Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oklahoma City

Region: Oklahoma

Country: United States

Internet Service Provider: Softcom Internet Communications, Inc

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       98.160.0.0 - 98.191.255.255
CIDR:           98.160.0.0/11
NetName:        CXA
NetHandle:      NET-98-160-0-0-1
Parent:         NET98 (NET-98-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Cox Communications Inc. (CXA)
RegDate:        2007-07-20
Updated:        2012-03-02
Ref:            https://rdap.arin.net/registry/ip/98.160.0.0



OrgName:        Cox Communications Inc.
OrgId:          CXA
Address:        1400 Lake Hearn Dr.
City:           Atlanta
StateProv:      GA
PostalCode:     30319
Country:        US
RegDate:        
Updated:        2025-02-06
Comment:        For legal requests/assistance please use the
Comment:        following contact information:
Comment:        Cox Subpoena Info: https://www.cox.com/aboutus/policies/law-enforcement-and-subpoenas-information.html
Ref:            https://rdap.arin.net/registry/entity/CXA


OrgAbuseHandle: IC146-ARIN
OrgAbuseName:   Cox Communications Inc
OrgAbusePhone:  +1-866-272-5111 
OrgAbuseEmail:  abuse@cox.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/IC146-ARIN

OrgRoutingHandle: GARCI1592-ARIN
OrgRoutingName:   Garcia, Jacob 
OrgRoutingPhone:  +1-404-269-4416 
OrgRoutingEmail:  jacob.garcia@cox.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/GARCI1592-ARIN

OrgTechHandle: MEROL3-ARIN
OrgTechName:   Merola, Cari 
OrgTechPhone:  +1-404-269-4416 
OrgTechEmail:  cari.merola@cox.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MEROL3-ARIN

OrgTechHandle: TECH1516-ARIN
OrgTechName:   Tech
OrgTechPhone:  +1-404-269-4416 
OrgTechEmail:  NOCEngineer@cox.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECH1516-ARIN

OrgTechHandle: BERUB3-ARIN
OrgTechName:   Berube, Tori 
OrgTechPhone:  +1-404-269-4416 
OrgTechEmail:  tori.berube@cox.com
OrgTechRef:    https://rdap.arin.net/registry/entity/BERUB3-ARIN

OrgTechHandle: GARCI1592-ARIN
OrgTechName:   Garcia, Jacob 
OrgTechPhone:  +1-404-269-4416 
OrgTechEmail:  jacob.garcia@cox.com
OrgTechRef:    https://rdap.arin.net/registry/entity/GARCI1592-ARIN

OrgTechHandle: DMALL1-ARIN
OrgTechName:   DMALLA
OrgTechPhone:  +1-602-694-4429 
OrgTechEmail:  deependra.malla@cox.com
OrgTechRef:    https://rdap.arin.net/registry/entity/DMALL1-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.185.3.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25662
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;98.185.3.135.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041603 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 17 06:26:01 CST 2026
;; MSG SIZE  rcvd: 105
Host info
135.3.185.98.in-addr.arpa domain name pointer wsip-98-185-3-135.ks.ks.cox.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.3.185.98.in-addr.arpa	name = wsip-98-185-3-135.ks.ks.cox.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.83.73.127 attack
Jul 10 15:08:03 vm1 sshd[6931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.73.127
Jul 10 15:08:05 vm1 sshd[6931]: Failed password for invalid user buri from 51.83.73.127 port 37546 ssh2
...
2020-07-10 21:14:41
222.186.173.154 attack
2020-07-10T16:03:47.927334lavrinenko.info sshd[24875]: Failed password for root from 222.186.173.154 port 65124 ssh2
2020-07-10T16:03:52.647302lavrinenko.info sshd[24875]: Failed password for root from 222.186.173.154 port 65124 ssh2
2020-07-10T16:03:57.055618lavrinenko.info sshd[24875]: Failed password for root from 222.186.173.154 port 65124 ssh2
2020-07-10T16:04:00.837884lavrinenko.info sshd[24875]: Failed password for root from 222.186.173.154 port 65124 ssh2
2020-07-10T16:04:03.617216lavrinenko.info sshd[24875]: Failed password for root from 222.186.173.154 port 65124 ssh2
...
2020-07-10 21:12:43
92.249.12.234 attackspam
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:47:23
45.152.116.36 attackspambots
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:50:46
106.13.167.3 attackbots
$f2bV_matches
2020-07-10 20:40:14
45.132.129.177 attackbots
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:55:40
45.129.79.50 attackbotsspam
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 21:01:04
185.153.196.230 attackbots
Jul 10 09:24:42 www sshd\[15870\]: Invalid user 0 from 185.153.196.230
Jul 10 09:24:49 www sshd\[15872\]: Invalid user 22 from 185.153.196.230
...
2020-07-10 21:26:27
45.146.168.81 attack
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:52:25
222.186.180.147 attackbotsspam
Jul 10 15:10:48 minden010 sshd[27613]: Failed password for root from 222.186.180.147 port 30570 ssh2
Jul 10 15:10:52 minden010 sshd[27613]: Failed password for root from 222.186.180.147 port 30570 ssh2
Jul 10 15:11:01 minden010 sshd[27613]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 30570 ssh2 [preauth]
...
2020-07-10 21:18:33
112.85.42.174 attack
2020-07-10T16:05:59.214971afi-git.jinr.ru sshd[10305]: Failed password for root from 112.85.42.174 port 53954 ssh2
2020-07-10T16:06:02.563980afi-git.jinr.ru sshd[10305]: Failed password for root from 112.85.42.174 port 53954 ssh2
2020-07-10T16:06:05.671254afi-git.jinr.ru sshd[10305]: Failed password for root from 112.85.42.174 port 53954 ssh2
2020-07-10T16:06:05.671391afi-git.jinr.ru sshd[10305]: error: maximum authentication attempts exceeded for root from 112.85.42.174 port 53954 ssh2 [preauth]
2020-07-10T16:06:05.671406afi-git.jinr.ru sshd[10305]: Disconnecting: Too many authentication failures [preauth]
...
2020-07-10 21:10:51
31.163.175.1 attack
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-07-10 21:16:59
218.92.0.249 attackbotsspam
Jul 10 15:15:57 server sshd[24310]: Failed none for root from 218.92.0.249 port 26638 ssh2
Jul 10 15:15:59 server sshd[24310]: Failed password for root from 218.92.0.249 port 26638 ssh2
Jul 10 15:16:03 server sshd[24310]: Failed password for root from 218.92.0.249 port 26638 ssh2
2020-07-10 21:25:27
202.62.224.61 attackspam
Jul 10 15:06:36 srv-ubuntu-dev3 sshd[77199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61  user=mail
Jul 10 15:06:38 srv-ubuntu-dev3 sshd[77199]: Failed password for mail from 202.62.224.61 port 42992 ssh2
Jul 10 15:10:26 srv-ubuntu-dev3 sshd[77808]: Invalid user office from 202.62.224.61
Jul 10 15:10:26 srv-ubuntu-dev3 sshd[77808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61
Jul 10 15:10:26 srv-ubuntu-dev3 sshd[77808]: Invalid user office from 202.62.224.61
Jul 10 15:10:28 srv-ubuntu-dev3 sshd[77808]: Failed password for invalid user office from 202.62.224.61 port 55444 ssh2
Jul 10 15:14:25 srv-ubuntu-dev3 sshd[78410]: Invalid user dust from 202.62.224.61
Jul 10 15:14:25 srv-ubuntu-dev3 sshd[78410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.62.224.61
Jul 10 15:14:25 srv-ubuntu-dev3 sshd[78410]: Invalid user dust from 202.6
...
2020-07-10 21:18:53
92.249.12.115 attackspam
DDOS - one of 48 separate Russian addresses (plus one Lithuanian) IP addresses used to attack our website by repeatedly attempting to download the same, large file. All requests had the same signature, RestSharp/106.11.4.0
2020-07-10 20:48:48

Recently Reported IPs

2606:4700:10::6814:7116 2606:4700:10::6816:1878 2606:4700:10::ac43:2490 122.193.247.146
2606:4700:10::6814:9596 2606:4700:10::6816:4897 2606:4700:10::6814:7777 2606:4700:10::6816:3707
2606:4700:10::ac43:736 2606:4700:10::6814:7906 14.207.194.14 2408:8220:2611:d850:ad6a:4d5d:3751:7242
220.161.46.148 222.142.105.130 116.42.96.32 2606:4700:10::6814:5658
122.193.247.76 2606:4700:10::ac43:2136 2606:4700:10::6814:5661 2606:4700:10::ac43:1905