abuseip.org
- Reason
- scanning 25 domains
- Hits (last hour)
- 837
- Unique targets hit
- 45
- Unique paths probed
- 70
- Detection count
- 14
- First seen
- 2026-05-03 16:00:10 UTC
- Last seen
- 2026-05-03 19:17:10 UTC
- Block expires
- 2026-05-04 19:19:43 UTC
Sample paths probed
- /.aws/credentials
- /msftghes/appsettings.json
- /credentials.json
- /env.example.json
- /settings.json
- /composer.json
- /package.json
- /itleaks-report.json
- /src/data/credentials.json
- /WebAPI/appsettings.json
- /js/data.json
- /public/data.json
- /dev/local.settings.json
- /KnowledgeSpace.BackendServer/appsettings.Production.json
- /IndividualNorthwindEshop/appsettings.json
- /keys.json
- /data.json
- /robomed.Web/appsettings.json
- /appsettings.json
- /config/default.json
Sample User-Agents
- Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
What does this mean?
This address sent traffic that the redirs.com edge classified as automated abuse โ typically WordPress/PHP exploit scanning, credential file probing (.env, .git, .aws/), or mass-domain enumeration. The block is automatic and time-limited (24 hours from last detection).
If you believe this is a false positive, contact [email protected] with the IP and the timestamps above.