IP Address: 162.142.125.44


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
23 days ago
[probe-44-49] 2026-03-21 21:33:49, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
ric404
28 days ago
ipban 3.0.0 - 4653
BruteForce
RDP
28 days ago
[arem1] 2026-03-16 08:00:50, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /zsh_os1yo0ekidicc
PortScan
HTTP
one month ago
[probe-44-49] 2026-03-12 16:56:12, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-03-06 07:49:29, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[probe-44-49] 2026-02-28 13:07:45, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[arem1] 2026-02-28 03:57:38, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /vrnboug5vtm0
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-25 02:56:09, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-23 15:58:33, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /xmb1rz_wtj7
PortScan
HTTP
Anonymous
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
RLorenz
one month ago
ipban 1.8.1 - 14
BruteForce
RDP
one month ago
fail2ban
BruteForce
dovecot
Tyler
one month ago
ipban 3.1.0 - 14
BruteForce
RDP
one month ago
[arem1] 2026-02-15 12:24:00, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
one month ago
[probe-44-49] 2026-02-14 11:01:43, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-13 02:58:33, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /nlsswt7uqncwhj_
PortScan
HTTP
2 months ago
[probe-44-49] 2026-02-12 10:03:33, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
ric404
2 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
2 months ago
[arem1] 2026-02-09 08:35:09, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
ipbanpro 4.4.0 - 14
BruteForce
RDP
2 months ago
[probe-44-49] 2026-02-06 17:23:13, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
fail2ban
BruteForce
sshd
Anonymous
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
2 months ago
[arem1] 2026-02-02 17:47:23, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-31 23:05:53, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-30 12:08:31, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /r9uekieh1clwag21
PortScan
HTTP
ric404
2 months ago
ipban 3.0.0 - 14
BruteForce
RDP
2 months ago
[probe-44-49] 2026-01-29 19:10:06, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /ox6u_rykjvf0p
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-27 15:56:50, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-25 08:04:29, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
2 months ago
[probe-44-49] 2026-01-24 08:56:00, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
2 months ago
ipban 3.1.0 - 14
BruteForce
RDP
imcas
2 months ago
ipban 2.0.1 - 14
BruteForce
RDP
RLorenz
2 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
3 months ago
ipban 2.0.0 - 14
BruteForce
RDP
3 months ago
[probe-68-69] 2025-12-26 16:00:42, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-12-22 06:18:04, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
3 months ago
[probe-168-134] 2025-12-21 15:13:45, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[arem1] 2025-12-11 11:40:28, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-12-08 07:05:00, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-12-07 11:05:40, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
[probe-168-134] 2025-12-02 07:27:34, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
4 months ago
Connection to port 1433 from port 30686
BruteForce
MSSQL
4 months ago
[probe-168-134] 2025-11-19 17:26:55, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
4 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
Anonymous
5 months ago
ipban 3.0.0 - 14
BruteForce
RDP
imcas
5 months ago
ipban 1.9.0 - 400
BruteForce
Apache
6 months ago
fail2ban
BruteForce
dovecot
6 months ago
[probe-168-134] 2025-10-16 09:28:49, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 months ago
Connection to port 25 from port 34046
Spam
SMTP
6 months ago
Connection to port 631 from port 46468
PortScan
IPP
imcas
6 months ago
ipban 2.0.0 - 14
BruteForce
RDP
tuya
6 months ago
ipban 2.0.1 - 14
BruteForce
RDP
RLorenz
6 months ago
ipban 1.8.1 - 14
BruteForce
RDP
6 months ago
fail2ban
BruteForce
dovecot
6 months ago
[probe-44-49] 2025-09-21 07:24:59, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
7 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
7 months ago
[rede-188] 2025-09-16 00:36:40, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
7 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
Anonymous
7 months ago
ipban 2.0.1
BruteForce
RDP
7 months ago
[probe-168-134] 2025-09-05 00:23:42, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
7 months ago
[probe-44-49] 2025-09-04 02:16:25, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
7 months ago
[probe-44-49] 2025-09-01 17:26:06, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
7 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Anonymous
7 months ago
ipban 2.0.1
BruteForce
RDP
Anonymous
7 months ago
ipban 2.0.1
BruteForce
RDP
8 months ago
[probe-44-49] 2025-08-19 22:48:16, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-08-18 12:50:45, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
RLorenz
8 months ago
ipban 1.8.1 - 14
BruteForce
RDP
Nudlz
8 months ago
ipban 2.0.0 - 14
BruteForce
RDP
8 months ago
[probe-68-69] 2025-08-06 14:51:07, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-44-49] 2025-07-27 20:59:55, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 months ago
[probe-168-134] 2025-07-23 11:31:53, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
Anonymous
9 months ago
ipban 1.8.1 - 14
BruteForce
RDP
9 months ago
[probe-44-49] 2025-07-17 06:50:07, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 months ago
[rede-188] 2025-07-09 22:37:23, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /version
PortScan
HTTP
9 months ago
[rede-188] 2025-07-08 03:01:20, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
EugeneK
9 months ago
ipban 2.0.0 - 14
BruteForce
RDP
9 months ago
ipban 2.0.0 - 5152
BruteForce
RDP
9 months ago
Connection to port 25 from port 59104
Spam
SMTP
9 months ago
[probe-44-49] 2025-06-28 09:04:27, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
9 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
9 months ago
[arem1] 2025-06-25 10:14:27, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
9 months ago
ipban 1.8.1 - 14
BruteForce
RDP
10 months ago
[probe-168-134] 2025-06-20 01:41:35, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
10 months ago
[probe-44-49] 2025-06-05 16:38:25, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
10 months ago
ipban 3.0.0 - 5152
BruteForce
RDP
Tsuwado
10 months ago
ipban 2.0.1 - Policy violation. Connection refused.
BruteForce
MailEnable-2
10 months ago
[probe-44-49] 2025-05-31 06:29:06, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Anonymous
10 months ago
ipban 1.8.1 - 14
BruteForce
RDP
11 months ago
[probe-44-49] 2025-05-22 05:59:30, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
11 months ago
Connection to port 23 from port 49748
BruteForce
Telnet
ric404
11 months ago
ipban 3.0.0 - 4653
BruteForce
RDP
11 months ago
Connection to port 2222 from port 46138
PortScan
Port 2222
imcas
11 months ago
ipban 2.0.1 - 5152
BruteForce
RDP
11 months ago
[probe-44-49] 2025-05-11 14:28:53, Client: 162.142.125.44, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Contact IPThreat