Your device might be infected with malware.

CSV Field description:

Timestamp: Date when we saw the device hitting the honeypot/darknet and we collected device information
IP: Self explanatory
Port: Port scanned
Manufacturer: Identified manufacturer of the device (if found)
Firmware: If known, the firmware or software running on the device
hq_manufacturer: Country where the headquarter of the manufacturer is located
city_hq: City where the headquarter of the manufacturer is located
vulnerability_device: Specific CVE associated with the device. We don't know which vulnerability was exploited, but these are vulnerabilities associated with the identified device.
vulnerable_devices_manufacturer: If no specific device was found (e.g. specific model), then we look up in general which CVEs are associated with that manufacturer. The lists of CVEs might not be exhaustive.
IoT: Value 1 if it is an IoT device (this is a column more useful for us since we had also non-IoT devices that we identify too, so we filter only IoT for the report).
Patch: Value=1 if we found any blog or information that there was a patch released, Value=2 if we are not sure if there is a patch available or we don't know the exact device, thus we are not sure about patches, Value=0 if not patch to the vulnerabilities associated to the device have been released.

General advice on fixing this issue:

Reset the device to factory settings.

Check that your device has the latest available firmware from the manufacturer and does not use default passwords.