Don't use an IP address.
By default Windows will not attempt Kerberos authentication for a host if the hostname is an IP address. It will fall back to other enabled authentication protocols like NTLM. However, applications are sometimes hardcoded to use IP addresses which means the application will fall back to NTLM and not use Kerberos.
Your AD group policy probably restricts NTLM authentication.
There should be some events logged in the Security eventlog on the target server that may provide additional information about the logon failures. (Assuming that your audit policy is set to log failure events.)