Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
162.142.125.86 botsattack
Bad IP
2025-03-06 19:09:23
162.142.125.197 attackproxy
Fraud connect
2024-09-05 12:48:39
162.142.125.12 proxy
Scan
2023-06-05 16:37:12
162.142.125.11 proxy
VPN fraud
2023-06-05 12:59:49
162.142.125.223 proxy
VPN fraud
2023-05-31 21:46:50
162.142.125.225 proxy
VPN fraud
2023-05-29 12:47:59
162.142.125.84 proxy
VPN scan
2023-05-22 12:51:31
162.142.125.224 proxy
VPN fraud
2023-05-18 12:47:47
162.142.125.89 proxy
VPN f
2023-05-13 12:57:08
162.142.125.217 proxy
VPN fraud
2023-05-13 12:54:50
162.142.125.14 proxy
VPN fraud
2023-05-12 14:21:18
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
162.142.125.13 proxy
VPN fraud
2023-03-29 12:56:42
162.142.125.10 attack
DANGER DUDE ATTACK
2022-02-18 10:02:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.142.125.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4121
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.142.125.189.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 03:37:14 CST 2022
;; MSG SIZE  rcvd: 108
Host info
189.125.142.162.in-addr.arpa domain name pointer scanner-22.ch1.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.125.142.162.in-addr.arpa	name = scanner-22.ch1.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.87.154.2 attackbots
Invalid user kvr from 177.87.154.2 port 49816
2020-05-23 12:11:32
58.11.16.96 attackspam
Invalid user ubnt from 58.11.16.96 port 57261
2020-05-23 12:28:35
101.51.228.77 attack
Invalid user ubnt from 101.51.228.77 port 50966
2020-05-23 12:27:02
222.73.201.96 attack
Invalid user zik from 222.73.201.96 port 44841
2020-05-23 12:01:57
49.234.206.45 attackbotsspam
Invalid user ubb from 49.234.206.45 port 36006
2020-05-23 12:30:57
27.77.136.14 attackspam
Invalid user ubnt from 27.77.136.14 port 62855
2020-05-23 12:34:22
201.95.123.129 attackspam
Unauthorized connection attempt from IP address 201.95.123.129 on Port 445(SMB)
2020-05-23 12:04:43
125.161.128.232 attackspambots
Invalid user administrator from 125.161.128.232 port 28984
2020-05-23 12:17:11
218.78.110.114 attack
Invalid user plk from 218.78.110.114 port 54066
2020-05-23 12:36:47
210.16.187.206 attackspam
Invalid user qxn from 210.16.187.206 port 52513
2020-05-23 12:39:12
182.61.175.219 attackbots
Invalid user qsu from 182.61.175.219 port 58036
2020-05-23 12:09:44
218.78.84.162 attackspambots
Invalid user swb from 218.78.84.162 port 35016
2020-05-23 12:37:07
122.226.78.182 attackbots
Invalid user gxb from 122.226.78.182 port 42616
2020-05-23 12:18:31
106.12.137.46 attackbots
Invalid user iww from 106.12.137.46 port 47568
2020-05-23 12:24:41
51.83.41.120 attackbotsspam
Invalid user fhx from 51.83.41.120 port 51808
2020-05-23 12:29:35

Recently Reported IPs

103.96.90.27 42.114.39.111 149.202.130.48 117.215.200.120
197.246.175.131 134.209.83.234 49.207.212.62 36.4.252.163
45.177.164.135 154.118.13.127 113.194.135.209 27.38.211.210
20.185.20.255 107.172.66.169 197.210.54.60 106.105.203.50
193.70.88.85 180.188.232.106 113.23.107.83 187.163.124.75