This IP address has been reported a total of 20
times from 12 distinct
sources.
170.64.228.104 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
[Thu Aug 15 01:56:49.553947 2024] [php:error] [pid 229329] [client 170.64.228.104:50914] script  ... show more[Thu Aug 15 01:56:49.553947 2024] [php:error] [pid 229329] [client 170.64.228.104:50914] script '/var/www/html/upl.php' not found or unable to stat
[Thu Aug 15 01:56:51.847220 2024] [php:error] [pid 229341] [client 170.64.228.104:50956] script '/var/www/html/1.php' not found or unable to stat
[Thu Aug 15 01:56:53.109091 2024] [php:error] [pid 229329] [client 170.64.228.104:50980] script '/var/www/html/password.php' not found or unable to stat
... show less
2024/08/15 00:42:25 [error] 408895#408895: *108042 FastCGI sent in stderr: "PHP message: BOT WARNING ... show more2024/08/15 00:42:25 [error] 408895#408895: *108042 FastCGI sent in stderr: "PHP message: BOT WARNING: visitor used the honeypot: 170.64.228.104, you should ban it for long time (honeypot form function-abuseipdb)" while reading response header from upstream, client: 170.64.228.104, server: www.elivecd.org, request: "GET / HTTP/1.1", upstream: "fastcgi://unix:/run/php/php8.2-fpm-elivewp.sock:", host: "78.141.243.157"
... show less
Web Application Server Abuse: Probing For Sensitive Files And Services - BANNED by ModSecurity ... show moreWeb Application Server Abuse: Probing For Sensitive Files And Services - BANNED by ModSecurity
... show less