abuseip.org
- Reason
- suspicious paths across 3 domains
- Hits (last hour)
- 39
- Unique targets hit
- 6
- Unique paths probed
- 109
- Detection count
- 64
- First seen
- 2026-05-01 03:35:47 UTC
- Last seen
- 2026-05-01 03:58:09 UTC
- Block expires
- 2026-05-02 04:34:35 UTC
Sample paths probed
- /_next/static/chunks/437-1a3f60744dece04f.js.map
- /_next/static/chunks/main-app-af4bda5b3dd1c200.js
- /_next/static/chunks/webpack-e81e9cc2001639cd.js
- /_next/static/chunks/114-5078deccfad2667b.js
- /_next/static/chunks/805-d0a7c461af78f8cc.js
- /_next/static/chunks/794-8c715e8138a8e2c4.js
- /_next/static/chunks/309-f0067636989944f1.js
- /_next/static/chunks/539-3bb8491536ed6f46.js
- /_next/static/chunks/app/(marketing)/layout-ca03d568ce5c4edc.js
- /_next/static/chunks/437-1a3f60744dece04f.js
- /_next/static/chunks/app/(marketing)/page-b3242cb5769f4d68.js
- /_next/static/chunks/873-c90f17df2197ac1b.js
- /
- /_next/static/chunks/243-e1c08a04ff23dc18.js
- /_next/static/chunks/163-d9b703a132e8e8af.js
- /_next/static/chunks/app/layout-7dd773a1bb9976ce.js
- /_next/static/chunks/4bd1b696-deb4a0a1da1923b0.js
- /_next/static/chunks/406b2ba4-3959f6f419b8682d.js
- /_next/static/chunks/500-e2a7ab501ac40f90.js
- /_next/static/chunks/500-e2a7ab501ac40f90.js.map
Sample User-Agents
- Mozilla/5.0 (compatible; SemrushBot/7~bl; +http://www.semrush.com/bot.html)
- Mozilla/5.0 (compatible; Perplexity-User/1.0; +https://perplexity.ai/perplexity-user)
- Mozilla/5.0 (compatible; ClaudeBot/1.0; [email protected])
- Mozilla/5.0 (compatible; GoogleOther; +https://developers.google.com/search/docs/crawling-indexing/overview-google-crawlers)
- Mozilla/5.0 (compatible; DeepSeekBot/1.0; +https://www.deepseek.com/bot)
- Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; GPTBot/1.3; +https://openai.com/gptbot)
- Mozilla/5.0 (compatible; xAI-SearchBot/1.0; +https://x.ai)
- Mozilla/5.0 (compatible; MistralBot/1.0; +https://mistral.ai)
- Mozilla/5.0 (compatible; YouBot/1.0; +https://about.you.com/youbot/)
- DuckDuckBot/1.1; (+http://duckduckgo.com/duckduckbot.html)
- Mozilla/5.0 (compatible; OAI-SearchBot/1.3; +https://openai.com/searchbot)
- Mozilla/5.0 (compatible; YandexBot/3.0; +http://yandex.com/bots)
- Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
- Mozilla/5.0 (compatible; CohereBot/1.0; +https://cohere.com/bot)
- CCBot/2.0 (https://commoncrawl.org/faq/)
- Mozilla/5.0 (compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm)
- Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; Claude-SearchBot/1.0; [email protected])
- Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm) Chrome/116.0.0.0 Safari/537.36
- Mozilla/5.0 (compatible; Meta-ExternalAgent/1.1; +https://developers.facebook.com/docs/sharing/webmasters/crawler)
- Mozilla/5.0 (compatible; Bytespider; [email protected])
What does this mean?
This address sent traffic that the redirs.com edge classified as automated abuse โ typically WordPress/PHP exploit scanning, credential file probing (.env, .git, .aws/), or mass-domain enumeration. The block is automatic and time-limited (24 hours from last detection).
If you believe this is a false positive, contact [email protected] with the IP and the timestamps above.