IP Address: 89.42.231.239


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
Cayenne
6 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
6 days ago
[probe-68-69] 2026-01-03 00:20:00, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 days ago
[arem1] 2026-01-03 00:18:02, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
6 days ago
[probe-168-134] 2026-01-02 22:19:18, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
7 days ago
ipban 2.0.0 - 5152
BruteForce
RDP
7 days ago
[probe-68-69] 2026-01-02 14:07:11, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
8 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
8 days ago
[arem1] 2026-01-01 00:47:14, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
8 days ago
[rede-188] 2026-01-01 00:30:43, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Cayenne
9 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
9 days ago
[probe-68-69] 2025-12-31 00:12:46, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
9 days ago
[arem1] 2025-12-31 00:10:15, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Cayenne
10 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
10 days ago
[probe-168-134] 2025-12-30 00:46:33, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
10 days ago
[rede-188] 2025-12-30 00:16:43, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
11 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
imcas
11 days ago
ipban 3.1.0 - 5152
BruteForce
RDP
11 days ago
[probe-68-69] 2025-12-29 00:56:12, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
11 days ago
[rede-188] 2025-12-29 00:22:12, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
11 days ago
[probe-168-134] 2025-12-28 16:35:12, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
11 days ago
[probe-68-69] 2025-12-28 16:32:38, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Cayenne
13 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
Anonymous
13 days ago
ipban 3.1.0
BruteForce
ApacheWampServer
13 days ago
[probe-68-69] 2025-12-27 00:42:42, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
13 days ago
[rede-188] 2025-12-27 00:28:02, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
14 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
14 days ago
[probe-168-134] 2025-12-26 00:28:39, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
14 days ago
[rede-188] 2025-12-26 00:13:23, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
14 days ago
[arem1] 2025-12-25 17:14:21, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
14 days ago
[rede-188] 2025-12-25 17:04:44, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
16 days ago
[probe-68-69] 2025-12-24 10:42:37, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
16 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
Anonymous
16 days ago
ipban 3.1.0
BruteForce
ApacheWampServer
17 days ago
[probe-168-134] 2025-12-23 04:59:09, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
17 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
17 days ago
[rede-188] 2025-12-22 23:38:50, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /cgi-bin/luci/;stok=/locale
PortScan
HTTP
18 days ago
[rede-188] 2025-12-22 00:53:01, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /cgi-bin/luci/;stok=/locale
PortScan
HTTP
18 days ago
[probe-68-69] 2025-12-21 23:47:00, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
18 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
19 days ago
[probe-168-134] 2025-12-21 03:31:43, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
19 days ago
[probe-68-69] 2025-12-21 03:31:57, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Cayenne
20 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
20 days ago
[arem1] 2025-12-19 23:45:11, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
20 days ago
[probe-68-69] 2025-12-19 23:43:02, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
imcas
21 days ago
ipban 3.1.0 - 5152
BruteForce
RDP
21 days ago
[probe-168-134] 2025-12-19 04:43:48, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /
PortScan
HTTP
Cayenne
21 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
21 days ago
[rede-188] 2025-12-19 03:52:18, Client: 89.42.231.239, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
21 days ago
ipbanpro 4.4.0 - ipban failed login
BruteForce
WEBATTACK-INNE
Contact IPThreat