abuseip.org
- Reason
- suspicious paths across 1 domains
- Hits (last hour)
- 42
- Unique targets hit
- 2
- Unique paths probed
- 537
- Detection count
- 15
- First seen
- 2026-05-01 17:50:53 UTC
- Last seen
- 2026-05-01 17:57:46 UTC
- Block expires
- 2026-05-02 18:11:11 UTC
Sample paths probed
- /config/server.js
- /backend/index.js
- /credentials.json
- /defaults.yaml
- /config/common.js
- /config/aws.json
- /config.json
- /constants.ini
- /readme.md
- /config.rb
- /config/application.yml
- /server/controller.js
- /
- /credentials.csv
- /config.yml
- /docker-cloud.yml
- /credentials.properties
- /config/autoload/local.php
- /constants.ts
- /config/app.js
Sample User-Agents
- Go-http-client/1.1
- Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36
What does this mean?
This address sent traffic that the redirs.com edge classified as automated abuse โ typically WordPress/PHP exploit scanning, credential file probing (.env, .git, .aws/), or mass-domain enumeration. The block is automatic and time-limited (24 hours from last detection).
If you believe this is a false positive, contact [email protected] with the IP and the timestamps above.