Loading threats
Identifies an HTTPS request targeting the .git/config file within a web-accessible repository directory. Access attempts to /.git/config indicate automated repository exposure scanning intended to retrieve remote origin URLs, repository structure, and potentially credential-bearing configuration data. This is a common reconnaissance technique used to identify misconfigured web servers exposing version control metadata.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 185.177.72.61 | 100% | 30,513 | 30,510 | 🇫🇷 FR | AS211590 | 2026-04-17 |
| 34.158.79.105 | 100% | 29,621 | 29,438 | 🇳🇱 NL | AS396982 | 2026-03-23 |
| 94.26.88.31 | 100% | 7,929 | 5,256 | 🇧🇬 BG | AS201814 | 2026-04-17 |
| 94.26.88.32 | 100% | 7,203 | 4,036 | 🇧🇬 BG | AS201814 | 2026-04-16 |
| 35.216.144.195 | 100% | 5,421 | 2,534 | 🇨🇭 CH | AS15169 | 2026-04-06 |
| 35.216.195.77 | 100% | 5,139 | 2,038 | 🇨🇭 CH | AS15169 |
| 2026-04-11 |
| 45.83.31.168 | 100% | 4,525 | 2,034 | 🇺🇸 US | AS210558 | 2026-02-23 |
| 45.148.10.124 | 100% | 3,924 | 2,213 | 🇳🇱 NL | AS48090 | 2026-04-12 |
| 65.49.20.68 | 100% | 3,891 | 2,971 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 65.49.20.66 | 100% | 3,689 | 2,900 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 65.49.20.67 | 100% | 3,613 | 2,826 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 65.49.20.69 | 100% | 3,507 | 2,646 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 74.82.47.5 | 100% | 3,484 | 2,549 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.194 | 100% | 3,401 | 2,448 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.252 | 100% | 3,341 | 2,481 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.254 | 100% | 3,309 | 2,464 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.247.195 | 100% | 3,297 | 2,388 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 184.105.139.68 | 100% | 3,038 | 2,220 | 🇺🇸 US | AS6939 | 2026-04-17 |
| 124.198.131.162 | 100% | 3,003 | 3,003 | 🇺🇸 US | AS210558 | 2026-04-17 |
| 216.218.206.66 | 100% | 2,985 | 2,246 | 🇺🇸 US | AS6939 | 2026-04-16 |