Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
162.142.125.86 botsattack
Bad IP
2025-03-06 19:09:23
162.142.125.197 attackproxy
Fraud connect
2024-09-05 12:48:39
162.142.125.12 proxy
Scan
2023-06-05 16:37:12
162.142.125.11 proxy
VPN fraud
2023-06-05 12:59:49
162.142.125.223 proxy
VPN fraud
2023-05-31 21:46:50
162.142.125.225 proxy
VPN fraud
2023-05-29 12:47:59
162.142.125.84 proxy
VPN scan
2023-05-22 12:51:31
162.142.125.224 proxy
VPN fraud
2023-05-18 12:47:47
162.142.125.89 proxy
VPN f
2023-05-13 12:57:08
162.142.125.217 proxy
VPN fraud
2023-05-13 12:54:50
162.142.125.14 proxy
VPN fraud
2023-05-12 14:21:18
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
162.142.125.13 proxy
VPN fraud
2023-03-29 12:56:42
162.142.125.10 attack
DANGER DUDE ATTACK
2022-02-18 10:02:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.142.125.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.142.125.142.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021100 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 11 14:32:33 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.125.142.162.in-addr.arpa domain name pointer scanner-21.ch1.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.125.142.162.in-addr.arpa	name = scanner-21.ch1.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.6.182.71 attackbots
Unauthorized connection attempt detected from IP address 37.6.182.71 to port 80 [J]
2020-01-29 00:50:56
191.97.38.206 attackbots
Unauthorized connection attempt detected from IP address 191.97.38.206 to port 23 [J]
2020-01-29 00:28:22
42.114.24.206 attack
Unauthorized connection attempt detected from IP address 42.114.24.206 to port 23 [J]
2020-01-29 00:49:26
2.234.170.161 attackspambots
Unauthorized connection attempt detected from IP address 2.234.170.161 to port 85 [J]
2020-01-29 01:13:56
200.117.222.134 attackspam
Unauthorized connection attempt detected from IP address 200.117.222.134 to port 23 [J]
2020-01-29 01:18:26
45.113.70.146 attack
Unauthorized connection attempt detected from IP address 45.113.70.146 to port 3372 [J]
2020-01-29 00:48:25
87.197.136.28 attack
Unauthorized connection attempt detected from IP address 87.197.136.28 to port 80 [J]
2020-01-29 00:15:45
67.207.89.84 attack
Jan 28 14:54:36 vps sshd[675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.89.84 
Jan 28 14:54:38 vps sshd[675]: Failed password for invalid user kaushal from 67.207.89.84 port 36238 ssh2
Jan 28 15:07:35 vps sshd[1762]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.89.84 
...
2020-01-29 00:44:55
168.181.120.28 attackbots
Unauthorized connection attempt detected from IP address 168.181.120.28 to port 23 [J]
2020-01-29 00:58:37
122.117.184.231 attack
Jan 28 17:14:27 debian-2gb-nbg1-2 kernel: \[2487333.694359\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=122.117.184.231 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=51 ID=11735 PROTO=TCP SPT=6871 DPT=23 WINDOW=30391 RES=0x00 SYN URGP=0
2020-01-29 00:36:37
51.161.12.231 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 42 - port: 8545 proto: TCP cat: Misc Attack
2020-01-29 00:21:18
201.74.52.74 attackbots
Unauthorized connection attempt detected from IP address 201.74.52.74 to port 8080 [J]
2020-01-29 00:54:45
91.226.9.154 attackspam
Unauthorized connection attempt detected from IP address 91.226.9.154 to port 8000 [J]
2020-01-29 00:15:05
167.99.46.145 attackbotsspam
Unauthorized connection attempt detected from IP address 167.99.46.145 to port 2220 [J]
2020-01-29 00:59:32
68.183.239.25 attackbotsspam
Unauthorized connection attempt detected from IP address 68.183.239.25 to port 80 [J]
2020-01-29 00:19:15

Recently Reported IPs

161.132.98.22 161.97.148.201 162.0.232.58 161.97.183.154
160.226.139.135 162.245.237.226 162.241.139.160 163.123.142.208
162.219.178.98 162.55.100.108 162.55.170.92 163.123.142.232
163.172.111.147 162.55.63.235 162.191.245.184 163.53.179.174
164.163.96.23 164.90.157.227 164.77.84.142 164.68.102.178