Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Saskatoon

Region: Saskatchewan

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       142.165.0.0 - 142.165.255.255
CIDR:           142.165.0.0/16
NetName:        SASKTEL-B
NetHandle:      NET-142-165-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Saskatchewan Telecommunications (SASK-Z)
RegDate:        1995-03-23
Updated:        2012-04-02
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/142.165.0.0


OrgName:        Saskatchewan Telecommunications
OrgId:          SASK-Z
Address:        c/o Way Toy 8th Flr 2121 Saskatchewan Dr
City:           Regina
StateProv:      SK
PostalCode:     S4P-3Y2
Country:        CA
RegDate:        2008-04-02
Updated:        2017-05-24
Ref:            https://rdap.arin.net/registry/entity/SASK-Z


OrgTechHandle: SA30-ORG-ARIN
OrgTechName:   SaskTel
OrgTechPhone:  +1-306-539-1800 
OrgTechEmail:  sasktel.wanec@sasktel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SA30-ORG-ARIN

OrgAbuseHandle: SASKN-ARIN
OrgAbuseName:   Sasknet Abuse
OrgAbusePhone:  +1-306-761-6076 
OrgAbuseEmail:  abuse@sasktel.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SASKN-ARIN

OrgNOCHandle: NOC178-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-306-777-1458 
OrgNOCEmail:  NetworkAnalyst.BCSC@sasktel.sk.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC178-ARIN

RTechHandle: SA30-ORG-ARIN
RTechName:   SaskTel
RTechPhone:  +1-306-539-1800 
RTechEmail:  sasktel.wanec@sasktel.com
RTechRef:    https://rdap.arin.net/registry/entity/SA30-ORG-ARIN

RAbuseHandle: SASKN-ARIN
RAbuseName:   Sasknet Abuse
RAbusePhone:  +1-306-761-6076 
RAbuseEmail:  abuse@sasktel.net
RAbuseRef:    https://rdap.arin.net/registry/entity/SASKN-ARIN

RNOCHandle: NOC178-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-306-777-1458 
RNOCEmail:  NetworkAnalyst.BCSC@sasktel.sk.ca
RNOCRef:    https://rdap.arin.net/registry/entity/NOC178-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.165.166.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11269
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.165.166.38.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026040400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 04 22:01:45 CST 2026
;; MSG SIZE  rcvd: 107
Host info
38.166.165.142.in-addr.arpa domain name pointer 142-165-166-38.sktn.static.sasknet.sk.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
38.166.165.142.in-addr.arpa	name = 142-165-166-38.sktn.static.sasknet.sk.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.231.138.136 attack
2019-11-04T17:27:47.720635abusebot-3.cloudsearch.cf sshd\[24583\]: Invalid user ubnt from 111.231.138.136 port 56212
2019-11-05 03:12:12
167.250.1.33 attackbotsspam
Unauthorized connection attempt from IP address 167.250.1.33 on Port 445(SMB)
2019-11-05 03:11:59
190.199.185.61 attackbots
Unauthorized connection attempt from IP address 190.199.185.61 on Port 445(SMB)
2019-11-05 02:59:04
41.218.211.127 attack
Unauthorized connection attempt from IP address 41.218.211.127 on Port 445(SMB)
2019-11-05 03:06:20
95.174.30.127 attackbots
Automatic report - XMLRPC Attack
2019-11-05 02:59:52
37.49.230.7 attackspambots
\[2019-11-04 14:11:43\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T14:11:43.835-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146462607521",SessionID="0x7fdf2c172a48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.7/65125",ACLName="no_extension_match"
\[2019-11-04 14:15:48\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T14:15:48.825-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146462607521",SessionID="0x7fdf2c3e3e58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.7/51428",ACLName="no_extension_match"
\[2019-11-04 14:19:50\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-04T14:19:50.031-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="801146462607521",SessionID="0x7fdf2c56f048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.230.7/52230",ACLName="no_extension_
2019-11-05 03:37:36
92.118.37.95 attackspambots
11/04/2019-13:41:48.164043 92.118.37.95 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-05 03:09:17
190.79.251.71 attackspam
Unauthorized connection attempt from IP address 190.79.251.71 on Port 445(SMB)
2019-11-05 03:11:11
198.245.49.37 attackbots
'Fail2Ban'
2019-11-05 03:09:01
202.133.54.228 attack
Unauthorized connection attempt from IP address 202.133.54.228 on Port 445(SMB)
2019-11-05 03:24:53
84.239.11.7 attackspam
Nov  4 16:51:31 lnxded63 sshd[10620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.239.11.7
2019-11-05 03:27:51
128.14.134.170 attackbots
Malicious brute force vulnerability hacking attacks
2019-11-05 03:04:00
190.215.37.50 attack
Unauthorized connection attempt from IP address 190.215.37.50 on Port 445(SMB)
2019-11-05 03:10:48
206.189.142.10 attackbots
5x Failed Password
2019-11-05 03:10:19
80.85.86.175 attackspambots
*Port Scan* detected from 80.85.86.175 (GB/United Kingdom/jscan002.ampereinnotech.com). 11 hits in the last 276 seconds
2019-11-05 03:19:17

Recently Reported IPs

37.10.113.216 122.192.203.159 2606:4700:10::ac43:1154 2606:4700:10::6814:8458
2606:4700:10::6816:4753 2606:4700:10::6814:8759 2606:4700:10::6816:169 2606:4700:10::6814:6473
2606:4700:10::6814:5629 2606:4700:10::6814:4355 60.20.64.113 48.216.243.233
35.233.88.72 72.245.157.10 172.202.118.16 2606:4700:10::6816:147
2606:4700:10::6816:1973 2606:4700:10::6814:5702 110.77.248.55 2606:4700:10::6814:7169