Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '150.129.80.0 - 150.129.80.255'

% Abuse contact for '150.129.80.0 - 150.129.80.255' is 'admin@itsidc.com'

inetnum:        150.129.80.0 - 150.129.80.255
netname:        Bunny
descr:          Bunny Communications LLC
country:        HK
admin-c:        CLA17-AP
tech-c:         CLA17-AP
abuse-c:        AR796-AP
status:         ASSIGNED NON-PORTABLE
mnt-by:         MAINT-RAIBOW-HK
mnt-lower:      MAINT-RAIBOW-HK
mnt-routes:     MAINT-RAIBOW-HK
mnt-irt:        IRT-RAIBOW-HK
last-modified:  2025-07-01T10:59:35Z
source:         APNIC

irt:            IRT-RAIBOW-HK
address:        unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
e-mail:         admin@itsidc.com
abuse-mailbox:  admin@itsidc.com
admin-c:        RNLA1-AP
tech-c:         RNLA1-AP
auth:           # Filtered
remarks:        admin@itsidc.com was validated on 2025-07-08
mnt-by:         MAINT-RAIBOW-HK
last-modified:  2025-09-04T07:03:06Z
source:         APNIC

role:           ABUSE RAIBOWHK
country:        ZZ
address:        unit 708 level 7 dragon center, 37k yen chow street sham shui po kln, HONGKONG Hongkong
phone:          +000000000
e-mail:         admin@itsidc.com
admin-c:        RNLA1-AP
tech-c:         RNLA1-AP
nic-hdl:        AR796-AP
remarks:        Generated from irt object IRT-RAIBOW-HK
remarks:        admin@itsidc.com was validated on 2025-07-08
abuse-mailbox:  admin@itsidc.com
mnt-by:         APNIC-ABUSE
last-modified:  2025-07-08T14:41:55Z
source:         APNIC

role:           Cloudie Limited administrator
address:        Unit 1604, Perfect Industrial Building,, 31st Tai Yau Street, San Po Kong Kowloon NA
country:        HK
phone:          +852-61725306
fax-no:         +852-61725306
e-mail:         admin@cloudie.hk
admin-c:        CLA17-AP
tech-c:         CLA17-AP
nic-hdl:        CLA17-AP
mnt-by:         MAINT-CLOUDIE-HK
last-modified:  2019-04-03T05:09:03Z
abuse-mailbox:  abuse@cloudie.hk
abuse-mailbox:  abuse@cloudie.hk
source:         APNIC

% Information related to '150.129.80.0/24AS5065'

route:          150.129.80.0/24
origin:         AS5065
descr:          Rainbow network limited
                unit 708 level 7 dragon center
                37k yen chow street sham shui po kln
mnt-by:         MAINT-RAIBOW-HK
last-modified:  2025-06-09T23:12:43Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.36-SNAPSHOT (WHOIS-AU5)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.129.80.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 985
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.129.80.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025110700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 07 22:51:14 CST 2025
;; MSG SIZE  rcvd: 106
Host info
20.80.129.150.in-addr.arpa domain name pointer unknown.itsidc.com.
Nslookup info:
b'20.80.129.150.in-addr.arpa	name = unknown.itsidc.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
212.63.111.155 attack
WordpressAttack
2019-07-02 04:17:55
46.174.52.30 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 04:15:05
42.98.154.103 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 03:54:44
42.6.171.103 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 03:50:36
188.131.171.12 attack
Jul  1 15:50:01 ns37 sshd[23491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.171.12
Jul  1 15:50:02 ns37 sshd[23491]: Failed password for invalid user data from 188.131.171.12 port 28765 ssh2
Jul  1 15:52:27 ns37 sshd[23650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.171.12
2019-07-02 03:34:08
42.235.85.80 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 03:38:04
117.198.97.175 attack
Unauthorized connection attempt from IP address 117.198.97.175 on Port 445(SMB)
2019-07-02 03:38:26
35.202.20.26 attack
Dictionary attack on login resource.
2019-07-02 03:57:18
177.11.2.223 attackbots
Unauthorized connection attempt from IP address 177.11.2.223 on Port 445(SMB)
2019-07-02 04:13:43
207.35.224.251 attackspam
Scanning random ports - tries to find possible vulnerable services
2019-07-02 04:19:22
80.82.64.127 attackspambots
firewall-block, port(s): 2170/tcp, 5220/tcp, 7230/tcp, 31390/tcp, 33088/tcp
2019-07-02 03:47:55
186.225.180.32 attack
Unauthorized connection attempt from IP address 186.225.180.32 on Port 445(SMB)
2019-07-02 03:34:41
45.169.71.104 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 03:59:35
45.123.108.254 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-02 03:56:49
105.112.99.159 attackbotsspam
Unauthorized connection attempt from IP address 105.112.99.159 on Port 445(SMB)
2019-07-02 03:38:49

Recently Reported IPs

37.167.11.87 37.167.11.243 74.7.230.56 74.7.227.91
39.165.79.119 112.4.101.51 106.75.65.180 59.173.133.46
106.75.21.200 40.124.185.213 2409:8a3c:67c8:7287:a424:42b4:6499:a2bb 112.242.235.125
240e:345:676c:c300:d111:bbbc:acf:65ce 2408:8215:671a:1a81:532c:b8f4:9a22:3bcf 2409:8d05:40c:30b:16:e18:7c8b:532d 2409:8a3c:67c8:7287:a424:4264:6499:a2bb
3.253.106.55 216.180.246.4 54.157.162.240 113.108.79.217