Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '43.255.80.0 - 43.255.80.255'

% Abuse contact for '43.255.80.0 - 43.255.80.255' is 'support@help.ipxo.com'

inetnum:        43.255.80.0 - 43.255.80.255
netname:        ARISK-COMMUNICATIONS-INC
descr:          Arisk Communications inc
country:        HK
geofeed:        https://ariskisp.com/rfc8805.csv
admin-c:        IIA10-AP
tech-c:         IIA10-AP
abuse-c:        AX210-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-IPXOLIMITED-AP
mnt-irt:        IRT-532424-IPXO
last-modified:  2024-11-05T18:14:18Z
source:         APNIC

irt:            IRT-532424-IPXO
address:        London
e-mail:         support@help.ipxo.com
abuse-mailbox:  support@help.ipxo.com
admin-c:        ILA24-AP
tech-c:         ILA24-AP
auth:           # Filtered
remarks:        support@help.ipxo.com
remarks:        support@help.ipxo.com was validated on 2026-02-11
mnt-by:         MAINT-532424-IPXO
last-modified:  2026-02-11T16:47:46Z
source:         APNIC

role:           ABUSE X532424IPXO
country:        ZZ
address:        London
phone:          +000000000
e-mail:         support@help.ipxo.com
admin-c:        ILA24-AP
tech-c:         ILA24-AP
nic-hdl:        AX210-AP
remarks:        Generated from irt object IRT-532424-IPXO
remarks:        support@help.ipxo.com was validated on 2026-02-11
abuse-mailbox:  support@help.ipxo.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-02-11T16:47:58Z
source:         APNIC

role:           Interscale Inc administrator
address:        Scotia Place, Suite 2020, 10060 Jasper Avenue, Edmonton Alberta T5J 3R8
country:        CA
phone:          +18558881887
fax-no:         +18558881887
e-mail:         netops@interscale.com
e-mail:         support@interscale.com
admin-c:        IIA10-AP
tech-c:         IIA10-AP
nic-hdl:        IIA10-AP
mnt-by:         MAINT-INTERSCALE-AP
last-modified:  2020-11-18T13:22:06Z
source:         APNIC

% Information related to '43.255.80.0/24AS202662'

route:          43.255.80.0/24
origin:         AS202662
descr:          Interscale Inc
                Scotia Place, Suite 2020
                10060 Jasper Avenue
mnt-by:         MAINT-INTERSCALE-AP
last-modified:  2023-04-18T23:20:32Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 43.255.80.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43014
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;43.255.80.144.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050101 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 02:04:23 CST 2026
;; MSG SIZE  rcvd: 106
Host info
Host 144.80.255.43.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 144.80.255.43.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.14.148.102 attackspambots
[portscan] tcp/23 [TELNET]
[scan/connect: 2 time(s)]
*(RWIN=65535)(08041230)
2019-08-05 04:21:54
39.42.171.223 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=8192)(08041230)
2019-08-05 04:43:04
38.113.184.1 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 04:22:28
170.130.187.50 attack
Honeypot attack, port: 81, PTR: PTR record not found
2019-08-05 04:49:58
77.242.108.249 attackbotsspam
[portscan] tcp/23 [TELNET]
*(RWIN=14600)(08041230)
2019-08-05 04:18:49
91.134.185.81 attackspam
[MySQL inject/portscan] tcp/3306
*(RWIN=5840)(08041230)
2019-08-05 04:17:10
93.148.163.172 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=35900)(08041230)
2019-08-05 04:53:12
212.87.172.113 attackspam
445/tcp 445/tcp 445/tcp...
[2019-06-05/08-04]12pkt,1pt.(tcp)
2019-08-05 04:24:21
182.188.43.163 attackbots
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 2 time(s)]
*(RWIN=1024)(08041230)
2019-08-05 04:49:16
103.117.172.181 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
[scan/connect: 3 time(s)]
*(RWIN=8192)(08041230)
2019-08-05 04:14:59
104.244.32.5 attack
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(08041230)
2019-08-05 04:36:14
61.53.15.202 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=13122)(08041230)
2019-08-05 04:41:59
89.122.55.116 attack
" "
2019-08-05 04:17:40
222.222.236.242 attackspambots
[portscan] tcp/1433 [MsSQL]
*(RWIN=8192)(08041230)
2019-08-05 04:45:31
81.17.92.4 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-08-05 04:18:33

Recently Reported IPs

34.207.166.112 139.59.72.137 139.59.72.214 121.8.28.61
110.77.187.89 183.207.48.154 123.207.65.62 157.238.132.1
157.238.132.84 2606:4700:10::6814:6281 185.150.190.176 154.29.156.134
151.240.151.99 2606:4700:10::6816:771 2606:4700:10::6814:9107 110.77.226.202
2606:4700:10::ac43:2276 66.132.172.207 45.45.237.225 192.204.35.183