Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '150.129.80.0 - 150.129.80.255'

% Abuse contact for '150.129.80.0 - 150.129.80.255' is 'admin@itsidc.com'

inetnum:        150.129.80.0 - 150.129.80.255
netname:        Bunny
descr:          Bunny Communications LLC
country:        HK
admin-c:        CLA17-AP
tech-c:         CLA17-AP
abuse-c:        AR796-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-RAIBOW-HK
mnt-lower:      MAINT-RAIBOW-HK
mnt-routes:     MAINT-RAIBOW-HK
mnt-irt:        IRT-RAIBOW-HK
last-modified:  2025-07-01T10:59:35Z
source:         APNIC

irt:            IRT-RAIBOW-HK
address:        unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
e-mail:         admin@itsidc.com
abuse-mailbox:  admin@itsidc.com
admin-c:        RNLA1-AP
tech-c:         RNLA1-AP
auth:           # Filtered
remarks:        admin@itsidc.com was validated on 2026-01-13
mnt-by:         MAINT-RAIBOW-HK
last-modified:  2026-01-13T13:47:55Z
source:         APNIC

role:           ABUSE RAIBOWHK
country:        ZZ
address:        unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
phone:          +000000000
e-mail:         admin@itsidc.com
admin-c:        RNLA1-AP
tech-c:         RNLA1-AP
nic-hdl:        AR796-AP
remarks:        Generated from irt object IRT-RAIBOW-HK
remarks:        admin@itsidc.com was validated on 2026-01-13
abuse-mailbox:  admin@itsidc.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-13T13:48:24Z
source:         APNIC

role:           Cloudie Limited administrator
address:        Unit 1604, Perfect Industrial Building,, 31st Tai Yau Street, San Po Kong Kowloon NA
country:        HK
phone:          +852-61725306
fax-no:         +852-61725306
e-mail:         admin@cloudie.hk
admin-c:        CLA17-AP
tech-c:         CLA17-AP
nic-hdl:        CLA17-AP
mnt-by:         MAINT-CLOUDIE-HK
last-modified:  2019-04-03T05:09:03Z
abuse-mailbox:  abuse@cloudie.hk
abuse-mailbox:  abuse@cloudie.hk
source:         APNIC

% Information related to '150.129.80.0/24AS5065'

route:          150.129.80.0/24
origin:         AS5065
descr:          Rainbow network limited
                unit 708 level 7 dragon center
                37k yen chow street sham shui po kln
mnt-by:         MAINT-RAIBOW-HK
last-modified:  2025-06-09T23:12:43Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.129.80.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.129.80.177.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 10:31:49 CST 2026
;; MSG SIZE  rcvd: 107
Host info
177.80.129.150.in-addr.arpa domain name pointer unknown.itsidc.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
177.80.129.150.in-addr.arpa	name = unknown.itsidc.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.227.254.30 attackspambots
Port 443 (HTTPS) access denied
2020-04-23 13:13:54
13.76.231.88 attackspambots
k+ssh-bruteforce
2020-04-23 13:40:16
118.24.89.243 attack
Apr 23 06:42:06 * sshd[20874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.89.243
Apr 23 06:42:08 * sshd[20874]: Failed password for invalid user pl from 118.24.89.243 port 37142 ssh2
2020-04-23 13:56:31
49.234.27.90 attack
Invalid user git from 49.234.27.90 port 49054
2020-04-23 13:53:02
203.245.41.96 attackspambots
Invalid user ix from 203.245.41.96 port 47956
2020-04-23 13:19:57
200.6.188.38 attack
Apr 22 19:01:02 tdfoods sshd\[12302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.188.38  user=root
Apr 22 19:01:04 tdfoods sshd\[12302\]: Failed password for root from 200.6.188.38 port 58762 ssh2
Apr 22 19:05:39 tdfoods sshd\[12620\]: Invalid user postgres from 200.6.188.38
Apr 22 19:05:39 tdfoods sshd\[12620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.188.38
Apr 22 19:05:41 tdfoods sshd\[12620\]: Failed password for invalid user postgres from 200.6.188.38 port 44534 ssh2
2020-04-23 13:55:14
106.13.41.25 attackbotsspam
failed root login
2020-04-23 13:27:44
37.156.146.132 attackbots
MD_ASIATECH-MNT_<177>1587614062 [1:2403332:56896] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 17 [Classification: Misc Attack] [Priority: 2]:  {TCP} 37.156.146.132:45091
2020-04-23 13:50:26
159.65.137.122 attackbots
Invalid user test from 159.65.137.122 port 53806
2020-04-23 13:49:54
87.117.178.105 attack
Apr 22 18:34:15 php1 sshd\[17011\]: Invalid user admin from 87.117.178.105
Apr 22 18:34:15 php1 sshd\[17011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.117.178.105
Apr 22 18:34:17 php1 sshd\[17011\]: Failed password for invalid user admin from 87.117.178.105 port 47326 ssh2
Apr 22 18:38:18 php1 sshd\[17368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.117.178.105  user=postfix
Apr 22 18:38:20 php1 sshd\[17368\]: Failed password for postfix from 87.117.178.105 port 60504 ssh2
2020-04-23 13:15:59
118.174.176.225 attackbots
trying to access non-authorized port
2020-04-23 13:44:30
175.6.67.24 attack
Invalid user test from 175.6.67.24 port 36338
2020-04-23 13:12:58
51.89.166.45 attack
5x Failed Password
2020-04-23 13:52:36
134.209.41.198 attackspambots
*Port Scan* detected from 134.209.41.198 (US/United States/California/Bakersfield/-). 4 hits in the last 175 seconds
2020-04-23 13:57:07
222.186.42.7 attackbots
Apr 23 07:40:08 santamaria sshd\[24302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Apr 23 07:40:10 santamaria sshd\[24302\]: Failed password for root from 222.186.42.7 port 61576 ssh2
Apr 23 07:40:16 santamaria sshd\[24304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
...
2020-04-23 13:41:08

Recently Reported IPs

43.153.71.227 32.240.74.67 216.254.140.132 185.242.3.236
193.176.31.156 2606:4700:10::6814:8527 2606:4700:10::6814:4683 2606:4700:10::ac43:2352
122.192.203.61 2606:4700:10::6814:9990 2606:4700:10::6816:1609 2606:4700:10::6814:6868
2606:4700:10::6816:1870 2606:4700:10::6814:6555 2606:4700:10::6814:5058 109.167.82.87
13.168.155.42 113.215.189.231 131.73.227.187 136.182.2.70