IP Address: 45.139.122.80


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
7 hours ago
[probe-44-49] 2026-05-10 06:49:09, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
7 hours ago
[probe-168-134] 2026-05-10 07:00:06, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
9 hours ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
yesterday
[probe-44-49] 2026-05-09 03:13:53, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
yesterday
[probe-68-69] 2026-05-09 03:14:59, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
yesterday
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
Anonymous
3 days ago
ipban 1.9.0
BruteForce
Apache
3 days ago
[probe-44-49] 2026-05-07 02:16:57, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
3 days ago
[rede-188] 2026-05-07 02:04:20, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
3 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
Cayenne
6 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
6 days ago
[probe-68-69] 2026-05-04 02:16:54, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
6 days ago
[probe-44-49] 2026-05-04 02:17:07, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Sebi
6 days ago
ipban 2.0.0 - 444 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46"
BruteForce
GET /SDK/webLanguage HTTP/1.1
Anonymous
6 days ago
ipban 1.9.0 - 5152
BruteForce
RDP
7 days ago
[probe-168-134] 2026-05-03 13:38:38, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: HEAD /
PortScan
HTTP
Anonymous
11 days ago
fail2ban
BruteForce
sshd
KingD
16 days ago
ipban 2.0.0 - Failed password
BruteForce
SSH
imcas
16 days ago
ipban 3.1.0 - 5152
BruteForce
RDP
Pr0vieH
16 days ago
fail2ban
BruteForce
SSH
Contact IPThreat