Check an IP Address, Domain Name, Subnet, or ASN
196.115.87.207 has a threat confidence score of 99%. This IP address from Morocco (AS36925, ASMedi) has been observed in 50 honeypot sessions targeting HTTP, MYSQL protocols. Detected attack patterns include androxgh0st payload probe, http git repository config exposure probe, http dotenv file exposure probe. First observed on April 1, 2026, most recently active April 2, 2026.
Identifies HTTP requests containing the androxgh0st payload marker in the request body, indicative of automated exploitation or scanning activity associated with Androxgh0st campaigns targeting exposed web applications and misconfigured services.
Identifies HTTP GET requests targeting /.git/config, indicating attempts to access exposed Git repository configuration files. Successful access may enable repository reconstruction, credential harvesting, or source code disclosure.
Identifies HTTP GET requests targeting the /.env file, indicating attempts to access exposed environment configuration files commonly containing application secrets such as database credentials, API keys, and service tokens.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.