Check an IP Address, Domain Name, Subnet, or ASN
31.58.214.23 has a threat confidence score of 100%. This IP address from United Kingdom (AS20860, Iomart Cloud Services Limited) has been observed in 2,664 honeypot sessions targeting HTTP, HTTPS protocols. Detected attack patterns include http dotenv file exposure probe, https dotenv environment file exposure probe. First observed on March 22, 2026, most recently active April 13, 2026.
Identifies HTTP GET requests targeting the /.env file, indicating attempts to access exposed environment configuration files commonly containing application secrets such as database credentials, API keys, and service tokens.
Identifies an HTTPS request targeting a .env file in the web root or application directory. Access attempts to /.env indicate automated scanning for exposed environment configuration files that may contain application secrets, database credentials, API keys, or cloud tokens. This probe is commonly associated with opportunistic internet-wide scanning for misconfigured web deployments.
HTTPS request to /ai_config.py path.
Probing for Moltbot agent authentication profiles via /.moltbot/agents/main/agent/auth-profiles.json, indicating attempts to discover exposed credentials or internal configuration for unauthorized access.
Attempt to access /.moltbot/moltbot.json, indicating reconnaissance or exploitation of an exposed Moltbot configuration file.
HTTP GET request to /ai_config.py, indicating an attempt to retrieve a Python configuration file that may expose application settings or embedded secrets.
HTTP request to /.openclaw/openclaw.json.
HTTPS request to /dump.sql path.
HTTPS request to /litellm_config.yaml path.
HTTP request using GET method.