Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western District

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: Hong Kong University of Science and Technology

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.89.223.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40062
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;143.89.223.244.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019050700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue May 07 23:57:51 +08 2019
;; MSG SIZE  rcvd: 118

Host info
244.223.89.143.in-addr.arpa domain name pointer hw39ug175.resnet.ust.hk.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
244.223.89.143.in-addr.arpa	name = hw39ug175.resnet.ust.hk.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
220.123.194.50 attack
2375/tcp 2375/tcp 2375/tcp
[2020-04-27/30]3pkt
2020-05-02 01:29:15
184.181.200.71 attack
May 01 07:45:17 tcp        0      0 r.ca:22            184.181.200.71:3093         SYN_RECV
2020-05-02 02:07:39
58.161.142.55 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 01:54:42
211.143.164.98 attackbotsspam
May 01 07:45:17 tcp        0      0 r.ca:22            211.143.164.98:43863        SYN_RECV
2020-05-02 01:47:40
202.21.127.189 attack
May  1 18:18:58 sigma sshd\[6785\]: Invalid user hts from 202.21.127.189May  1 18:19:01 sigma sshd\[6785\]: Failed password for invalid user hts from 202.21.127.189 port 56248 ssh2
...
2020-05-02 01:30:16
176.75.76.157 attack
May 01 07:35:17 tcp        0      0 r.ca:22            176.75.76.157:32170         SYN_RECV
2020-05-02 02:10:13
119.202.104.190 attackspambots
Unauthorized connection attempt detected from IP address 119.202.104.190 to port 23
2020-05-02 01:32:35
32.233.216.19 attackbots
May 01 07:40:17 tcp        0      0 r.ca:22            32.233.216.19:54294         SYN_RECV
2020-05-02 01:34:58
196.18.127.213 attackbots
2020-05-01T13:47:21.369668+02:00 lumpi kernel: [13623378.013458] INPUT:DROP:SPAMHAUS_DROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=196.18.127.213 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=60 ID=56543 DF PROTO=TCP SPT=19078 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2020-05-02 01:33:52
122.248.111.61 attack
445/tcp
[2020-05-01]1pkt
2020-05-02 02:01:32
162.243.139.166 attack
Port scan(s) denied
2020-05-02 01:43:38
106.54.245.12 attackbots
May  1 19:37:11 vps647732 sshd[13022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.245.12
May  1 19:37:13 vps647732 sshd[13022]: Failed password for invalid user anamaria from 106.54.245.12 port 52748 ssh2
...
2020-05-02 01:44:11
162.243.140.216 attackspam
Port scan(s) denied
2020-05-02 01:34:12
165.227.210.114 attackbots
trying to access non-authorized port
2020-05-02 01:54:05
201.55.224.253 attackbotsspam
May 01 07:30:17 tcp        0      0 r.ca:22            201.55.224.253:50656        SYN_RECV
2020-05-02 01:55:10

Recently Reported IPs

101.86.130.106 85.240.38.241 69.71.203.40 132.4.131.232
5.190.174.166 68.4.239.195 193.22.106.35 78.188.59.87
223.242.203.255 200.57.9.141 188.43.2.61 188.40.173.99
41.36.47.38 163.160.65.116 37.224.38.25 123.245.226.54
156.201.58.38 68.194.62.9 124.158.12.30 199.157.159.212