This IP address has been reported a total of 238
times from 58 distinct
sources.
20.163.73.138 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
[2022-09-07T00:41:38+00:00] Detected: 20.163.73.138 C1: Web Attack: GET /wp-content/
[2022-09- ... show more[2022-09-07T00:41:38+00:00] Detected: 20.163.73.138 C1: Web Attack: GET /wp-content/
[2022-09-06T21:37:02+00:00] Detected: 20.163.73.138 PHI: Web Attack: GET /wp-content/
[2022-09-06T17:32:48+00:00] Detected: 20.163.73.138 m3: Web Attack: GET /wp-content/
........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=20.163.73.138 show less
[07/Sep/2022:06:42:36 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; ... show more[07/Sep/2022:06:42:36 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[07/Sep/2022:06:42:37 -0400] \"GET /wp-content/ HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[07/Sep/2022:12:18:57 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[07/Sep/2022:12:18:57 -0400] \"GET /wp-content/ HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[07/Sep/2022:13:22:32 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[07/Sep/2022:13:22:35 -0400] \"GET /wp-content/ HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\" show less
[06/Sep/2022:14:14:05 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; ... show more[06/Sep/2022:14:14:05 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[06/Sep/2022:14:14:07 -0400] \"GET /wp-content/ HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[06/Sep/2022:20:47:08 -0400] \"GET /.env HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\"
[06/Sep/2022:20:47:10 -0400] \"GET /wp-content/ HTTP/1.1\" \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0\" show less
[WedSep0713:38:22.9850062022][:error][pid23611:tid47802950412032][client20.163.73.138:52116][client2 ... show more[WedSep0713:38:22.9850062022][:error][pid23611:tid47802950412032][client20.163.73.138:52116][client20.163.73.138]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\|boot\\\\\\\\.ini\|web.config\)\\\\\\\\b\|\(\|\^\|\\\\\\\\.\\\\\\\\.\)/etc/\|/\\\\\\\\.\(\?:history\|bash_history\|sh_history\|env\)\$\)\"atREQUEST_FILENAME.[file\"/etc/apache2/conf.d/modsec_rules/10_asl_rules.conf\"][line\"189\"][id\"390709\"][rev\"30\"][msg\"Atomicorp.comWAFRules:Attempttoaccessprotectedfileremotely\"][data\"/.env\"][severity\"CRITICAL\"][hostname\"136.243.224.53\"][uri\"/.env\"][unique_id\"YxiCrkXTkb5H1yXgBTkOfQAAAA8\"][WedSep0713:38:48.2174842022][:error][pid23776:tid47802952513280][client20.163.73.138:51311][client20.163.73.138]ModSecurity:Accessdeniedwithcode403\(phase2\).Patternmatch\"\(\?:\\\\\\\\b\(\?:\\\\\\\\.\(\?:ht\(\?:access\|passwd\|group\)\|www_\?acl\)\|global\\\\\\\\.asa\|httpd\\\\\\\\.conf\| show less