abuseip.org
- Reason
- suspicious paths across 1 domains
- Hits (last hour)
- 42
- Unique targets hit
- 1
- Unique paths probed
- 463
- Detection count
- 39
- First seen
- 2026-05-01 20:31:40 UTC
- Last seen
- 2026-05-01 21:31:19 UTC
- Block expires
- 2026-05-02 21:31:34 UTC
Sample paths probed
- /info
- /inc/cachehandlers/disk.php
- /omniapp/pages/cabinet/managecabinet.jsf?Action=1
- /_api/web
- /v1/info
- /actuator/jolokia/search/*:test=test
- /web
- /.mysql_history
- /jolokia/search/*:test=test
- /_api/site
- /_catalogs/15/masterpage/Forms/AllItems.aspx
- /_catalogs/masterpage/Forms/AllItems.aspx
- /.lesshst
- /_layouts/15/viewlsts.aspx
- /_layouts/viewlsts.aspx
- /SitePages/Forms/AllPages.aspx
- /MAMP/phpinfo.php
- /.p4ignore
- /.forward
- /status
Sample User-Agents
- Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
What does this mean?
This address sent traffic that the redirs.com edge classified as automated abuse โ typically WordPress/PHP exploit scanning, credential file probing (.env, .git, .aws/), or mass-domain enumeration. The block is automatic and time-limited (24 hours from last detection).
If you believe this is a false positive, contact [email protected] with the IP and the timestamps above.