IP Address: 45.139.122.80
Stats (UTC)
Discuss this ip address
Recent submissions
Reported by
Notes
Flags
System
✅
diegonix
[probe-44-49] 2026-05-10 06:49:09, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-168-134] 2026-05-10 07:00:06, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[probe-44-49] 2026-05-09 03:13:53, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-68-69] 2026-05-09 03:14:59, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
Anonymous
ipban 1.9.0
BruteForce
Apache
✅
diegonix
[probe-44-49] 2026-05-07 02:16:57, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[rede-188] 2026-05-07 02:04:20, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[probe-68-69] 2026-05-04 02:16:54, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-44-49] 2026-05-04 02:17:07, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Sebi
ipban 2.0.0 - 444 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46"
BruteForce
GET /SDK/webLanguage HTTP/1.1
✅
Anonymous
ipban 1.9.0 - 5152
BruteForce
RDP
✅
diegonix
[probe-168-134] 2026-05-03 13:38:38, Client: 45.139.122.80, Protocol: 6, Unauthorized activity to HTTP: HEAD /
PortScan
HTTP
✅
Anonymous
fail2ban
BruteForce
sshd