abuseip.org
- Reason
- suspicious paths across 1 domains
- Hits (last hour)
- 191
- Unique targets hit
- 2
- Unique paths probed
- 3,580
- Detection count
- 9
- First seen
- 2026-05-02 05:47:20 UTC
- Last seen
- 2026-05-02 06:35:44 UTC
- Block expires
- 2026-05-03 06:47:39 UTC
Sample paths probed
- /lc/libs/livecycle/core/content/login.html
- /index.php/ajax/
- /helpdesk/WebObjects/Helpdesk.woa
- /MagicInfo/login.htm?cmd=INIT
- /index.php/login
- /secrets/admin-password
- /API/obj/watchTowrwmzmm
- /secrets/watchTowr
- /secrets/mongodb-root-password
- /secrets/mongodb-passwords
- /secrets/mariadb-password
- /secrets/drupal-password
- /adminui/updateLicense1.do;login.?debug=command&expression=92*7227
- /
- /_next/turbopack/flight
- /secrets/mariadb-root-password
- /secrets/wordpress-password
- /mifs/rs/api/v2/featureusage?format=$%7b8*8%7d
- /mifs/rs/api/v2/featureusage?format=%66%6f%72%6d%61%74%3d%24%7b%22%22%2e%67%65%74%43%6c%61%73%73%28%29%2e%66%6f%72%4e%61%6d%65%28%22%6a%61%76%61%2e%6e%65%74%2e%49%6e%65%74%41%64%64%72%65%73%73%22%29%2e%67%65%74%4d%65%74%68%6f%64%28%22%67%65%74%42%79%4e%61%6d%65%22%2c%22%22%2e%67%65%74%43%6c%61%73%73%28%29%29%2e%69%6e%76%6f%6b%65%28%22%22%2c%22d7qo7bd07css7tam4okghjxbshfdd5dky.dns.watchtowr-oob.com%22%29%7d%27
- /_next/flight
Sample User-Agents
- Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
- Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:89.0) Gecko/20100101 Firefox/89.0
What does this mean?
This address sent traffic that the redirs.com edge classified as automated abuse โ typically WordPress/PHP exploit scanning, credential file probing (.env, .git, .aws/), or mass-domain enumeration. The block is automatic and time-limited (24 hours from last detection).
If you believe this is a false positive, contact [email protected] with the IP and the timestamps above.