This IP address has been reported a total of 571
times from 132 distinct
sources.
2.56.57.93 was first reported on ,
and the most recent report was .
Recent Reports:
We have received reports of abusive activity from this IP address within the last week. It is
potentially still actively engaged in abusive activities.
2021-12-25T23:58:38+00:00 NAS [Sat Dec 25 23:58:38 2021] [error] [client 2.56.57.93] File does not e ... show more2021-12-25T23:58:38+00:00 NAS [Sat Dec 25 23:58:38 2021] [error] [client 2.56.57.93] File does not exist: /var/services/web/index.php show less
51 requests, including :
GET //wp1/wp-includes/wlwmanifest.xml HTTP/1.1
GET //wp/wp-inc ... show more51 requests, including :
GET //wp1/wp-includes/wlwmanifest.xml HTTP/1.1
GET //wp/wp-includes/wlwmanifest.xml HTTP/1.1
GET //news/wp-includes/wlwmanifest.xml HTTP/1.1
GET //wp2/wp-includes/wlwmanifest.xml HTTP/1.1
GET //2019/wp-includes/wlwmanifest.xml HTTP/1.1
GET //website/wp-includes/wlwmanifest.xml HTTP/1.1
GET //xmlrpc.php?rsd HTTP/1.1
GET //web/wp-includes/wlwmanifest.xml HTTP/1.1
GET //blog/wp-includes/wlwmanifest.xml HTTP/1.1
GET //site/wp-includes/wlwmanifest.xml HTTP/1.1
GET //cms/wp-includes/wlwmanifest.xml HTTP/1.1 show less
[Thu Jan 13 18:31:58.907854 2022] [php5:error] [pid 32257] [client 2.56.57.93:53582] script '/d ... show more[Thu Jan 13 18:31:58.907854 2022] [php5:error] [pid 32257] [client 2.56.57.93:53582] script '/data/web/www.crikraculum.de/xmlrpc.php' not found or unable to stat
[Thu Jan 13 18:32:00.319966 2022] [php5:error] [pid 32033] [client 2.56.57.93:55726] script '/data/web/construction/xmlrpc.php' not found or unable to stat
[Thu Jan 13 18:32:01.419548 2022] [php5:error] [pid 32640] [client 2.56.57.93:58665] script '/srv/www/roundcubemail/xmlrpc.php' not found or unable to stat show less
{"reqId":"upHef2VUDS4mkpuu36T0","level":1,"time":"2022-01-12T16:18:47+01:00","remoteAddr":"2.56.57.9 ... show more{"reqId":"upHef2VUDS4mkpuu36T0","level":1,"time":"2022-01-12T16:18:47+01:00","remoteAddr":"2.56.57.93","user":"--","app":"core","method":"GET","url":"/","message":"Trusted domain error. \"2.56.57.93\" tried to access using \"host-89.25.194.37.static.3s.pl\" as host.","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4240.193 Safari/537.36","version":"22.1.1.2"}
{"reqId":"zBsKR5YE2kIByBL63rgK","level":1,"time":"2022-01-12T16:18:47+01:00","remoteAddr":"2.56.57.93","user":"--","app":"core","method":"GET","url":"//wp-includes/wlwmanifest.xml","message":"Trusted domain error. \"2.56.57.93\" tried to access using \"host-89.25.194.37.static.3s.pl\" as host.","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4240.193 Safari/537.36","version":"22.1.1.2"}
{"reqId":"8k7EDC5x11olGxW1gHDh","level":1,"time":"2022-01-12T16:18:47+01:00","remoteAddr":"2.56.57.93","user":"--","app":"core","met
... show less
FTP Brute-ForcePort ScanHackingBrute-ForceBad Web BotWeb App AttackSSH