IP Address: 162.142.125.218


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
RLorenz
11 days ago
ipban 1.8.1 - 14
BruteForce
RDP
13 days ago
[rede-188] 2026-03-20 15:51:27, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
14 days ago
[probe-68-69] 2026-03-20 08:07:04, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
15 days ago
[rede-188] 2026-03-19 01:48:45, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /vphl02r550w4c_es
PortScan
HTTP
16 days ago
[probe-44-49] 2026-03-18 05:19:09, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
17 days ago
[probe-68-69] 2026-03-17 01:08:09, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /zfv85r1610tj4dx1yl
PortScan
HTTP
RLorenz
19 days ago
ipbanpro 5.0.0 - 14
BruteForce
RDP
21 days ago
[probe-44-49] 2026-03-13 07:01:47, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
27 days ago
[probe-44-49] 2026-03-06 15:53:06, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
28 days ago
ipban 1.8.1 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-03-03 08:23:22, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-01 21:56:55, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /idb7p9bowy
PortScan
HTTP
EugeneK
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-02-28 01:02:49, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /78b3gx2wwh
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-27 20:45:57, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /v_zzziuy2b
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-27 17:04:26, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-25 18:49:46, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-168-134] 2026-02-24 10:00:30, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-22 19:55:06, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /2_octipwfnqw1i8wa
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-21 08:10:42, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-19 05:51:05, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-18 09:59:39, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /ccnorg_s87a
PortScan
HTTP
RLorenz
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
one month ago
[probe-168-134] 2026-02-12 22:28:30, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
fail2ban
Hacking
HTTP
one month ago
[rede-188] 2026-02-10 17:30:21, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-02-09 16:18:00, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
fail2ban
BruteForce
dovecot
Anonymous
one month ago
ipban 1.8.0 - 14
BruteForce
RDP
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[rede-188] 2026-02-05 02:57:05, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-04 21:02:48, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[arem1] 2026-02-01 16:12:23, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
fail2ban
BruteForce
postfix
2 months ago
[probe-44-49] 2026-01-31 11:51:44, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-29 13:12:12, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-28 16:02:45, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /bx7k1lakbvwa
PortScan
HTTP
2 months ago
[probe-168-134] 2026-01-26 09:01:15, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /8c7qavbov37r
PortScan
HTTP
imcas
2 months ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
2 months ago
[probe-44-49] 2026-01-25 09:04:32, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-24 08:11:52, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipbanpro 4.4.0 - 14
BruteForce
RDP
2 months ago
[arem1] 2026-01-20 07:56:31, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-20 00:14:43, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[rede-188] 2026-01-15 21:09:49, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-14 20:56:15, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
2 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
2 months ago
[probe-44-49] 2026-01-12 02:31:46, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
3 months ago
ipban 2.0.1 - 14
BruteForce
RDP
Anonymous
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
fail2ban
BruteForce
postfix
3 months ago
[arem1] 2025-12-17 11:07:42, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
4 months ago
Connection to port 1433 from port 57014
BruteForce
MSSQL
tuya
4 months ago
ipban 2.0.1 - 14
BruteForce
RDP
4 months ago
[rede-188] 2025-11-10 02:13:41, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-11-06 23:19:49, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
EugeneK
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
fail2ban
BruteForce
dovecot
Anonymous
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
Connection to port 3389 from port 38458
BruteForce
RDP
imcas
5 months ago
ipban 1.9.0 - 400
BruteForce
Apache
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
6 months ago
[probe-168-134] 2025-10-03 21:06:15, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipbanpro 4.3.0
BruteForce
Apache
RLorenz
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
imcas
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
RLorenz
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
6 months ago
[probe-68-69] 2025-09-28 08:59:40, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
Connection to port 25 from port 50532
Spam
SMTP
6 months ago
[probe-44-49] 2025-09-15 09:59:48, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-68-69] 2025-09-14 14:38:57, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-09-14 03:51:32, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-09-13 09:59:36, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
Anonymous
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-09-06 09:08:39, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-09-04 16:28:53, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[arem1] 2025-09-03 12:02:28, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-09-02 13:51:17, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[rede-188] 2025-08-29 15:29:53, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-08-29 11:18:13, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-08-28 20:43:55, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
7 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
7 months ago
[probe-44-49] 2025-08-27 07:51:40, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-08-26 08:08:50, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[arem1] 2025-08-25 10:54:04, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-08-20 07:07:09, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
7 months ago
ipban 2.0.1 - 14
BruteForce
RDP
7 months ago
ipban 2.0.0 - 14
BruteForce
RDP
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-08-12 23:00:32, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
fail2ban
BruteForce
dovecot
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-08-02 08:59:56, Client: 162.142.125.218, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Contact IPThreat