IP Address: 162.142.125.206


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
25 minutes ago
[rede-188] 2026-02-19 08:30:01, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
yesterday
[probe-168-134] 2026-02-17 23:55:15, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 days ago
[probe-68-69] 2026-02-11 21:08:50, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /a3ev7i8wk3sv2ittq6
PortScan
HTTP
8 days ago
[probe-44-49] 2026-02-11 05:03:15, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
12 days ago
ipban 3.1.0 - 14
BruteForce
RDP
14 days ago
[arem1] 2026-02-05 06:15:11, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
14 days ago
ipban 3.1.0 - 14
BruteForce
RDP
15 days ago
[arem1] 2026-02-04 08:44:48, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
15 days ago
[rede-188] 2026-02-04 00:15:02, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
21 days ago
ipbanpro 4.4.0 - 14
BruteForce
RDP
25 days ago
[probe-68-69] 2026-01-25 03:55:38, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /y3yofm397yyqw7
PortScan
HTTP
one month ago
fail2ban
BruteForce
dovecot
one month ago
[probe-44-49] 2026-01-17 10:44:59, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-01-13 10:18:03, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-01-01 19:26:16, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
one month ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
one month ago
[rede-188] 2025-12-23 20:00:07, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2025-12-22 19:08:17, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
fail2ban
BruteForce
dovecot
2 months ago
[rede-188] 2025-12-11 19:05:12, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2025-12-08 16:04:24, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
Connection to port 23 from port 28794
BruteForce
Telnet
Anonymous
3 months ago
ipban 2.0.1 - 14
BruteForce
RDP
tuya
3 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
EugeneK
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
[arem1] 2025-11-13 03:02:07, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-11-12 12:05:41, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2025-11-08 05:06:33, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-68-69] 2025-11-07 12:06:24, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
3 months ago
ipban 1.9.0 - 400
BruteForce
Apache
4 months ago
[probe-168-134] 2025-10-20 04:02:07, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
4 months ago
ipban 1.8.1 - 14
BruteForce
RDP
4 months ago
[probe-168-134] 2025-10-12 11:53:53, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-10-02 08:50:13, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
4 months ago
ipban 1.8.0
BruteForce
RDP
4 months ago
[probe-168-134] 2025-09-28 07:26:43, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-09-26 02:00:23, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[rede-188] 2025-09-24 10:01:47, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-24 09:05:45, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
5 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
5 months ago
Connection to port 3306 from port 54746
BruteForce
MySQL
5 months ago
ipban 1.8.0
BruteForce
RDP
5 months ago
[probe-44-49] 2025-09-16 08:04:25, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-09-15 09:21:13, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-12 06:54:38, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
5 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
5 months ago
Connection to port 3389 from port 58242
BruteForce
RDP
5 months ago
fail2ban
BruteForce
dovecot
EugeneK
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.0 - 14
BruteForce
RDP
6 months ago
[rede-188] 2025-08-21 06:02:16, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-21 01:55:32, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
6 months ago
[probe-44-49] 2025-08-19 19:02:49, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
6 months ago
[rede-188] 2025-08-17 20:04:22, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-08 11:09:52, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
6 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
6 months ago
[probe-44-49] 2025-08-01 14:19:59, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
6 months ago
ipban 1.9.0 - 400
BruteForce
Apache
7 months ago
[probe-168-134] 2025-07-26 00:04:51, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-07-24 23:01:30, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
Censys.io.Scanner
Hacking
IPS
7 months ago
[probe-44-49] 2025-07-19 01:30:12, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-18 04:56:18, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
7 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
7 months ago
[probe-168-134] 2025-07-12 16:33:44, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-10 06:29:42, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-09 08:04:58, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
fail2ban
BruteForce
dovecot
7 months ago
[arem1] 2025-07-06 09:40:24, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-07-04 00:51:25, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-02 16:01:36, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
8 months ago
[probe-44-49] 2025-06-27 08:42:10, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-06-26 05:55:26, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-24 23:52:47, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-23 13:57:20, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-176-124] 2025-06-23 12:20:49, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
Connection to port 9200 from port 59762
BruteForce
Elasticsearch
tuya
8 months ago
ipban 2.0.1 - 14
BruteForce
RDP
RLorenz
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
8 months ago
ipban 1.8.0 - 14
BruteForce
RDP
8 months ago
Connection to port 3389 from port 58388
BruteForce
RDP
8 months ago
ipban 1.8.0
BruteForce
RDP
8 months ago
[probe-44-49] 2025-06-06 10:58:41, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
fail2ban
BruteForce
dovecot
8 months ago
[probe-68-69] 2025-06-02 11:48:25, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-05-31 06:54:53, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
Connection to port 23 from port 53860
BruteForce
Telnet
Anonymous
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
9 months ago
[probe-44-49] 2025-05-18 10:08:54, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-68-69] 2025-05-13 06:20:53, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
Connection to port 143 from port 43350
PortScan
Port 143
9 months ago
[probe-44-49] 2025-05-12 17:53:19, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
fail2ban
BruteForce
Wdes.eu-MX1-Emails
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
9 months ago
[probe-44-49] 2025-05-08 02:56:21, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-07 22:42:15, Client: 162.142.125.206, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
fail2ban
BruteForce
postfix
Contact IPThreat