IP Address: 162.142.125.38


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
4 days ago
fail2ban
BruteForce
dovecot
Anonymous
4 days ago
fail2ban
Hacking
HTTP
6 days ago
[probe-44-49] 2026-02-11 10:07:20, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /g8idsnd5c1fw3b2gqh
PortScan
HTTP
imcas
7 days ago
ipban 2.0.1 - 14
BruteForce
RDP
20 days ago
[probe-44-49] 2026-01-28 23:23:13, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
22 days ago
[probe-44-49] 2026-01-26 10:53:41, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /def4o5zt9xj8e_
PortScan
HTTP
23 days ago
[probe-68-69] 2026-01-25 17:01:11, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
27 days ago
[probe-168-134] 2026-01-21 17:21:33, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
28 days ago
[probe-44-49] 2026-01-20 22:05:05, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[rede-188] 2026-01-13 11:39:20, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipbanpro 5.0.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-01-10 17:07:48, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
one month ago
[probe-44-49] 2026-01-08 12:59:03, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
one month ago
ipban 3.0.0 - 14
BruteForce
RDP
one month ago
[probe-168-134] 2026-01-03 20:00:07, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
ipban 2.0.1 - 14
BruteForce
RDP
one month ago
[rede-188] 2025-12-28 09:06:04, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[rede-188] 2025-12-25 09:06:45, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 2.0.0 - 14
BruteForce
RDP
Anonymous
one month ago
ipban 3.0.0
BruteForce
Nginx
Anonymous
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
2 months ago
[probe-68-69] 2025-12-11 20:57:57, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
EugeneK
2 months ago
ipban 2.0.0 - 14
BruteForce
RDP
2 months ago
Connection to port 25 from port 27244
Spam
SMTP
2 months ago
ipban 1.8.0
BruteForce
RDP
3 months ago
fail2ban
BruteForce
postfix
3 months ago
[arem1] 2025-11-15 11:28:04, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
3 months ago
ipban 1.8.1 - 14
BruteForce
RDP
RLorenz
3 months ago
ipban 1.8.1 - 14
BruteForce
RDP
4 months ago
[rede-188] 2025-10-20 06:56:02, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
4 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
4 months ago
ipban 2.0.0 - 14
BruteForce
RDP
4 months ago
[probe-44-49] 2025-09-27 12:27:19, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-44-49] 2025-09-25 03:52:51, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
Connection to port 23 from port 60000
BruteForce
Telnet
RLorenz
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
5 months ago
[probe-44-49] 2025-09-03 10:07:54, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
5 months ago
ipban 3.0.0 - Connection closed
BruteForce
SSH
Anonymous
5 months ago
ipban 2.0.1
BruteForce
RDP
Anonymous
5 months ago
ipban 3.0.0 - Connection closed
BruteForce
SSH
Anonymous
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
5 months ago
[arem1] 2025-08-26 11:55:42, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
5 months ago
[probe-44-49] 2025-08-26 08:49:57, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
6 months ago
ipban 2.0.1
BruteForce
RDP
tuya
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
6 months ago
[probe-68-69] 2025-08-20 19:04:52, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Tsuwado
6 months ago
ipban 2.0.1 - Policy violation. Connection refused.
BruteForce
MailEnable-2
6 months ago
[rede-188] 2025-08-13 23:48:47, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-10 08:07:31, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[rede-188] 2025-08-08 16:58:18, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
[probe-44-49] 2025-08-04 19:04:22, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-168-134] 2025-07-23 12:02:10, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
7 months ago
ipban 2.0.1
BruteForce
RDP
7 months ago
[probe-44-49] 2025-07-13 08:19:36, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
Connection to port 3389 from port 43154
BruteForce
RDP
7 months ago
fail2ban
BruteForce
dovecot
7 months ago
Connection to port 5900 from port 54160
BruteForce
VNC
7 months ago
[probe-44-49] 2025-06-29 03:07:47, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Tsuwado
8 months ago
ipban 2.0.1 - Policy violation. Connection refused.
BruteForce
MailEnable-2
imcas
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-44-49] 2025-06-24 21:00:42, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-20 12:35:05, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-16 13:49:27, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[arem1] 2025-06-09 15:30:18, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-06-09 01:42:05, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
Connection to port 23 from port 59198
BruteForce
Telnet
8 months ago
[probe-44-49] 2025-06-01 04:38:19, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
8 months ago
[sm-vultr-01] 2025-05-30 14:32:42, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
tuya
8 months ago
ipban 2.0.1 - Connection closed
BruteForce
SSH
9 months ago
[arem1] 2025-05-26 08:58:38, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[arem1] 2025-05-22 20:47:14, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[probe-44-49] 2025-05-21 22:42:41, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[arem1] 2025-05-19 01:50:52, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
9 months ago
Connection to port 110 from port 44176
BruteForce
POP3
9 months ago
[probe-44-49] 2025-05-07 22:31:28, Client: 162.142.125.38, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
Anonymous
9 months ago
fail2ban
BruteForce, Hacking, PortScan
postfix
Anonymous
9 months ago
ipban 3.0.0
BruteForce
RDP
10 months ago
ipbanpro 4.0.0 - 14
BruteForce
RDP
Anonymous
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
ipban 1.9.0 - 5152
BruteForce
RDP
10 months ago
ipban 1.8.0
BruteForce
RDP
10 months ago
fail2ban
BruteForce
dovecot
10 months ago
Connection to port 5900 from port 56960
BruteForce
VNC
Anonymous
10 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
ipban 2.0.1 - 14
BruteForce
RDP
one year ago
ipbanpro 4.0.0 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
Censys.io.Scanner
Hacking
IPS
one year ago
ipban 1.8.0
BruteForce
RDP
Anonymous
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
one year ago
ipban 1.8.0
BruteForce
RDP
one year ago
Censys.io.Scanner
Hacking
IPS
RLorenz
one year ago
ipban 1.8.1 - 14
BruteForce
RDP
Contact IPThreat