Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Censys Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 162.142.125.19:49794 -> port 143, len 44
2020-10-12 23:15:24
attackspambots
Port scanning [4 denied]
2020-10-12 14:41:46
attackspam
 TCP (SYN) 162.142.125.19:52624 -> port 3390, len 44
2020-09-05 20:47:48
attackspam
firewall-block, port(s): 22222/tcp
2020-09-05 05:10:23
attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-08-24 13:12:35
Comments on same subnet:
IP Type Details Datetime
162.142.125.86 botsattack
Bad IP
2025-03-06 19:09:23
162.142.125.197 attackproxy
Fraud connect
2024-09-05 12:48:39
162.142.125.12 proxy
Scan
2023-06-05 16:37:12
162.142.125.11 proxy
VPN fraud
2023-06-05 12:59:49
162.142.125.223 proxy
VPN fraud
2023-05-31 21:46:50
162.142.125.225 proxy
VPN fraud
2023-05-29 12:47:59
162.142.125.84 proxy
VPN scan
2023-05-22 12:51:31
162.142.125.224 proxy
VPN fraud
2023-05-18 12:47:47
162.142.125.89 proxy
VPN f
2023-05-13 12:57:08
162.142.125.217 proxy
VPN fraud
2023-05-13 12:54:50
162.142.125.14 proxy
VPN fraud
2023-05-12 14:21:18
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
162.142.125.13 proxy
VPN fraud
2023-03-29 12:56:42
162.142.125.10 attack
DANGER DUDE ATTACK
2022-02-18 10:02:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.142.125.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46237
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.142.125.19.			IN	A

;; AUTHORITY SECTION:
.			381	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082301 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 24 13:12:31 CST 2020
;; MSG SIZE  rcvd: 118
Host info
19.125.142.162.in-addr.arpa domain name pointer scanner-01.ch1.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.125.142.162.in-addr.arpa	name = scanner-01.ch1.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
167.71.199.192 attack
Jun  9 13:03:03 itv-usvr-01 sshd[16672]: Invalid user temp from 167.71.199.192
Jun  9 13:03:03 itv-usvr-01 sshd[16672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.199.192
Jun  9 13:03:03 itv-usvr-01 sshd[16672]: Invalid user temp from 167.71.199.192
Jun  9 13:03:05 itv-usvr-01 sshd[16672]: Failed password for invalid user temp from 167.71.199.192 port 47662 ssh2
Jun  9 13:11:22 itv-usvr-01 sshd[17112]: Invalid user admin from 167.71.199.192
2020-06-09 17:12:03
14.21.7.162 attack
Failed password for invalid user monitor from 14.21.7.162 port 41809 ssh2
2020-06-09 17:32:56
188.166.244.121 attackbotsspam
Jun  9 08:31:57 fhem-rasp sshd[12785]: Invalid user conrad from 188.166.244.121 port 43952
...
2020-06-09 17:15:28
46.105.149.168 attackspam
Jun  9 08:20:33 buvik sshd[1154]: Invalid user shachunyang from 46.105.149.168
Jun  9 08:20:33 buvik sshd[1154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.149.168
Jun  9 08:20:35 buvik sshd[1154]: Failed password for invalid user shachunyang from 46.105.149.168 port 36732 ssh2
...
2020-06-09 17:19:24
35.232.55.86 attackspam
Unauthorized connection attempt detected from IP address 35.232.55.86 to port 23
2020-06-09 16:56:23
178.17.170.91 attackbots
xmlrpc attack
2020-06-09 17:31:36
40.120.54.164 attack
...
2020-06-09 17:35:47
159.65.206.10 attack
TCP port 8080: Scan and connection
2020-06-09 17:30:32
106.75.157.9 attackbotsspam
Jun  9 05:51:16 ArkNodeAT sshd\[28874\]: Invalid user admin from 106.75.157.9
Jun  9 05:51:16 ArkNodeAT sshd\[28874\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.157.9
Jun  9 05:51:18 ArkNodeAT sshd\[28874\]: Failed password for invalid user admin from 106.75.157.9 port 38798 ssh2
2020-06-09 17:02:55
212.64.29.136 attackbotsspam
Jun  9 14:08:47 dhoomketu sshd[595686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.136 
Jun  9 14:08:47 dhoomketu sshd[595686]: Invalid user deploy from 212.64.29.136 port 56708
Jun  9 14:08:49 dhoomketu sshd[595686]: Failed password for invalid user deploy from 212.64.29.136 port 56708 ssh2
Jun  9 14:12:10 dhoomketu sshd[595860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.29.136  user=root
Jun  9 14:12:12 dhoomketu sshd[595860]: Failed password for root from 212.64.29.136 port 39986 ssh2
...
2020-06-09 16:55:18
1.138.83.211 attack
PowerShell/Ploprolo.A
2020-06-09 17:23:24
179.215.126.223 attackspam
Automatic report - XMLRPC Attack
2020-06-09 16:57:53
82.102.20.170 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-06-09 17:13:46
182.160.37.29 attack
SMB Server BruteForce Attack
2020-06-09 17:20:13
120.31.138.70 attack
20 attempts against mh-ssh on echoip
2020-06-09 17:12:23

Recently Reported IPs

207.58.145.116 130.31.111.147 175.24.87.22 94.46.15.22
14.175.99.222 202.179.187.18 113.88.83.34 68.170.74.254
122.51.74.100 159.69.73.37 103.95.42.109 41.33.188.148
187.66.59.193 61.164.52.180 14.232.243.96 123.75.77.193
58.247.111.70 205.104.67.159 249.227.245.153 123.170.96.53