Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hong Kong

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '150.40.192.0 - 150.40.255.255'

% Abuse contact for '150.40.192.0 - 150.40.255.255' is 'hwssecurity@huaweicloud.com'

inetnum:        150.40.192.0 - 150.40.255.255
netname:        Huawei-Cloud-HK
descr:          Huawei-Cloud-HK
country:        HK
admin-c:        HIPL7-AP
tech-c:         HIPL7-AP
abuse-c:        AH905-AP
status:         ALLOCATED NON-PORTABLE
mnt-by:         MAINT-HIPL-SG
mnt-irt:        IRT-HIPL-SG
last-modified:  2024-08-13T10:16:45Z
geofeed:        https://res-static.hc-cdn.cn/cloudbu-site/china/zh-cn/IP-location/google-geo-feed.csv
source:         APNIC

irt:            IRT-HIPL-SG
address:        15A Changi Business Park Central 1 Eightrium
e-mail:         hwssecurity@huaweicloud.com
abuse-mailbox:  hwssecurity@huaweicloud.com
admin-c:        HIPL4-AP
tech-c:         HIPL4-AP
auth:           # Filtered
remarks:        hwssecurity@huaweicloud.com
remarks:        hwssecurity@huaweicloud.com was validated on 2026-01-30
mnt-by:         MAINT-HIPL-SG
last-modified:  2026-04-25T02:48:52Z
source:         APNIC

role:           ABUSE HIPLSG
country:        ZZ
address:        15A Changi Business Park Central 1 Eightrium
phone:          +000000000
e-mail:         hwssecurity@huaweicloud.com
admin-c:        HIPL4-AP
tech-c:         HIPL4-AP
nic-hdl:        AH905-AP
remarks:        Generated from irt object IRT-HIPL-SG
remarks:        hwssecurity@huaweicloud.com was validated on 2026-01-30
abuse-mailbox:  hwssecurity@huaweicloud.com
mnt-by:         APNIC-ABUSE
last-modified:  2026-01-30T02:19:07Z
source:         APNIC

role:           HUAWEI INTERNATIONAL PTE LTD administrator
address:        15A Changi Business Park Central 1 Eightrium #03-03/04, Singapore  486035
country:        SG
phone:          +8618730601505
e-mail:         wanggang222@huawei.com
admin-c:        HIPL7-AP
tech-c:         HIPL7-AP
nic-hdl:        HIPL7-AP
notify:         wanggang222@huawei.com
mnt-by:         MAINT-HIPL-SG
last-modified:  2021-06-04T07:42:42Z
source:         APNIC

% Information related to '150.40.254.0/24AS136907'

route:          150.40.254.0/24
country:        HK
origin:         AS136907
descr:          HUAWEI INTERNATIONAL PTE. LTD.
                15A Changi Business Park Central 1 Eightrium #03-03/04
mnt-by:         MAINT-HIPL-SG
last-modified:  2025-01-21T07:59:27Z
source:         APNIC

% This query was served by the APNIC Whois Service version 1.88.48 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 150.40.254.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;150.40.254.162.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026050401 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 05 05:30:37 CST 2026
;; MSG SIZE  rcvd: 107
Host info
b'Host 162.254.40.150.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 150.40.254.162.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
157.245.211.180 attackbotsspam
Aug  2 08:30:22 ny01 sshd[28677]: Failed password for root from 157.245.211.180 port 41976 ssh2
Aug  2 08:31:44 ny01 sshd[28857]: Failed password for root from 157.245.211.180 port 35444 ssh2
2020-08-02 20:37:40
212.129.25.123 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-02 20:45:56
106.241.33.158 attackspambots
Aug  2 14:27:42 home sshd[1373105]: Failed password for root from 106.241.33.158 port 53465 ssh2
Aug  2 14:29:05 home sshd[1373676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.33.158  user=root
Aug  2 14:29:07 home sshd[1373676]: Failed password for root from 106.241.33.158 port 18142 ssh2
Aug  2 14:30:28 home sshd[1374084]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.241.33.158  user=root
Aug  2 14:30:30 home sshd[1374084]: Failed password for root from 106.241.33.158 port 39338 ssh2
...
2020-08-02 20:33:55
174.111.226.101 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-02 20:47:14
128.70.6.255 attack
Port Scan
...
2020-08-02 20:54:14
176.9.71.213 attackbotsspam
(mod_security) mod_security (id:210492) triggered by 176.9.71.213 (DE/Germany/motoko-mk4.lapo.it): 5 in the last 3600 secs
2020-08-02 20:39:24
157.230.151.241 attackspambots
Aug  2 14:25:53 vps647732 sshd[10802]: Failed password for root from 157.230.151.241 port 53364 ssh2
...
2020-08-02 20:53:36
165.22.223.82 attackbotsspam
GET /wp-login.php
2020-08-02 20:58:36
128.199.223.233 attackspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-08-02T12:02:31Z and 2020-08-02T12:15:47Z
2020-08-02 20:42:01
222.186.42.213 attackspam
Aug  2 14:28:22 piServer sshd[31939]: Failed password for root from 222.186.42.213 port 21687 ssh2
Aug  2 14:28:25 piServer sshd[31939]: Failed password for root from 222.186.42.213 port 21687 ssh2
Aug  2 14:28:28 piServer sshd[31939]: Failed password for root from 222.186.42.213 port 21687 ssh2
...
2020-08-02 20:34:22
111.204.86.194 attackbotsspam
Aug  2 09:11:59 vps46666688 sshd[3259]: Failed password for root from 111.204.86.194 port 57898 ssh2
...
2020-08-02 20:53:02
45.64.237.125 attackbots
Aug  2 14:14:20 host sshd[23774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.237.125  user=root
Aug  2 14:14:22 host sshd[23774]: Failed password for root from 45.64.237.125 port 35908 ssh2
...
2020-08-02 20:34:52
177.189.241.61 attackspam
Automatic report - Banned IP Access
2020-08-02 20:48:32
106.51.3.214 attackspambots
Aug  2 12:04:23 scw-tender-jepsen sshd[7447]: Failed password for root from 106.51.3.214 port 54138 ssh2
2020-08-02 20:47:31
118.70.72.103 attack
2020-08-02T12:06:21.840223shield sshd\[27780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103  user=root
2020-08-02T12:06:24.116280shield sshd\[27780\]: Failed password for root from 118.70.72.103 port 38460 ssh2
2020-08-02T12:10:23.536647shield sshd\[28405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103  user=root
2020-08-02T12:10:25.703811shield sshd\[28405\]: Failed password for root from 118.70.72.103 port 37508 ssh2
2020-08-02T12:14:26.677362shield sshd\[29353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.72.103  user=root
2020-08-02 20:33:08

Recently Reported IPs

14.212.75.133 43.165.198.144 153.75.247.138 3.80.204.163
13.222.129.81 2606:4700:10::6816:453 2606:4700:10::6816:3484 20.14.78.253
108.131.49.157 44.201.164.126 14.220.180.182 2606:4700:10::ac43:1450
2606:4700:10::ac43:1437 43.161.217.205 43.254.242.91 229.117.228.32
178.16.54.89 238.229.62.219 188.246.22.31 2606:4700:10::6816:3352