City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '150.129.80.0 - 150.129.80.255'
% Abuse contact for '150.129.80.0 - 150.129.80.255' is 'admin@itsidc.com'
inetnum: 150.129.80.0 - 150.129.80.255
netname: Bunny
descr: Bunny Communications LLC
country: HK
admin-c: CLA17-AP
tech-c: CLA17-AP
abuse-c: AR796-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-RAIBOW-HK
mnt-lower: MAINT-RAIBOW-HK
mnt-routes: MAINT-RAIBOW-HK
mnt-irt: IRT-RAIBOW-HK
last-modified: 2025-07-01T10:59:35Z
source: APNIC
irt: IRT-RAIBOW-HK
address: unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
e-mail: admin@itsidc.com
abuse-mailbox: admin@itsidc.com
admin-c: RNLA1-AP
tech-c: RNLA1-AP
auth: # Filtered
remarks: admin@itsidc.com was validated on 2026-01-13
mnt-by: MAINT-RAIBOW-HK
last-modified: 2026-01-13T13:47:55Z
source: APNIC
role: ABUSE RAIBOWHK
country: ZZ
address: unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
phone: +000000000
e-mail: admin@itsidc.com
admin-c: RNLA1-AP
tech-c: RNLA1-AP
nic-hdl: AR796-AP
remarks: Generated from irt object IRT-RAIBOW-HK
remarks: admin@itsidc.com was validated on 2026-01-13
abuse-mailbox: admin@itsidc.com
mnt-by: APNIC-ABUSE
last-modified: 2026-01-13T13:48:24Z
source: APNIC
role: Cloudie Limited administrator
address: Unit 1604, Perfect Industrial Building,, 31st Tai Yau Street, San Po Kong Kowloon NA
country: HK
phone: +852-61725306
fax-no: +852-61725306
e-mail: admin@cloudie.hk
admin-c: CLA17-AP
tech-c: CLA17-AP
nic-hdl: CLA17-AP
mnt-by: MAINT-CLOUDIE-HK
last-modified: 2019-04-03T05:09:03Z
abuse-mailbox: abuse@cloudie.hk
abuse-mailbox: abuse@cloudie.hk
source: APNIC
% Information related to '150.129.80.0/24AS5065'
route: 150.129.80.0/24
origin: AS5065
descr: Rainbow network limited
unit 708 level 7 dragon center
37k yen chow street sham shui po kln
mnt-by: MAINT-RAIBOW-HK
last-modified: 2025-06-09T23:12:43Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.129.80.177
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12339
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.129.80.177. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026041101 1800 900 604800 86400
;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 12 10:31:49 CST 2026
;; MSG SIZE rcvd: 107
177.80.129.150.in-addr.arpa domain name pointer unknown.itsidc.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
177.80.129.150.in-addr.arpa name = unknown.itsidc.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 45.227.254.30 | attackspambots | Port 443 (HTTPS) access denied |
2020-04-23 13:13:54 |
| 13.76.231.88 | attackspambots | k+ssh-bruteforce |
2020-04-23 13:40:16 |
| 118.24.89.243 | attack | Apr 23 06:42:06 * sshd[20874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.89.243 Apr 23 06:42:08 * sshd[20874]: Failed password for invalid user pl from 118.24.89.243 port 37142 ssh2 |
2020-04-23 13:56:31 |
| 49.234.27.90 | attack | Invalid user git from 49.234.27.90 port 49054 |
2020-04-23 13:53:02 |
| 203.245.41.96 | attackspambots | Invalid user ix from 203.245.41.96 port 47956 |
2020-04-23 13:19:57 |
| 200.6.188.38 | attack | Apr 22 19:01:02 tdfoods sshd\[12302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.188.38 user=root Apr 22 19:01:04 tdfoods sshd\[12302\]: Failed password for root from 200.6.188.38 port 58762 ssh2 Apr 22 19:05:39 tdfoods sshd\[12620\]: Invalid user postgres from 200.6.188.38 Apr 22 19:05:39 tdfoods sshd\[12620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.6.188.38 Apr 22 19:05:41 tdfoods sshd\[12620\]: Failed password for invalid user postgres from 200.6.188.38 port 44534 ssh2 |
2020-04-23 13:55:14 |
| 106.13.41.25 | attackbotsspam | failed root login |
2020-04-23 13:27:44 |
| 37.156.146.132 | attackbots | MD_ASIATECH-MNT_<177>1587614062 [1:2403332:56896] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 17 [Classification: Misc Attack] [Priority: 2]: |
2020-04-23 13:50:26 |
| 159.65.137.122 | attackbots | Invalid user test from 159.65.137.122 port 53806 |
2020-04-23 13:49:54 |
| 87.117.178.105 | attack | Apr 22 18:34:15 php1 sshd\[17011\]: Invalid user admin from 87.117.178.105 Apr 22 18:34:15 php1 sshd\[17011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.117.178.105 Apr 22 18:34:17 php1 sshd\[17011\]: Failed password for invalid user admin from 87.117.178.105 port 47326 ssh2 Apr 22 18:38:18 php1 sshd\[17368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.117.178.105 user=postfix Apr 22 18:38:20 php1 sshd\[17368\]: Failed password for postfix from 87.117.178.105 port 60504 ssh2 |
2020-04-23 13:15:59 |
| 118.174.176.225 | attackbots | trying to access non-authorized port |
2020-04-23 13:44:30 |
| 175.6.67.24 | attack | Invalid user test from 175.6.67.24 port 36338 |
2020-04-23 13:12:58 |
| 51.89.166.45 | attack | 5x Failed Password |
2020-04-23 13:52:36 |
| 134.209.41.198 | attackspambots | *Port Scan* detected from 134.209.41.198 (US/United States/California/Bakersfield/-). 4 hits in the last 175 seconds |
2020-04-23 13:57:07 |
| 222.186.42.7 | attackbots | Apr 23 07:40:08 santamaria sshd\[24302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7 user=root Apr 23 07:40:10 santamaria sshd\[24302\]: Failed password for root from 222.186.42.7 port 61576 ssh2 Apr 23 07:40:16 santamaria sshd\[24304\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7 user=root ... |
2020-04-23 13:41:08 |