IP Address: 162.142.125.216


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
21 hours ago
[probe-44-49] 2026-02-18 09:04:34, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 days ago
[probe-44-49] 2026-02-17 08:04:31, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 days ago
ipban 3.1.0 - 14
BruteForce
RDP
3 days ago
[rede-188] 2026-02-16 05:21:39, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 days ago
[probe-44-49] 2026-02-15 03:02:33, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 days ago
[rede-188] 2026-02-13 21:03:56, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
7 days ago
ipban 3.1.0 - 14
BruteForce
RDP
Anonymous
11 days ago
ipban 3.1.0 - 14
BruteForce
RDP
12 days ago
fail2ban
BruteForce
postfix
12 days ago
[probe-44-49] 2026-02-07 02:06:54, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /pr1kukr07zt4_uh
PortScan
HTTP
12 days ago
[probe-44-49] 2026-02-06 10:54:09, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
13 days ago
[probe-44-49] 2026-02-05 19:54:18, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
16 days ago
[probe-68-69] 2026-02-03 00:53:57, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
16 days ago
[probe-44-49] 2026-02-02 10:02:23, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Netsy
17 days ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
20 days ago
ipban 3.1.0 - 14
BruteForce
RDP
21 days ago
[probe-44-49] 2026-01-28 12:08:13, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
22 days ago
[arem1] 2026-01-27 14:15:31, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /n7_rja5mhsc3zee
PortScan
HTTP
23 days ago
fail2ban
BruteForce
dovecot
25 days ago
[probe-44-49] 2026-01-24 08:51:51, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /qzvmxyp54tt1se5
PortScan
HTTP
26 days ago
[probe-44-49] 2026-01-23 08:43:11, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-01-20 01:16:36, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-01-15 17:04:20, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
one month ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
one month ago
[probe-44-49] 2026-01-07 01:07:14, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 3.0.0
BruteForce
Nginx
EugeneK
one month ago
ipban 2.0.0 - 14
BruteForce
RDP
one month ago
fail2ban
BruteForce
dovecot
one month ago
[probe-168-134] 2025-12-29 06:56:23, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
fail2ban
BruteForce
dovecot
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
2 months ago
ipban 1.8.0
BruteForce
RDP
2 months ago
[probe-68-69] 2025-12-07 12:04:06, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-168-134] 2025-12-06 07:14:37, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 2.0.1 - 14
BruteForce
RDP
2 months ago
[rede-188] 2025-11-27 05:54:52, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
EugeneK
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
[probe-68-69] 2025-11-22 08:34:40, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
3 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
3 months ago
ipban 2.0.1 - 14
BruteForce
RDP
ric404
3 months ago
ipban 3.0.0 - 14
BruteForce
RDP
3 months ago
[probe-168-134] 2025-11-11 03:08:33, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 2.0.1 - 14
BruteForce
RDP
3 months ago
[arem1] 2025-11-05 10:41:57, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 2.0.1 - 14
BruteForce
RDP
4 months ago
fail2ban
BruteForce
dovecot
ric404
4 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
NoirBit
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
4 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
4 months ago
[probe-168-134] 2025-10-05 02:24:40, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
Connection to port 5900 from port 57560
BruteForce
VNC
4 months ago
[rede-188] 2025-10-03 03:52:50, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-68-69] 2025-09-30 08:49:55, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
4 months ago
ipban 3.0.0 - Connection closed
BruteForce
SSH
4 months ago
[arem1] 2025-09-25 06:21:04, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-24 07:29:20, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
5 months ago
ipban 1.9.0 - 400
BruteForce
Apache
5 months ago
[probe-44-49] 2025-09-21 15:45:23, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
5 months ago
[probe-44-49] 2025-09-14 01:52:17, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-12 00:12:42, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
ipban 2.0.1 - 14
BruteForce
RDP
5 months ago
[probe-44-49] 2025-09-04 18:10:19, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
tuya
5 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
5 months ago
[arem1] 2025-09-03 07:40:50, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-09-02 12:20:34, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
5 months ago
[probe-44-49] 2025-08-30 14:56:32, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-68-69] 2025-08-29 23:07:33, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
5 months ago
[probe-44-49] 2025-08-29 08:11:06, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-08-28 19:36:21, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-22 08:07:15, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-15 22:51:53, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[rede-188] 2025-08-11 08:20:33, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
6 months ago
fail2ban
BruteForce
dovecot
6 months ago
[probe-44-49] 2025-08-09 14:30:17, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-06 11:37:29, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
7 months ago
[probe-44-49] 2025-07-21 09:06:13, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-17 15:50:24, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[arem1] 2025-07-14 15:05:55, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[arem1] 2025-07-11 22:59:58, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-07-11 01:59:42, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-07-08 03:07:07, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
tuya
7 months ago
ipban 2.0.1 - 14
BruteForce
RDP
Anonymous
7 months ago
ipban 2.0.0 - 14
BruteForce
RDP
7 months ago
[probe-68-69] 2025-07-01 08:53:29, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-07-01 08:11:22, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-168-134] 2025-06-25 14:35:55, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
Connection to port 9200 from port 45370
BruteForce
Elasticsearch
8 months ago
[probe-176-124] 2025-06-20 17:21:31, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-15 01:47:53, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-68-69] 2025-06-14 14:06:39, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-176-124] 2025-06-10 01:51:22, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[sm-vultr-01] 2025-06-08 21:04:16, Client: 162.142.125.216, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Contact IPThreat