IP Address: 162.142.125.213


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
one month ago
[probe-44-49] 2026-03-21 05:58:31, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-03-15 06:09:44, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-12 18:50:10, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /vztri1mtmw
PortScan
HTTP
RLorenz
one month ago
ipbanpro 5.0.0 - 14
BruteForce
RDP
one month ago
[probe-168-134] 2026-03-09 09:56:13, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-08 21:48:16, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /z0jj2p3bbnnmzo6
PortScan
HTTP
2 months ago
[probe-44-49] 2026-03-05 11:31:36, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2026-03-03 11:04:44, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /laz5wveykffk
PortScan
HTTP
2 months ago
[rede-188] 2026-02-26 18:46:49, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-25 17:56:02, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /0x_buylvp50pg8
PortScan
HTTP
2 months ago
[arem1] 2026-02-21 06:51:32, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /bqra6_c8q7cbe1
PortScan
HTTP
2 months ago
[probe-68-69] 2026-02-20 09:24:39, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
fail2ban
BruteForce
dovecot
2 months ago
[probe-68-69] 2026-02-14 23:32:53, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-14 14:06:14, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
2 months ago
ipban 2.0.1 - 14
BruteForce
RDP
2 months ago
[probe-44-49] 2026-02-11 19:09:30, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-168-134] 2026-02-10 14:28:15, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /4q7vbokf9
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-07 11:10:44, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2026-01-30 14:28:06, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2026-01-30 06:03:35, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-44-49] 2026-01-28 18:01:44, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2026-01-28 11:04:06, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
3 months ago
ipban 1.8.1 - 14
BruteForce
RDP
3 months ago
[arem1] 2026-01-27 08:08:03, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /dhhxrsmm897
PortScan
HTTP
ric404
3 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
3 months ago
[probe-68-69] 2026-01-25 06:52:57, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
Connection to port 1433 from port 19646
BruteForce
MSSQL
3 months ago
[arem1] 2026-01-21 14:08:30, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
fail2ban
BruteForce
dovecot
3 months ago
[probe-44-49] 2026-01-14 11:09:01, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
3 months ago
[probe-68-69] 2026-01-12 09:00:12, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2026-01-11 04:51:15, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-44-49] 2026-01-09 19:06:55, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2026-01-08 07:35:49, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-12-29 08:05:40, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
ipban 1.8.0
BruteForce
RDP
5 months ago
[rede-188] 2025-12-07 01:55:48, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
Connection to port 25 from port 33652
Spam
SMTP
5 months ago
Connection to port 3389 from port 55006
BruteForce
RDP
5 months ago
[arem1] 2025-11-23 07:50:16, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[rede-188] 2025-11-13 19:03:35, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[arem1] 2025-11-12 01:06:34, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-168-134] 2025-11-10 16:20:26, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
6 months ago
ipban 3.0.0 - 14
BruteForce
RDP
6 months ago
[probe-168-134] 2025-11-01 01:01:49, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipbanpro 4.3.0 - 14
BruteForce
RDP
RLorenz
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
imcas
6 months ago
ipban 1.9.0 - 400
BruteForce
Apache
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
6 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
imcas
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
7 months ago
[arem1] 2025-10-03 14:57:17, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
7 months ago
ipban 3.0.0 - Connection closed
BruteForce
SSH
Anonymous
7 months ago
ipban 3.0.0 - 14
BruteForce
RDP
7 months ago
ipban 1.8.0
BruteForce
RDP
7 months ago
[probe-44-49] 2025-09-24 11:01:25, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
Connection to port 9200 from port 41738
BruteForce
Elasticsearch
7 months ago
Connection to port 3306 from port 41118
BruteForce
MySQL
7 months ago
[probe-44-49] 2025-09-18 11:53:37, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-09-18 09:06:16, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
8 months ago
fail2ban
BruteForce
dovecot
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-09-04 18:48:05, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-09-03 07:01:59, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[arem1] 2025-08-31 16:04:52, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-30 09:16:15, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[rede-188] 2025-08-29 15:28:35, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-168-134] 2025-08-21 12:47:46, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-17 13:52:37, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-14 21:48:58, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
RLorenz
9 months ago
ipban 1.8.1 - 14
BruteForce
RDP
ric404
9 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
9 months ago
[rede-188] 2025-08-03 23:02:24, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-07-23 08:00:45, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
imcas
9 months ago
ipban 1.9.0 - 400
BruteForce
Apache
Anonymous
9 months ago
fail2ban
BruteForce, Hacking, PortScan
postfix
10 months ago
[probe-44-49] 2025-07-10 21:51:16, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
fail2ban
BruteForce
dovecot
10 months ago
[arem1] 2025-07-06 05:56:31, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[probe-44-49] 2025-07-04 18:05:37, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[rede-188] 2025-07-04 11:38:07, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
Censys.io.Scanner
Hacking
IPS
10 months ago
Connection to port 1080 from port 56856
PortScan
SOCKS
10 months ago
[probe-44-49] 2025-06-29 05:34:49, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[probe-176-124] 2025-06-24 22:09:18, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[probe-44-49] 2025-06-23 16:59:35, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[probe-44-49] 2025-06-18 09:41:12, Client: 162.142.125.213, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
Connection to port 110 from port 48958
BruteForce
POP3
Contact IPThreat