Loading threats
Identifies an HTTPS request targeting the .git/config file within a web-accessible repository directory. Access attempts to /.git/config indicate automated repository exposure scanning intended to retrieve remote origin URLs, repository structure, and potentially credential-bearing configuration data. This is a common reconnaissance technique used to identify misconfigured web servers exposing version control metadata.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 34.158.79.105 | 100% | 29,621 | 29,438 | 🇳🇱 NL | AS396982 | 2026-03-23 |
| 185.177.72.61 | 100% | 16,987 | 16,987 | 🇫🇷 FR | AS211590 | 2026-04-09 |
| 94.26.88.31 | 100% | 7,284 | 4,611 | 🇧🇬 BG | AS201814 | 2026-04-09 |
| 94.26.88.32 | 100% | 6,594 | 3,427 | 🇧🇬 BG | AS201814 | 2026-04-09 |
| 35.216.144.195 | 100% | 5,421 | 2,534 | 🇨🇭 CH | AS15169 | 2026-04-06 |
| 35.216.195.77 | 100% | 5,137 | 2,036 | 🇨🇭 CH | AS15169 |
| 2026-04-06 |
| 45.83.31.168 | 100% | 4,525 | 2,034 | 🇺🇸 US | AS210558 | 2026-02-23 |
| 45.148.10.124 | 100% | 3,901 | 2,190 | 🇳🇱 NL | AS48090 | 2026-04-09 |
| 65.49.20.68 | 100% | 3,619 | 2,699 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 65.49.20.67 | 99% | 3,321 | 2,534 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 74.82.47.5 | 100% | 3,218 | 2,283 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 65.49.20.69 | 100% | 3,147 | 2,286 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 184.105.247.195 | 100% | 3,098 | 2,189 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 184.105.247.252 | 100% | 3,053 | 2,193 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 184.105.247.254 | 100% | 3,049 | 2,204 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 216.218.206.66 | 100% | 2,786 | 2,047 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 184.105.139.68 | 99% | 2,783 | 1,965 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 184.105.247.196 | 100% | 2,756 | 2,050 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 74.82.47.4 | 100% | 2,741 | 2,045 | 🇺🇸 US | AS6939 | 2026-04-09 |
| 35.216.201.9 | 100% | 2,658 | 1,223 | 🇨🇭 CH | AS15169 | 2026-04-02 |