This IP address has been reported a total of 24
times from 15 distinct
sources.
136.243.149.182 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
Multiple login attempts via RDP and/or SSH using wrong credentials. Attack automatically blocked by ... show moreMultiple login attempts via RDP and/or SSH using wrong credentials. Attack automatically blocked by SkyDancer Ai. EXT-SYS-A-X show less
Attempted Not Found (404 status code) requests on our application, more than 30% of their total requ ... show moreAttempted Not Found (404 status code) requests on our application, more than 30% of their total requests. show less
[FriDec1314:51:28.7731922024][security2:error][pid3617526:tid3617668][client136.243.149.182:0][clien ... show more[FriDec1314:51:28.7731922024][security2:error][pid3617526:tid3617668][client136.243.149.182:0][client136.243.149.182]ModSecurity:Accessdeniedwithcode403\(phase2\).File\"/tmp/20241213-145125-Z1w73Vn7Mryp264iQ3kPeQAAANE-file-fyJGNX\"rejectedbytheapproverscript\"/etc/cxs/cxscgi.sh\":0[file\"/etc/apache2/conf.d/modsec_vendor_configs/configserver/00_configserver.conf\"][line\"7\"][id\"1010101\"][msg\"ConfigServerExploitScanner\(cxs\)triggered\"][severity\"CRITICAL\"][hostname\"www.shakary.com\"][uri\"/index.php\"][unique_id\"Z1w73Vn7Mryp264iQ3kPeQAAANE\"] show less
Web Server Enforcement Violation: Atlassian Confluence Remote Code Execution (CVE-2022-26134)
... show moreWeb Server Enforcement Violation: Atlassian Confluence Remote Code Execution (CVE-2022-26134)
Port:80 show less