City: unknown
Region: unknown
Country: Hong Kong
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
% [whois.apnic.net]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '150.129.80.0 - 150.129.80.255'
% Abuse contact for '150.129.80.0 - 150.129.80.255' is 'admin@itsidc.com'
inetnum: 150.129.80.0 - 150.129.80.255
netname: Bunny
descr: Bunny Communications LLC
country: HK
admin-c: CLA17-AP
tech-c: CLA17-AP
abuse-c: AR796-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-RAIBOW-HK
mnt-lower: MAINT-RAIBOW-HK
mnt-routes: MAINT-RAIBOW-HK
mnt-irt: IRT-RAIBOW-HK
last-modified: 2025-07-01T10:59:35Z
source: APNIC
irt: IRT-RAIBOW-HK
address: unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
e-mail: admin@itsidc.com
abuse-mailbox: admin@itsidc.com
admin-c: RNLA1-AP
tech-c: RNLA1-AP
auth: # Filtered
remarks: admin@itsidc.com was validated on 2025-07-08
mnt-by: MAINT-RAIBOW-HK
last-modified: 2025-09-04T07:03:06Z
source: APNIC
role: ABUSE RAIBOWHK
country: ZZ
address: unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
phone: +000000000
e-mail: admin@itsidc.com
admin-c: RNLA1-AP
tech-c: RNLA1-AP
nic-hdl: AR796-AP
remarks: Generated from irt object IRT-RAIBOW-HK
remarks: admin@itsidc.com was validated on 2025-07-08
abuse-mailbox: admin@itsidc.com
mnt-by: APNIC-ABUSE
last-modified: 2025-07-08T14:41:55Z
source: APNIC
role: Cloudie Limited administrator
address: Unit 1604, Perfect Industrial Building,, 31st Tai Yau Street, San Po Kong Kowloon NA
country: HK
phone: +852-61725306
fax-no: +852-61725306
e-mail: admin@cloudie.hk
admin-c: CLA17-AP
tech-c: CLA17-AP
nic-hdl: CLA17-AP
mnt-by: MAINT-CLOUDIE-HK
last-modified: 2019-04-03T05:09:03Z
abuse-mailbox: abuse@cloudie.hk
abuse-mailbox: abuse@cloudie.hk
source: APNIC
% Information related to '150.129.80.0/24AS5065'
route: 150.129.80.0/24
origin: AS5065
descr: Rainbow network limited
unit 708 level 7 dragon center
37k yen chow street sham shui po kln
mnt-by: MAINT-RAIBOW-HK
last-modified: 2025-06-09T23:12:43Z
source: APNIC
% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.129.80.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;150.129.80.20. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025110700 1800 900 604800 86400
;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 22:51:14 CST 2025
;; MSG SIZE rcvd: 106
20.80.129.150.in-addr.arpa domain name pointer unknown.itsidc.com.
b'20.80.129.150.in-addr.arpa name = unknown.itsidc.com.
Authoritative answers can be found from:
'
| IP | Type | Details | Datetime |
|---|---|---|---|
| 212.63.111.155 | attack | WordpressAttack |
2019-07-02 04:17:55 |
| 46.174.52.30 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 04:15:05 |
| 42.98.154.103 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 03:54:44 |
| 42.6.171.103 | attackspam | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 03:50:36 |
| 188.131.171.12 | attack | Jul 1 15:50:01 ns37 sshd[23491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.171.12 Jul 1 15:50:02 ns37 sshd[23491]: Failed password for invalid user data from 188.131.171.12 port 28765 ssh2 Jul 1 15:52:27 ns37 sshd[23650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.171.12 |
2019-07-02 03:34:08 |
| 42.235.85.80 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 03:38:04 |
| 117.198.97.175 | attack | Unauthorized connection attempt from IP address 117.198.97.175 on Port 445(SMB) |
2019-07-02 03:38:26 |
| 35.202.20.26 | attack | Dictionary attack on login resource. |
2019-07-02 03:57:18 |
| 177.11.2.223 | attackbots | Unauthorized connection attempt from IP address 177.11.2.223 on Port 445(SMB) |
2019-07-02 04:13:43 |
| 207.35.224.251 | attackspam | Scanning random ports - tries to find possible vulnerable services |
2019-07-02 04:19:22 |
| 80.82.64.127 | attackspambots | firewall-block, port(s): 2170/tcp, 5220/tcp, 7230/tcp, 31390/tcp, 33088/tcp |
2019-07-02 03:47:55 |
| 186.225.180.32 | attack | Unauthorized connection attempt from IP address 186.225.180.32 on Port 445(SMB) |
2019-07-02 03:34:41 |
| 45.169.71.104 | attack | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 03:59:35 |
| 45.123.108.254 | attackbots | MultiHost/MultiPort Probe, Scan, Hack - |
2019-07-02 03:56:49 |
| 105.112.99.159 | attackbotsspam | Unauthorized connection attempt from IP address 105.112.99.159 on Port 445(SMB) |
2019-07-02 03:38:49 |