IP Address: 93.123.72.166
Stats (UTC)
Discuss this ip address
Recent submissions
Reported by
Notes
Flags
System
✅
diegonix
[probe-168-134] 2026-04-13 01:27:36, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-44-49] 2026-04-13 01:23:16, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Anonymous
ipban 3.1.0
BruteForce
ApacheWampServer
✅
diegonix
[probe-44-49] 2026-04-12 00:49:52, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-168-134] 2026-04-12 00:47:20, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[rede-188] 2026-04-11 08:03:26, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Cayenne
fail2ban GET /SDK/webLanguage .... exploit CVE-2021-36260. https://github.com/mcw0/PoC/blob/master/CVE-2021-36260.py ?
Hacking, Iot
HTTP/HTTPS
✅
diegonix
[probe-168-134] 2026-04-10 02:35:12, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-44-49] 2026-04-10 02:07:29, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
Anonymous
ipban 1.9.0 - 5152
BruteForce
RDP
✅
diegonix
[rede-188] 2026-04-09 15:41:07, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP
✅
diegonix
[probe-44-49] 2026-04-09 15:20:18, Client: 93.123.72.166, Protocol: 6, Unauthorized activity to HTTP: GET /SDK/webLanguage
PortScan
HTTP