Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.195.132.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6729
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.195.132.16.			IN	A

;; AUTHORITY SECTION:
.			549	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:37:25 CST 2022
;; MSG SIZE  rcvd: 107
Host info
16.132.195.142.in-addr.arpa domain name pointer desjardinsfunds.com.
16.132.195.142.in-addr.arpa domain name pointer fondsdesjardins.com.
16.132.195.142.in-addr.arpa domain name pointer nat-fondsdesj-mtl.desjardins.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
16.132.195.142.in-addr.arpa	name = nat-fondsdesj-mtl.desjardins.com.
16.132.195.142.in-addr.arpa	name = desjardinsfunds.com.
16.132.195.142.in-addr.arpa	name = fondsdesjardins.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
37.59.36.210 attackbots
Aug 22 16:00:18 ns381471 sshd[19295]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.36.210
Aug 22 16:00:20 ns381471 sshd[19295]: Failed password for invalid user yy from 37.59.36.210 port 56722 ssh2
2020-08-23 00:33:29
192.81.209.72 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-22T14:11:53Z and 2020-08-22T14:19:39Z
2020-08-23 00:59:12
194.180.224.103 attackspam
Aug 22 18:02:40 ip40 sshd[12642]: Failed password for root from 194.180.224.103 port 58766 ssh2
...
2020-08-23 00:28:21
54.39.57.1 attackbotsspam
Aug 22 14:47:47 srv-ubuntu-dev3 sshd[99892]: Invalid user postgres from 54.39.57.1
Aug 22 14:47:47 srv-ubuntu-dev3 sshd[99892]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.57.1
Aug 22 14:47:47 srv-ubuntu-dev3 sshd[99892]: Invalid user postgres from 54.39.57.1
Aug 22 14:47:50 srv-ubuntu-dev3 sshd[99892]: Failed password for invalid user postgres from 54.39.57.1 port 53670 ssh2
Aug 22 14:51:39 srv-ubuntu-dev3 sshd[100357]: Invalid user wasadmin from 54.39.57.1
Aug 22 14:51:39 srv-ubuntu-dev3 sshd[100357]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.57.1
Aug 22 14:51:39 srv-ubuntu-dev3 sshd[100357]: Invalid user wasadmin from 54.39.57.1
Aug 22 14:51:41 srv-ubuntu-dev3 sshd[100357]: Failed password for invalid user wasadmin from 54.39.57.1 port 34304 ssh2
Aug 22 14:55:43 srv-ubuntu-dev3 sshd[100792]: Invalid user kanishk from 54.39.57.1
...
2020-08-23 00:25:18
220.248.95.178 attackspambots
Aug 22 14:43:49 ns381471 sshd[13005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.248.95.178
Aug 22 14:43:52 ns381471 sshd[13005]: Failed password for invalid user kingsley from 220.248.95.178 port 44534 ssh2
2020-08-23 00:29:54
46.209.45.60 attackbots
Invalid user uftp from 46.209.45.60 port 50478
2020-08-23 00:48:05
198.98.59.69 attackbotsspam
 TCP (SYN) 198.98.59.69:52554 -> port 3389, len 44
2020-08-23 01:03:37
118.24.70.248 attackspam
Aug 22 14:06:41 inter-technics sshd[16513]: Invalid user paul from 118.24.70.248 port 39978
Aug 22 14:06:41 inter-technics sshd[16513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.70.248
Aug 22 14:06:41 inter-technics sshd[16513]: Invalid user paul from 118.24.70.248 port 39978
Aug 22 14:06:43 inter-technics sshd[16513]: Failed password for invalid user paul from 118.24.70.248 port 39978 ssh2
Aug 22 14:12:09 inter-technics sshd[16999]: Invalid user wzj from 118.24.70.248 port 40512
...
2020-08-23 00:47:05
157.230.235.233 attackspam
Aug 22 12:08:46 jumpserver sshd[21593]: Invalid user marsh from 157.230.235.233 port 41786
Aug 22 12:08:48 jumpserver sshd[21593]: Failed password for invalid user marsh from 157.230.235.233 port 41786 ssh2
Aug 22 12:12:26 jumpserver sshd[21620]: Invalid user martin from 157.230.235.233 port 49244
...
2020-08-23 00:28:52
175.207.13.22 attack
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-22T15:51:45Z and 2020-08-22T16:00:21Z
2020-08-23 00:52:36
39.155.212.90 attackbotsspam
Aug 22 16:58:17 h2427292 sshd\[1595\]: Invalid user oracle from 39.155.212.90
Aug 22 16:58:17 h2427292 sshd\[1595\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=39.155.212.90 
Aug 22 16:58:18 h2427292 sshd\[1595\]: Failed password for invalid user oracle from 39.155.212.90 port 62188 ssh2
...
2020-08-23 00:28:01
36.236.105.191 attackbotsspam
SSH login attempts.
2020-08-23 01:03:14
37.139.16.229 attackbotsspam
prod8
...
2020-08-23 00:54:10
122.51.64.115 attackspambots
Aug 22 16:14:26 lukav-desktop sshd\[27087\]: Invalid user ravi from 122.51.64.115
Aug 22 16:14:26 lukav-desktop sshd\[27087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.115
Aug 22 16:14:28 lukav-desktop sshd\[27087\]: Failed password for invalid user ravi from 122.51.64.115 port 41764 ssh2
Aug 22 16:18:09 lukav-desktop sshd\[27126\]: Invalid user kirill from 122.51.64.115
Aug 22 16:18:09 lukav-desktop sshd\[27126\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.115
2020-08-23 00:34:40
37.233.77.228 attackspambots
 TCP (SYN) 37.233.77.228:41245 -> port 23, len 40
2020-08-23 00:37:39

Recently Reported IPs

142.195.130.18 142.196.140.129 142.196.116.87 142.196.194.234
142.196.140.237 142.196.178.79 142.190.17.74 118.96.253.235
142.196.102.162 142.190.52.110 142.196.202.154 142.196.5.123
142.197.101.200 142.197.190.150 142.197.165.132 142.197.10.115
142.197.16.156 142.197.158.146 142.197.217.23 142.197.65.14