AbuseIPDB » 162.142.125.199

162.142.125.199 was found in our database!

This IP was reported 3,913 times. Confidence of Abuse is 0%: ?

0%
ISP Censys, Inc.
Usage Type Data Center/Web Hosting/Transit
ASN AS398324
Domain Name censys.com
Country United States of America
City Chicago, Illinois

IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.


Important Note: 162.142.125.199 is an IP address from within our whitelist belonging to the subnet 162.142.125.0/24, which we identify as: "Censys (https://about.censys.io/)".

Whitelisted netblocks are typically owned by trusted entities, such as Google or Microsoft who may use them for search engine spiders. However, these same entities sometimes also provide cloud servers and mail services which are easily abused. Pay special attention when trusting or distrusting these IPs.

IP Abuse Reports for 162.142.125.199:

This IP address has been reported a total of 3,913 times from 497 distinct sources. 162.142.125.199 was first reported on , and the most recent report was .

Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.

Reporter IoA Timestamp in UTC Comment Categories
Anonymous
Portscan
Port Scan
spyra.rocks
NGINX
Bad Web Bot
Study Bitcoin 🤗
Port probe to tcp/80 (http)
[srv136]
Port Scan Bad Web Bot Web App Attack
MPL
tcp/51443 (6 or more attempts)
Port Scan
MPL
tcp/51443 (12 or more attempts)
Port Scan
gu-alvareza
Censys.io.Scanner
Port Scan
mickael137
Brute-Force
sefinek.net
Honeypot [kitty]: Empty payload on 48627/tcp (likely service probe)
Port Scan
Study Bitcoin 🤗
2 port probes: tcp/10250, tcp/79 (finger)
[srv124]
Port Scan
spamverify.com
Honeypot Hit: Port Scan (22) SSH
Web Spam Blog Spam Bad Web Bot Web App Attack
Study Bitcoin 🤗
Port probe to tcp/8006
[srv134]
Port Scan
mkaraki
1742948354 # Service_probe # SIGNATURE_SEND # source_ip:162.142.125.199 # dst_port:45465
...
Port Scan
Andrew
Port Scan
Anonymous
Triggered: repeated knocking on closed ports.
Port Scan
SuperCores Hosting
[2025-03-25 20:02:03.007311] SSH/22 Unautorized connection. Suspicious SSH Brute-force.
Port Scan Hacking Brute-Force Exploited Host SSH

Showing 1 to 15 of 3913 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership. Request Takedown 🚩

Recently Reported IPs: