IP Address: 162.142.125.221


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
16 days ago
[probe-68-69] 2026-03-22 07:52:28, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
19 days ago
ipban 1.8.0 - 14
BruteForce
RDP
21 days ago
[probe-44-49] 2026-03-17 09:46:26, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /u8ng0k5zi9ffl8w13
PortScan
HTTP
27 days ago
[probe-168-134] 2026-03-11 14:54:15, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /25jrvmf4_lgc
PortScan
HTTP
27 days ago
[probe-44-49] 2026-03-11 02:54:41, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /of7bp0jizt_ablz
PortScan
HTTP
28 days ago
[probe-44-49] 2026-03-09 23:57:53, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-06 23:54:12, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /lk7euki2fd5q_y2pk4
PortScan
HTTP
one month ago
[probe-68-69] 2026-03-06 11:00:21, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 1.9.0 - 14
BruteForce
RDP
RLorenz
one month ago
ipbanpro 5.0.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-03-02 09:48:21, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-28 07:49:51, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-02-28 01:06:34, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-27 21:47:50, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-22 14:00:46, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /nt690_zr_r
PortScan
HTTP
EugeneK
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-02-18 09:02:35, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[rede-188] 2026-02-18 00:59:29, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /ewak51unaqnoqxga6g
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-17 16:01:36, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /3chxfefajotds578
PortScan
HTTP
tuya
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
one month ago
[probe-168-134] 2026-02-16 19:02:37, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /k4jelrx4jej
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-16 15:00:23, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /c3cqayipsg26y
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-14 22:09:01, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-14 11:00:16, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
one month ago
[probe-44-49] 2026-02-09 04:04:04, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /e0ncjo6bwl3dop0he
PortScan
HTTP
one month ago
[probe-68-69] 2026-02-09 02:55:38, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipbanpro 4.4.0 - 14
BruteForce
RDP
2 months ago
[probe-44-49] 2026-01-29 17:12:43, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /60zmxuvgdw87o
PortScan
HTTP
2 months ago
[probe-68-69] 2026-01-27 14:12:31, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /75zrap2kgki5g9h3lo
PortScan
HTTP
2 months ago
Connection to port 110 from port 30440
BruteForce
POP3
Anonymous
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
2 months ago
[rede-188] 2026-01-25 00:47:20, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
2 months ago
ipban 2.0.1 - 14
BruteForce
RDP
2 months ago
[probe-44-49] 2026-01-16 11:16:41, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-13 23:50:21, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-44-49] 2026-01-08 20:08:45, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-12-16 18:06:17, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[arem1] 2025-12-16 01:58:32, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2025-12-14 09:06:00, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[rede-188] 2025-12-12 07:04:12, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
4 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
tuya
4 months ago
ipban 2.0.1 - 14
BruteForce
RDP
4 months ago
Connection to port 9200 from port 61584
BruteForce
Elasticsearch
4 months ago
fail2ban
BruteForce
dovecot
4 months ago
[probe-68-69] 2025-11-22 11:27:18, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
4 months ago
ipban 1.8.1 - 14
BruteForce
RDP
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
5 months ago
[probe-68-69] 2025-11-02 13:00:34, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
5 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
5 months ago
[arem1] 2025-10-31 21:28:43, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
5 months ago
ipban 1.9.0 - 400
BruteForce
Apache
5 months ago
[probe-168-134] 2025-10-28 17:19:38, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 months ago
ipban 2.0.0 - 14
BruteForce
RDP
5 months ago
Connection to port 21 from port 45860
BruteForce
FTP
imcas
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
EugeneK
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
6 months ago
Connection to port 5900 from port 54342
BruteForce
VNC
EugeneK
6 months ago
ipban 3.0.0 - 14
BruteForce
RDP
6 months ago
[probe-68-69] 2025-09-29 08:55:40, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-68-69] 2025-09-27 03:54:45, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
6 months ago
[probe-44-49] 2025-09-24 02:52:17, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-09-22 06:24:58, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
Connection to port 3306 from port 37574
BruteForce
MySQL
Anonymous
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
6 months ago
[probe-44-49] 2025-09-17 23:25:44, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-09-06 07:21:48, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-09-03 02:53:23, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
7 months ago
ipban 2.0.0 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-08-30 16:50:38, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-08-26 23:00:24, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-08-24 14:06:55, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
7 months ago
[probe-68-69] 2025-08-19 16:49:03, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-68-69] 2025-08-17 14:15:03, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
fail2ban
BruteForce
postfix
7 months ago
[probe-68-69] 2025-08-15 10:50:05, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-168-134] 2025-08-10 00:10:23, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
ipban 1.8.0
BruteForce
RDP
8 months ago
[probe-44-49] 2025-08-04 13:51:55, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-68-69] 2025-08-01 11:59:09, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-07-23 19:07:39, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-07-21 00:56:56, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
ipban 1.9.0 - Connection closed
BruteForce
SSH
RLorenz
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
8 months ago
[arem1] 2025-07-17 09:59:09, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-07-13 01:56:40, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[rede-188] 2025-07-13 00:45:38, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
fail2ban
BruteForce
postfix
9 months ago
[probe-44-49] 2025-07-10 01:59:28, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-07-09 11:48:55, Client: 162.142.125.221, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Contact IPThreat