Check an IP Address, Domain Name, Subnet, or ASN
104.23.172.74 has a low threat confidence level of 9%, originating from Amsterdam, The Netherlands, on the Cloudflare, Inc. network (13335). It has been observed across 49 sessions targeting HTTPS, HTTP, with detected attack patterns including https dotenv environment file exposure probe, First observed on January 25, 2026, most recently active March 3, 2026.
Identifies an HTTPS request targeting a .env file in the web root or application directory. Access attempts to /.env indicate automated scanning for exposed environment configuration files that may contain application secrets, database credentials, API keys, or cloud tokens. This probe is commonly associated with opportunistic internet-wide scanning for misconfigured web deployments.
Automated authentication attempt against a WordPress login endpoint using the common default username admin and weak password pattern. Indicative of credential stuffing or default password brute-force activity targeting internet-exposed WordPress installations.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration