This IP address has been reported a total of 9,055
times from 350 distinct
sources.
194.38.23.16 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
GET /wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index. ... show moreGET /wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index.css HTTP/1.1 show less
/wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index.css ... show more/wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index.css (x2) show less
Bad behaviour when trying to access URL: /wp-content/plugins/front-end-editor/lib/aloha-editor/plugi ... show moreBad behaviour when trying to access URL: /wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index.css | Ignores robots.txt | User Agent: ALittle Client show less
Blocked by UFW (TCP on port 80).
Source port: 49512
TTL: 117
Packet length: 52<br ... show moreBlocked by UFW (TCP on port 80).
Source port: 49512
TTL: 117
Packet length: 52
TOS: 0x02
This report (for 194.38.23.16) was generated by:
https://github.com/sefinek/UFW-AbuseIPDB-Reporter show less
194.38.23.16 (AS48693 NTSERVICE-AS) was intercepted at 2024-12-14T07:10:23Z after violating WAF dire ... show more194.38.23.16 (AS48693 NTSERVICE-AS) was intercepted at 2024-12-14T07:10:23Z after violating WAF directive: d0380eeb922844b5b69152600cea062c. Pre-cautionary/corrective action applied: block. show less
Multiple Unauthorized Attempts To Access Restricted Area. - Request Method: GET - Target: {PC} A ... show moreMultiple Unauthorized Attempts To Access Restricted Area. - Request Method: GET - Target: {PC} AdminHub - User Agent: N/A - Timestamp: 12/14/2024 7:13 am (UTC-6) show less
Web SpamHackingBrute-ForceBad Web BotWeb App Attack
Scanning for installed WordPress and vulnerabilities
194.38.23.16 [14/Dec/2024:06:16:17] "GET ... show moreScanning for installed WordPress and vulnerabilities
194.38.23.16 [14/Dec/2024:06:16:17] "GET /wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index.css HTTP/1.1" show less
Web Attack (Dec 24 04:01:41 ScriptKiddie: request for /wp-content/plugins/front-end-editor/lib/aloh ... show moreWeb Attack (Dec 24 04:01:41 ScriptKiddie: request for /wp-content/plugins/front-end-editor/lib/aloha-editor/plugins/extra/draganddropfiles/demo/index.css ) show less