Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America

Internet Service Provider: Censys Inc.

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
 TCP (SYN) 162.142.125.23:43244 -> port 3389, len 44
2020-09-15 22:17:17
attack
Port scanning [2 denied]
2020-09-15 14:14:08
attack
firewall-block, port(s): 5684/udp
2020-09-15 06:24:11
attack
Unauthorised connection attempts on TCP3390
2020-09-15 03:33:36
attackspambots
Port scan detected
2020-09-14 19:29:21
attack
 TCP (SYN) 162.142.125.23:12528 -> port 1433, len 44
2020-09-06 02:36:47
attackspam
 TCP (SYN) 162.142.125.23:47988 -> port 143, len 44
2020-09-05 18:13:10
attackspam
port scan and connect, tcp 110 (pop3)
2020-09-01 08:49:14
attackbotsspam
Unauthorized connection attempt detected from IP address 162.142.125.23 to port 5683 [T]
2020-08-23 02:57:09
Comments on same subnet:
IP Type Details Datetime
162.142.125.86 botsattack
Bad IP
2025-03-06 19:09:23
162.142.125.197 attackproxy
Fraud connect
2024-09-05 12:48:39
162.142.125.12 proxy
Scan
2023-06-05 16:37:12
162.142.125.11 proxy
VPN fraud
2023-06-05 12:59:49
162.142.125.223 proxy
VPN fraud
2023-05-31 21:46:50
162.142.125.225 proxy
VPN fraud
2023-05-29 12:47:59
162.142.125.84 proxy
VPN scan
2023-05-22 12:51:31
162.142.125.224 proxy
VPN fraud
2023-05-18 12:47:47
162.142.125.89 proxy
VPN f
2023-05-13 12:57:08
162.142.125.217 proxy
VPN fraud
2023-05-13 12:54:50
162.142.125.14 proxy
VPN fraud
2023-05-12 14:21:18
162.142.125.214 proxy
VPN fraud
2023-03-31 12:54:37
162.142.125.87 proxy
VPN fraud
2023-03-29 12:58:45
162.142.125.13 proxy
VPN fraud
2023-03-29 12:56:42
162.142.125.10 attack
DANGER DUDE ATTACK
2022-02-18 10:02:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.142.125.23
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40480
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;162.142.125.23.			IN	A

;; AUTHORITY SECTION:
.			440	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 23 02:57:04 CST 2020
;; MSG SIZE  rcvd: 118
Host info
23.125.142.162.in-addr.arpa domain name pointer scanner-04.ch1.censys-scanner.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
23.125.142.162.in-addr.arpa	name = scanner-04.ch1.censys-scanner.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.88.112.58 attackspam
$f2bV_matches
2019-11-27 16:35:18
27.3.113.153 attackbotsspam
SpamReport
2019-11-27 16:19:19
176.109.229.111 attack
Automatic report - Port Scan Attack
2019-11-27 16:34:04
129.211.76.101 attackbotsspam
$f2bV_matches_ltvn
2019-11-27 16:27:37
185.176.27.166 attack
11/27/2019-08:38:39.439404 185.176.27.166 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-27 16:03:48
63.83.78.133 attackspam
Nov 27 07:11:12 mxgate1 postfix/postscreen[7657]: CONNECT from [63.83.78.133]:37214 to [176.31.12.44]:25
Nov 27 07:11:12 mxgate1 postfix/dnsblog[7659]: addr 63.83.78.133 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 27 07:11:12 mxgate1 postfix/dnsblog[7662]: addr 63.83.78.133 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 27 07:11:18 mxgate1 postfix/postscreen[7657]: DNSBL rank 3 for [63.83.78.133]:37214
Nov x@x
Nov 27 07:11:19 mxgate1 postfix/postscreen[7657]: DISCONNECT [63.83.78.133]:37214


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.78.133
2019-11-27 16:15:30
119.153.101.106 attackbots
Automatic report - Banned IP Access
2019-11-27 16:10:03
185.209.0.90 attackbots
firewall-block, port(s): 3555/tcp, 3567/tcp
2019-11-27 16:23:41
152.136.62.232 attack
Nov 27 08:51:55 lnxweb61 sshd[17250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.62.232
2019-11-27 16:06:35
213.203.223.138 attack
Nov 27 09:23:04 minden010 sshd[4175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.203.223.138
Nov 27 09:23:06 minden010 sshd[4175]: Failed password for invalid user ginger from 213.203.223.138 port 58606 ssh2
Nov 27 09:29:20 minden010 sshd[6260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.203.223.138
...
2019-11-27 16:35:32
218.92.0.137 attackspam
Nov 27 09:25:22 fr01 sshd[11280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.137  user=root
Nov 27 09:25:24 fr01 sshd[11280]: Failed password for root from 218.92.0.137 port 40381 ssh2
...
2019-11-27 16:31:16
118.25.195.244 attack
Invalid user ts3 from 118.25.195.244 port 33346
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.244
Failed password for invalid user ts3 from 118.25.195.244 port 33346 ssh2
Invalid user wwwadmin from 118.25.195.244 port 42106
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.195.244
2019-11-27 16:10:48
103.8.58.49 attackbotsspam
SpamReport
2019-11-27 16:13:49
36.255.27.192 attackbots
Email spam botnet
2019-11-27 16:20:21
92.47.7.67 attackspam
Automatic report - Port Scan Attack
2019-11-27 16:29:45

Recently Reported IPs

114.34.33.165 220.134.209.21 201.248.134.161 220.124.58.206
219.79.0.219 219.78.43.77 103.199.18.109 219.77.236.103
219.73.90.120 181.92.75.4 219.248.16.67 185.34.40.124
55.83.96.6 24.214.137.221 52.188.4.230 194.55.17.247
28.37.145.224 125.105.105.240 97.22.107.126 123.113.254.17