Check an IP Address, Domain Name, Subnet, or ASN
172.94.9.253 has a threat confidence score of 100%. This IP address from Iran (AS213790, Limited Network LTD) has been observed in 2,431 honeypot sessions and reported 128 times targeting HTTP, HTTPS protocols. Detected attack patterns include http git repository config exposure probe. First observed on February 16, 2026, most recently active April 12, 2026.
Identifies HTTP GET requests targeting /.git/config, indicating attempts to access exposed Git repository configuration files. Successful access may enable repository reconstruction, credential harvesting, or source code disclosure.
Identifies an HTTPS request targeting the .git/config file within a web-accessible repository directory. Access attempts to /.git/config indicate automated repository exposure scanning intended to retrieve remote origin URLs, repository structure, and potentially credential-bearing configuration data. This is a common reconnaissance technique used to identify misconfigured web servers exposing version control metadata.
HTTPS request targeting /.git/config, representing a direct attempt to access a publicly exposed Git repository configuration file. This behavior reflects repository metadata enumeration via the Git configuration file and is commonly associated with source disclosure reconnaissance.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| User | Mar 22, 2026, 16:17 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 22, 2026, 09:33 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 22, 2026, 09:12 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 22, 2026, 07:57 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |
| User | Mar 21, 2026, 23:47 | Brute Force | HTTP | SikkerGuard: 2 blocked packets |