Loading threats
Identifies an HTTPS session performing systematic probing for environment configuration files and cloud credential artifacts across multiple common naming variants. The behavior includes requests for .env files (including development, staging, production, and local variants), application-level environment files, JSON configuration files, and AWS credential paths. The combined pattern reflects automated secret harvesting logic rather than opportunistic single-path scanning. This sequence is commonly associated with exploitation frameworks and botnets attempting to retrieve application secrets, database credentials, API keys, and cloud access tokens from misconfigured deployments.
| IP Address | Risk | Events | Sessions | Country | ASN | Last Seen |
|---|---|---|---|---|---|---|
| 45.135.193.11 | 100% | 12,632 | 5,002 | 🇩🇪 DE | AS51396 | 2026-02-20 |