Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Swift Current

Region: Saskatchewan

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



# start

NetRange:       142.165.0.0 - 142.165.255.255
CIDR:           142.165.0.0/16
NetName:        SASKTEL-B
NetHandle:      NET-142-165-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Saskatchewan Telecommunications (SASK-Z)
RegDate:        1995-03-23
Updated:        2012-04-02
Comment:        ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref:            https://rdap.arin.net/registry/ip/142.165.0.0



OrgName:        Saskatchewan Telecommunications
OrgId:          SASK-Z
Address:        c/o Way Toy 8th Flr 2121 Saskatchewan Dr
City:           Regina
StateProv:      SK
PostalCode:     S4P-3Y2
Country:        CA
RegDate:        2008-04-02
Updated:        2026-04-20
Ref:            https://rdap.arin.net/registry/entity/SASK-Z


OrgTechHandle: SA30-ORG-ARIN
OrgTechName:   SaskTel
OrgTechPhone:  +1-306-539-1800 
OrgTechEmail:  sasktel.wanec@sasktel.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SA30-ORG-ARIN

OrgAbuseHandle: SASKN-ARIN
OrgAbuseName:   Sasknet Abuse
OrgAbusePhone:  +1-306-761-6076 
OrgAbuseEmail:  abuse@sasktel.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SASKN-ARIN

OrgNOCHandle: NOC178-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-306-777-1458 
OrgNOCEmail:  NetworkAnalyst.BCSC@sasktel.sk.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC178-ARIN

RTechHandle: SA30-ORG-ARIN
RTechName:   SaskTel
RTechPhone:  +1-306-539-1800 
RTechEmail:  sasktel.wanec@sasktel.com
RTechRef:    https://rdap.arin.net/registry/entity/SA30-ORG-ARIN

RAbuseHandle: SASKN-ARIN
RAbuseName:   Sasknet Abuse
RAbusePhone:  +1-306-761-6076 
RAbuseEmail:  abuse@sasktel.net
RAbuseRef:    https://rdap.arin.net/registry/entity/SASKN-ARIN

RNOCHandle: NOC178-ARIN
RNOCName:   Network Operations Center
RNOCPhone:  +1-306-777-1458 
RNOCEmail:  NetworkAnalyst.BCSC@sasktel.sk.ca
RNOCRef:    https://rdap.arin.net/registry/entity/NOC178-ARIN

# end


# start

NetRange:       142.165.65.0 - 142.165.65.255
CIDR:           142.165.65.0/24
NetName:        WANEC-093
NetHandle:      NET-142-165-65-0-1
Parent:         SASKTEL-B (NET-142-165-0-0-1)
NetType:        Reassigned
OriginAS:       
Organization:   SaskTel Wide Area Network Engineering Center (SWANEC)
RegDate:        2019-04-02
Updated:        2019-04-02
Comment:        YKTN HSDB
Ref:            https://rdap.arin.net/registry/ip/142.165.65.0


OrgName:        SaskTel Wide Area Network Engineering Center
OrgId:          SWANEC
Address:        2121 Sask. Dr F9
City:           Regina
StateProv:      SK
PostalCode:     S4P-3Y2
Country:        CA
RegDate:        2001-07-11
Updated:        2003-07-08
Ref:            https://rdap.arin.net/registry/entity/SWANEC


OrgNOCHandle: NOC178-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-306-777-1458 
OrgNOCEmail:  NetworkAnalyst.BCSC@sasktel.sk.ca
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC178-ARIN

OrgAbuseHandle: SASKN-ARIN
OrgAbuseName:   Sasknet Abuse
OrgAbusePhone:  +1-306-761-6076 
OrgAbuseEmail:  abuse@sasktel.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/SASKN-ARIN

OrgTechHandle: WANEC-ARIN
OrgTechName:   WIDE AREA NETWORK ENGINEERING CENTER
OrgTechPhone:  +1-306-777-3238 
OrgTechEmail:  wanec@sasktel.sk.ca
OrgTechRef:    https://rdap.arin.net/registry/entity/WANEC-ARIN

# end



#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.165.65.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.165.65.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051300 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 13 23:39:53 CST 2026
;; MSG SIZE  rcvd: 106
Host info
48.65.165.142.in-addr.arpa domain name pointer 142-165-65-48.swcr.hsdb.sasknet.sk.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.65.165.142.in-addr.arpa	name = 142-165-65-48.swcr.hsdb.sasknet.sk.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.74.144.223 attackspam
Jul 31 23:49:46 bouncer sshd\[21932\]: Invalid user sanga from 93.74.144.223 port 40954
Jul 31 23:49:46 bouncer sshd\[21932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.74.144.223 
Jul 31 23:49:49 bouncer sshd\[21932\]: Failed password for invalid user sanga from 93.74.144.223 port 40954 ssh2
...
2019-08-01 11:26:41
179.108.245.122 attack
Unauthorized connection attempt from IP address 179.108.245.122 on Port 587(SMTP-MSA)
2019-08-01 11:22:29
139.59.95.216 attack
Aug  1 03:50:51 v22019058497090703 sshd[24207]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
Aug  1 03:50:53 v22019058497090703 sshd[24207]: Failed password for invalid user sabrina from 139.59.95.216 port 50340 ssh2
Aug  1 03:55:52 v22019058497090703 sshd[24536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.95.216
...
2019-08-01 11:33:52
43.226.38.26 attackspam
Aug  1 05:29:05 vps691689 sshd[1523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.38.26
Aug  1 05:29:07 vps691689 sshd[1523]: Failed password for invalid user git from 43.226.38.26 port 37042 ssh2
...
2019-08-01 11:44:00
125.167.82.102 attack
Unauthorized connection attempt from IP address 125.167.82.102 on Port 445(SMB)
2019-08-01 11:50:08
223.238.93.213 attack
Unauthorized connection attempt from IP address 223.238.93.213 on Port 445(SMB)
2019-08-01 11:17:47
183.131.82.99 attackbots
SSH Brute Force, server-1 sshd[31912]: Failed password for root from 183.131.82.99 port 39269 ssh2
2019-08-01 11:15:33
84.201.134.56 attack
Jul 28 04:42:06 server sshd\[52291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.134.56  user=root
Jul 28 04:42:08 server sshd\[52291\]: Failed password for root from 84.201.134.56 port 44238 ssh2
Jul 28 04:46:40 server sshd\[52429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.201.134.56  user=root
...
2019-08-01 11:03:41
131.100.76.133 attackbots
Brute force attempt
2019-08-01 11:48:20
159.203.13.4 attack
Aug  1 04:33:43 vpn01 sshd\[10055\]: Invalid user jamal from 159.203.13.4
Aug  1 04:33:43 vpn01 sshd\[10055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.13.4
Aug  1 04:33:44 vpn01 sshd\[10055\]: Failed password for invalid user jamal from 159.203.13.4 port 52528 ssh2
2019-08-01 11:05:43
119.29.52.46 attack
Jul  9 15:49:33 server sshd\[197558\]: Invalid user sophia from 119.29.52.46
Jul  9 15:49:33 server sshd\[197558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.52.46
Jul  9 15:49:35 server sshd\[197558\]: Failed password for invalid user sophia from 119.29.52.46 port 41468 ssh2
...
2019-08-01 11:12:55
190.205.122.242 attack
Unauthorized connection attempt from IP address 190.205.122.242 on Port 445(SMB)
2019-08-01 11:25:31
104.140.188.58 attackbotsspam
01.08.2019 01:34:33 Connection to port 3389 blocked by firewall
2019-08-01 11:23:03
201.0.84.191 attackspam
Unauthorized connection attempt from IP address 201.0.84.191 on Port 445(SMB)
2019-08-01 11:15:14
49.148.136.241 attackspambots
Unauthorized connection attempt from IP address 49.148.136.241 on Port 445(SMB)
2019-08-01 11:38:14

Recently Reported IPs

182.187.88.177 212.73.148.41 43.128.73.132 39.98.88.157
58.71.239.99 39.173.105.161 122.193.247.161 5.226.140.10
31.14.254.42 185.216.145.172 139.135.60.0 182.126.121.49
2606:4700:10::6814:4948 2606:4700:10::6816:2595 89.139.160.67 54.234.13.110
2606:4700:10::6816:1992 132.199.208.189 68.167.147.170 43.134.71.232