Check an IP Address, Domain Name, Subnet, or ASN
207.154.197.113 has a threat confidence score of 89%. This IP address from Germany (AS14061, DigitalOcean, LLC) has been observed in 620 honeypot sessions and reported 3 times targeting HTTP, HTTPS, MONGODB, SSH, POSTGRES protocols. First observed on January 29, 2026, most recently active May 1, 2026.
Identifies an HTTPS request targeting the .git/config file within a web-accessible repository directory. Access attempts to /.git/config indicate automated repository exposure scanning intended to retrieve remote origin URLs, repository structure, and potentially credential-bearing configuration data. This is a common reconnaissance technique used to identify misconfigured web servers exposing version control metadata.
Identifies HTTP requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration.
Identifies HTTPS requests targeting the web server root path ("/"), typically used for initial service discovery, host validation, or baseline content inspection prior to deeper enumeration
Identifies direct HTTPS requests to the /bad-request path, indicating manual or automated probing of error-handling routes rather than normal application flow.
| Reporter | Date | Category | Protocol | Comment |
|---|---|---|---|---|
| Anonymous | Apr 30, 2026, 18:31 | Brute Force | — | SikkerGuard: 2 blocked packets |
| Anonymous | Apr 29, 2026, 17:00 | Brute Force | SSH | SikkerGuard: 6 blocked packets |
| User | Mar 6, 2026, 21:12 | Brute Force | POSTGRES | SikkerGuard: 6 blocked packets |