Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '43.242.200.0 - 43.242.203.255'

% Abuse contact for '43.242.200.0 - 43.242.203.255' is 'abuse@255.hk'

inetnum:        43.242.200.0 - 43.242.203.255
netname:        HJTL-HK
descr:          HK JIUJIUIDC TECHNOLOGY LIMITED
country:        HK
org:            ORG-HJTL1-AP
admin-c:        HJTL1-AP
tech-c:         HJTL1-AP
abuse-c:        AH1118-AP
status:         ALLOCATED PORTABLE
remarks:        --------------------------------------------------------
remarks:        To report network abuse, please contact mnt-irt
remarks:        For troubleshooting, please contact tech-c and admin-c
remarks:        Report invalid contact via www.apnic.net/invalidcontact
remarks:        --------------------------------------------------------
mnt-by:         APNIC-HM
mnt-lower:      MAINT-HJTL-HK
mnt-routes:     MAINT-HJTL-HK
mnt-irt:        IRT-HJTL-HK
last-modified:  2025-08-15T10:02:15Z
source:         APNIC

irt:            IRT-HJTL-HK
address:        15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG, HK
address:
e-mail:         abuse@255.hk
abuse-mailbox:  abuse@255.hk
admin-c:        HJTL1-AP
tech-c:         HJTL1-AP
auth:           # Filtered
remarks:        abuse@255.hk was validated on 2025-04-11
mnt-by:         MAINT-HJTL-HK
last-modified:  2025-09-04T07:06:07Z
source:         APNIC

organisation:   ORG-HJTL1-AP
org-name:       HK JIUJIUIDC TECHNOLOGY LIMITED
org-type:       LIR
country:        HK
address:        15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG
phone:          +852-6859-1002
fax-no:         +852-6859-1121
e-mail:         webhost9237@yahoo.com
mnt-ref:        APNIC-HM
mnt-by:         APNIC-HM
last-modified:  2024-01-08T12:55:10Z
source:         APNIC

role:           ABUSE HJTLHK
country:        ZZ
address:        15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG, HK
address:
phone:          +000000000
e-mail:         abuse@255.hk
admin-c:        HJTL1-AP
tech-c:         HJTL1-AP
nic-hdl:        AH1118-AP
remarks:        Generated from irt object IRT-HJTL-HK
remarks:        abuse@255.hk was validated on 2025-04-11
abuse-mailbox:  abuse@255.hk
mnt-by:         APNIC-ABUSE
last-modified:  2025-04-11T16:31:26Z
source:         APNIC

role:           HK JIUJIUIDC TECHNOLOGY LIMITED administrator
address:        15/F, TRANS ASIA CTR 18 KIN HONG ST, KWAI CHUNG, HK
country:        HK
phone:          +852-68591121
fax-no:         +852-68591121
e-mail:         abuse@255.hk
admin-c:        HJTL1-AP
tech-c:         HJTL1-AP
nic-hdl:        HJTL1-AP
mnt-by:         MAINT-HJTL-HK
last-modified:  2024-04-03T14:44:34Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.242.202.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44773
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.242.202.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092502 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 26 05:07:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 244.202.242.43.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.202.242.43.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.223 attackbots
Jul 28 12:59:28 scw-6657dc sshd[3864]: Failed password for root from 218.92.0.223 port 36701 ssh2
Jul 28 12:59:28 scw-6657dc sshd[3864]: Failed password for root from 218.92.0.223 port 36701 ssh2
Jul 28 12:59:35 scw-6657dc sshd[3864]: Failed password for root from 218.92.0.223 port 36701 ssh2
...
2020-07-28 21:00:35
51.77.41.246 attackspam
$f2bV_matches
2020-07-28 21:06:13
159.89.188.167 attack
Jul 28 12:10:06 *** sshd[3862]: Invalid user zhangyl from 159.89.188.167
2020-07-28 20:58:07
120.132.27.238 attackbotsspam
Jul 28 12:07:24 ws26vmsma01 sshd[219956]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.27.238
Jul 28 12:07:26 ws26vmsma01 sshd[219956]: Failed password for invalid user zliang from 120.132.27.238 port 58462 ssh2
...
2020-07-28 21:07:22
78.85.5.232 attack
Jul 28 14:07:27 santamaria sshd\[10079\]: Invalid user drill from 78.85.5.232
Jul 28 14:07:27 santamaria sshd\[10079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.85.5.232
Jul 28 14:07:30 santamaria sshd\[10079\]: Failed password for invalid user drill from 78.85.5.232 port 22912 ssh2
...
2020-07-28 21:05:22
36.110.217.140 attack
Jul 28 09:36:13 firewall sshd[9237]: Invalid user zhcui from 36.110.217.140
Jul 28 09:36:15 firewall sshd[9237]: Failed password for invalid user zhcui from 36.110.217.140 port 43364 ssh2
Jul 28 09:41:08 firewall sshd[9430]: Invalid user shuqunli from 36.110.217.140
...
2020-07-28 21:23:03
150.136.31.34 attack
Jul 28 15:10:06 vpn01 sshd[880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.136.31.34
Jul 28 15:10:08 vpn01 sshd[880]: Failed password for invalid user zcf from 150.136.31.34 port 45266 ssh2
...
2020-07-28 21:34:19
213.37.100.199 attackspam
Jul 28 14:07:21 jane sshd[29923]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.37.100.199 
Jul 28 14:07:22 jane sshd[29923]: Failed password for invalid user sukai from 213.37.100.199 port 54150 ssh2
...
2020-07-28 21:10:37
31.184.199.114 attack
Tried sshing with brute force.
2020-07-28 21:12:24
61.177.172.41 attackspam
2020-07-28T14:58:47.002193vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2
2020-07-28T14:58:49.781198vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2
2020-07-28T14:58:53.166683vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2
2020-07-28T14:58:56.442196vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2
2020-07-28T14:59:00.128677vps773228.ovh.net sshd[10887]: Failed password for root from 61.177.172.41 port 54134 ssh2
...
2020-07-28 21:09:48
184.168.46.208 attackspambots
LGS,WP GET /newsite/wp-includes/wlwmanifest.xml
2020-07-28 21:28:23
178.128.121.137 attackbots
Jul 28 13:40:02 rocket sshd[10544]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.137
Jul 28 13:40:04 rocket sshd[10544]: Failed password for invalid user gwx from 178.128.121.137 port 35244 ssh2
...
2020-07-28 21:03:46
150.143.244.36 attackbots
Automated report (2020-07-28T05:07:31-07:00). Caught masquerading as Facebook external hit. Caught masquerading as Twitterbot.
2020-07-28 21:03:29
51.83.33.202 attack
Jul 28 06:07:27 Host-KLAX-C sshd[26475]: Disconnected from invalid user wansong 51.83.33.202 port 51696 [preauth]
...
2020-07-28 21:07:37
89.204.139.226 attackbotsspam
Unauthorized IMAP connection attempt
2020-07-28 21:04:58

Recently Reported IPs

136.132.136.136 113.95.134.106 101.133.224.44 98.81.240.68
183.134.59.134 59.82.83.230 59.82.83.108 13.221.72.228
45.248.110.65 45.174.250.2 192.168.50.121 113.141.80.132
150.241.172.167 137.184.17.47 124.221.245.78 2408:8221:5310:6ef0:2578:a507:c8b:8ae
47.100.50.83 123.129.230.94 27.15.252.33 211.158.26.133