Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#


NetRange:       128.135.0.0 - 128.135.255.255
CIDR:           128.135.0.0/16
NetName:        U-CHICAGO
NetHandle:      NET-128-135-0-0-1
Parent:         NET128 (NET-128-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   The University of Chicago (UNIVER-174-Z)
RegDate:        1986-07-08
Updated:        2023-12-05
Ref:            https://rdap.arin.net/registry/ip/128.135.0.0


OrgName:        The University of Chicago
OrgId:          UNIVER-174-Z
Address:        1155 E. 60th Street
City:           Chicago
StateProv:      IL
PostalCode:     60637
Country:        US
RegDate:        2023-02-27
Updated:        2023-04-19
Ref:            https://rdap.arin.net/registry/entity/UNIVER-174-Z


OrgAbuseHandle: NSC26-ARIN
OrgAbuseName:   Network Security Center
OrgAbusePhone:  +1-773-702-2378 
OrgAbuseEmail:  security@uchicago.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NSC26-ARIN

OrgTechHandle: DOMAI99-ARIN
OrgTechName:   Domain Administrator
OrgTechPhone:  +1-773-702-7626 
OrgTechEmail:  domainadmin@uchicago.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/DOMAI99-ARIN

OrgNOCHandle: DNO22-ARIN
OrgNOCName:   Data Network Operations
OrgNOCPhone:  +1-773-702-7626 
OrgNOCEmail:  noc@uchicago.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/DNO22-ARIN

RTechHandle: DOMAI99-ARIN
RTechName:   Domain Administrator
RTechPhone:  +1-773-702-7626 
RTechEmail:  domainadmin@uchicago.edu
RTechRef:    https://rdap.arin.net/registry/entity/DOMAI99-ARIN

RAbuseHandle: NSC26-ARIN
RAbuseName:   Network Security Center
RAbusePhone:  +1-773-702-2378 
RAbuseEmail:  security@uchicago.edu
RAbuseRef:    https://rdap.arin.net/registry/entity/NSC26-ARIN

RNOCHandle: DNO22-ARIN
RNOCName:   Data Network Operations
RNOCPhone:  +1-773-702-7626 
RNOCEmail:  noc@uchicago.edu
RNOCRef:    https://rdap.arin.net/registry/entity/DNO22-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2025, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.135.254.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58929
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.135.254.159.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025100100 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Oct 01 20:50:45 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 159.254.135.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 159.254.135.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
203.110.179.26 attackspambots
SSH-BruteForce
2019-11-27 08:50:49
181.41.216.141 attack
Blocked 181.41.216.141 For sending Not Local count 99
2019-11-27 09:05:39
108.61.201.199 attackbotsspam
RDP Bruteforce
2019-11-27 08:53:47
47.56.69.78 attack
3389BruteforceFW23
2019-11-27 08:52:15
115.165.166.193 attack
Nov 26 20:17:50 TORMINT sshd\[11207\]: Invalid user super from 115.165.166.193
Nov 26 20:17:50 TORMINT sshd\[11207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.165.166.193
Nov 26 20:17:52 TORMINT sshd\[11207\]: Failed password for invalid user super from 115.165.166.193 port 41072 ssh2
...
2019-11-27 09:19:26
106.13.183.19 attackbots
Nov 27 00:49:52 sso sshd[28382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.183.19
Nov 27 00:49:54 sso sshd[28382]: Failed password for invalid user cokeeshia from 106.13.183.19 port 35844 ssh2
...
2019-11-27 09:05:59
182.190.4.84 attack
Autoban   182.190.4.84 ABORTED AUTH
2019-11-27 08:48:55
62.234.119.16 attackspam
Automatic report - SSH Brute-Force Attack
2019-11-27 09:07:15
188.166.8.178 attackbots
Nov 27 01:28:42 OPSO sshd\[20986\]: Invalid user jasmin from 188.166.8.178 port 59642
Nov 27 01:28:42 OPSO sshd\[20986\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.8.178
Nov 27 01:28:44 OPSO sshd\[20986\]: Failed password for invalid user jasmin from 188.166.8.178 port 59642 ssh2
Nov 27 01:34:33 OPSO sshd\[22400\]: Invalid user chu from 188.166.8.178 port 38884
Nov 27 01:34:33 OPSO sshd\[22400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.8.178
2019-11-27 08:48:15
218.92.0.137 attackspam
Nov 27 01:56:54 eventyay sshd[1454]: Failed password for root from 218.92.0.137 port 27661 ssh2
Nov 27 01:57:06 eventyay sshd[1454]: error: maximum authentication attempts exceeded for root from 218.92.0.137 port 27661 ssh2 [preauth]
Nov 27 01:57:11 eventyay sshd[1456]: Failed password for root from 218.92.0.137 port 58109 ssh2
...
2019-11-27 09:08:00
54.37.159.50 attackspambots
Nov 27 00:59:09 SilenceServices sshd[21568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.159.50
Nov 27 00:59:11 SilenceServices sshd[21568]: Failed password for invalid user rpm from 54.37.159.50 port 59268 ssh2
Nov 27 01:05:13 SilenceServices sshd[23245]: Failed password for root from 54.37.159.50 port 39542 ssh2
2019-11-27 09:11:36
218.92.0.188 attackspam
Nov 27 03:49:36 server sshd\[13827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.188  user=root
Nov 27 03:49:39 server sshd\[13827\]: Failed password for root from 218.92.0.188 port 63489 ssh2
Nov 27 03:49:42 server sshd\[13827\]: Failed password for root from 218.92.0.188 port 63489 ssh2
Nov 27 03:49:45 server sshd\[13827\]: Failed password for root from 218.92.0.188 port 63489 ssh2
Nov 27 03:49:49 server sshd\[13827\]: Failed password for root from 218.92.0.188 port 63489 ssh2
...
2019-11-27 08:53:04
185.176.27.254 attack
11/26/2019-19:55:50.452870 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-27 09:05:01
103.224.185.16 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-27 09:21:56
92.118.38.38 attackspambots
Nov 27 01:46:33 webserver postfix/smtpd\[8330\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 01:47:11 webserver postfix/smtpd\[8330\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 01:47:49 webserver postfix/smtpd\[8330\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 01:48:27 webserver postfix/smtpd\[10099\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 27 01:49:04 webserver postfix/smtpd\[8330\]: warning: unknown\[92.118.38.38\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-27 08:57:17

Recently Reported IPs

12.113.139.226 26.147.10.223 248.164.44.254 134.209.218.225
20.168.12.53 38.54.82.254 210.87.110.41 77.232.164.8
172.104.31.93 58.37.181.129 113.215.188.230 27.12.28.154
79.115.41.185 38.243.159.243 199.26.100.104 54.159.201.209
3.82.200.134 161.35.60.115 20.65.192.101 49.213.146.6