Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 255.12.243.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;255.12.243.48.			IN	A

;; AUTHORITY SECTION:
.			224	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 19:03:28 CST 2021
;; MSG SIZE  rcvd: 106
Host info
Host 48.243.12.255.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.243.12.255.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.144.64.149 attackbotsspam
[2019-06-22 00:25:10] NOTICE[4006] chan_sip.c: Registration from '"14235" ' failed for '162.144.64.149:5117' - Wrong password
[2019-06-22 00:25:10] SECURITY[4013] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-22T00:25:10.333-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="14235",SessionID="0x7fd8040027a0",LocalAddress="IPV4/UDP/142.93.153.17/5060",RemoteAddress="IPV4/UDP/162.144.64.149/5117",Challenge="614f5b3f",ReceivedChallenge="614f5b3f",ReceivedHash="4f43eac99765e32d2772b2e22bea17a6"
[2019-06-22 00:25:10] NOTICE[4006] chan_sip.c: Registration from '"14235" ' failed for '162.144.64.149:5117' - Wrong password
[2019-06-22 00:25:10] SECURITY[4013] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-06-22T00:25:10.533-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="14235",SessionID="0x7fd804052160",LocalAddress="IPV4/UDP/142.93.153.17/5060",RemoteAddress="IPV4/UDP/162.144.64.149/5117",Challe
2019-06-22 18:39:52
116.111.116.80 attackspambots
Automatic report - SSH Brute-Force Attack
2019-06-22 18:22:53
191.53.105.135 attackspambots
SMTP-sasl brute force
...
2019-06-22 18:39:15
194.28.115.244 attackbots
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-06-22 18:51:59
139.215.228.87 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 18:38:25
107.170.203.244 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-22 18:45:52
80.82.77.33 attack
ZTE Router Exploit Scanner
2019-06-22 18:27:12
218.92.0.207 attackbotsspam
Jun 22 11:34:45 MK-Soft-Root2 sshd\[18340\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.207  user=root
Jun 22 11:34:48 MK-Soft-Root2 sshd\[18340\]: Failed password for root from 218.92.0.207 port 41996 ssh2
Jun 22 11:34:50 MK-Soft-Root2 sshd\[18340\]: Failed password for root from 218.92.0.207 port 41996 ssh2
...
2019-06-22 18:23:53
203.109.106.156 attackbots
LGS,WP GET /wp-login.php
2019-06-22 18:29:19
142.93.241.93 attackspam
$f2bV_matches
2019-06-22 18:52:53
45.82.153.2 attack
Jun 22 11:57:53 h2177944 kernel: \[2541459.207426\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=55969 PROTO=TCP SPT=51416 DPT=2506 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:02:14 h2177944 kernel: \[2541719.442763\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=22230 PROTO=TCP SPT=51416 DPT=3342 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:05:26 h2177944 kernel: \[2541912.093943\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=987 PROTO=TCP SPT=51416 DPT=3368 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:10:24 h2177944 kernel: \[2542209.856953\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=52719 PROTO=TCP SPT=51416 DPT=3247 WINDOW=1024 RES=0x00 SYN URGP=0 
Jun 22 12:11:13 h2177944 kernel: \[2542258.968597\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.82.153.2 DST=85.214.117.9 LEN=40 TOS=
2019-06-22 18:22:11
118.24.89.243 attack
$f2bV_matches
2019-06-22 18:38:57
78.46.61.245 attack
20 attempts against mh-misbehave-ban on pluto.magehost.pro
2019-06-22 18:28:19
139.180.213.200 attack
NAME : CHOOPALLC-AP CIDR : 139.180.192.0/19 | STATUS : 200 ROBOT {Looking for resource vulnerabilities} DDoS Attack United States - block certain countries :) IP: 139.180.213.200  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-06-22 18:45:22
91.61.38.231 attackspambots
SSH login attempts brute force.
2019-06-22 18:34:44

Recently Reported IPs

69.103.55.252 42.155.82.118 240.67.252.67 183.80.88.60
252.184.10.101 216.84.192.53 164.139.211.202 165.129.101.40
232.195.6.185 92.137.45.64 72.16.75.116 18.250.207.141
219.229.13.80 127.70.240.108 161.229.51.161 90.136.139.253
163.12.152.44 237.164.189.130 136.25.139.177 123.119.49.241