IP Address: 93.123.72.166


Stats (UTC)

Discuss this ip address


Add comment...

Recent submissions


Reported by
Timestamp
Notes
Flags
System
yesterday
ipban 3.0.0 - 14
BruteForce
RDP
3 days ago
ipban 3.0.0 - 14
BruteForce
RDP
15 days ago
ipban 3.0.0 - 14
BruteForce
RDP
19 days ago
ipban 3.0.0 - 14
BruteForce
RDP
22 days ago
[probe-168-134] 2026-04-13 01:27:36, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
22 days ago
[probe-44-49] 2026-04-13 01:23:16, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Anonymous
22 days ago
ipban 3.1.0
BruteForce
ApacheWampServer
23 days ago
[probe-44-49] 2026-04-12 00:49:52, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
23 days ago
[probe-168-134] 2026-04-12 00:47:20, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
23 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
23 days ago
[rede-188] 2026-04-11 08:03:26, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Cayenne
24 days ago
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
24 days ago
[probe-168-134] 2026-04-10 02:35:12, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
24 days ago
[probe-44-49] 2026-04-10 02:07:29, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Anonymous
25 days ago
ipban 1.9.0 - 5152
BruteForce
RDP
25 days ago
[rede-188] 2026-04-09 15:41:07, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
25 days ago
[probe-44-49] 2026-04-09 15:20:18, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
Contact IPThreat