IP Address: 5.61.209.96
Stats (UTC)
Discuss this ip address
Recent submissions
Reported by
Notes
Flags
System
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[probe-68-69] 2026-03-07 02:37:58, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[rede-188] 2026-03-07 02:15:58, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[rede-188] 2026-03-06 21:30:44, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[rede-188] 2026-03-05 02:49:51, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-68-69] 2026-03-05 02:47:22, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-44-49] 2026-03-04 02:01:02, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-68-69] 2026-03-04 02:05:30, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[probe-44-49] 2026-03-03 13:00:40, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[rede-188] 2026-03-03 13:00:59, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Anonymous
ipban 1.9.0 - 5152
BruteForce
RDP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[probe-168-134] 2026-02-27 16:17:36, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Anonymous
ipban 1.9.0
BruteForce
Apache
✅
diegonix
[rede-188] 2026-02-27 16:06:07, Client: 5.61.209.96, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS