Loading threats
Identifies an HTTPS request targeting the .git/config file within a web-accessible repository directory. Access attempts to /.git/config indicate automated repository exposure scanning intended to retrieve remote origin URLs, repository structure, and potentially credential-bearing configuration data. This is a common reconnaissance technique used to identify misconfigured web servers exposing version control metadata.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 185.177.72.61 | 100% | 31,405 | 31,402 | 🇫🇷 FR | AS211590 | 2026-04-17 |
| 34.158.79.105 | 100% | 29,621 | 29,438 | 🇳🇱 NL | AS396982 | 2026-03-23 |
| 94.26.88.31 | 100% | 7,967 | 5,294 | 🇧🇬 BG | AS201814 | 2026-04-17 |
| 94.26.88.32 | 100% | 7,260 | 4,093 | 🇧🇬 BG | AS201814 | 2026-04-17 |
| 35.216.144.195 | 100% | 5,421 | 2,534 | 🇨🇭 CH | AS15169 | 2026-04-06 |
| 35.216.195.77 | 100% | 5,139 | 2,038 | 🇨🇭 CH | AS15169 | 2026-04-11 |
| 45.83.31.168 | 100% | 4,525 | 2,034 | 🇺🇸 US | AS210558 | 2026-02-23 |
| 45.148.10.124 | 100% | 3,924 | 2,213 | 🇳🇱 NL | AS48090 | 2026-04-12 |
| 65.49.20.68 | 100% | 3,917 | 2,997 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 65.49.20.66 | 100% | 3,703 | 2,914 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 65.49.20.67 | 100% | 3,645 | 2,858 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 65.49.20.69 | 100% | 3,513 | 2,652 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 74.82.47.5 | 100% | 3,503 | 2,568 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.194 | 100% | 3,407 | 2,454 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.252 | 100% | 3,348 | 2,488 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.254 | 100% | 3,329 | 2,484 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.195 | 100% | 3,324 | 2,415 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.139.68 | 100% | 3,050 | 2,232 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 124.198.131.162 | 100% | 3,011 | 3,011 | 🇺🇸 US | AS210558 | 2026-04-17 |
| 216.218.206.66 | 100% | 2,995 | 2,256 | 🇺🇸 US | AS6939 | 2026-04-17 |