
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
EugeneK
one year ago
ipban 2.0.0 - 14
BruteForce
RDP
Contact IPThreat