This IP address has been reported a total of 153
times from 73 distinct
sources.
52.169.24.106 was first reported on ,
and the most recent report was .
Old Reports:
The most recent abuse report for this IP address is from .
It is possible that this IP is no longer involved in abusive activities.
(apache-scanners) Failed apache-scanners trigger with match [redacted] from 52.169.24.106 (IE/Irelan ... show more(apache-scanners) Failed apache-scanners trigger with match [redacted] from 52.169.24.106 (IE/Ireland/-) show less
(mod_security) mod_security (id:210492) triggered by 52.169.24.106 (-): 1 in the last 300 secs; Port ... show more(mod_security) mod_security (id:210492) triggered by 52.169.24.106 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Oct 15 19:23:05.843489 2024] [security2:error] [pid 17786:tid 17786] [client 52.169.24.106:6953] [client 52.169.24.106] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "wp-config.php" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "pawlewicz.org"] [uri "/wp-config.php"] [unique_id "Zw75WQy_xduaMaC6iCRc-gAAAAA"] show less
Brute-ForceBad Web BotWeb App Attack
Anonymous
Bot / scanning and/or hacking attempts: GET /wp-includes/css/admin.php HTTP/1.1, GET /wp-signup.php ... show moreBot / scanning and/or hacking attempts: GET /wp-includes/css/admin.php HTTP/1.1, GET /wp-signup.php HTTP/1.1, GET /cgi-bin/index.php HTTP/1.1, GET /not_found HTTP/1.1, GET /.well-known/acme-challenge/admin.php HTTP/1.1, GET /wp-admin/css/colors/blue/blkqvmih.php HTTP/1.1, GET /.well-known/acme-challenge/index.php HTTP/1.1, GET /chosen.php HTTP/1.1, GET /wp-content/upgrade-temp-backup/about.php HTTP/1.1, GET /wp-admin/includes/xleet-shell.php HTTP/1.1, GET /.well-known/makeasmtp.php HTTP/1.1, GET /templates/hcapmaster_comps.php HTTP/1.1, GET /wp-admin/css/colors/blue/index.php HTTP/1.1, GET /wp-admin/js/autoload_classmap.php HTTP/1.1, GET /alfa-ioxi.php HTTP/1.1, GET /wp-content/upgrade/index.php HTTP/1.1, GET /config.php HTTP/1.1, GET /wp-config.php HTTP/1.1, GET /.well-known/acme-challenge/autoload_classmap.php HTTP/1.1, GET /file-manager.php HTTP/1.1, GET /moon.php HTTP/1.1, GET /.well-known/acme-challenge/ HTTP/1.1, GET /.well-known/doc.php HTTP/1.1 show less
(apache-scanners) Failed apache-scanners trigger with match [redacted] from 52.169.24.106 (IE/Irelan ... show more(apache-scanners) Failed apache-scanners trigger with match [redacted] from 52.169.24.106 (IE/Ireland/-) show less
Port Scan
Anonymous
Inappropriate script execution attempts
HackingBrute-Force
Anonymous
(apache-scanners) Failed apache-scanners trigger with match [redacted] from 52.169.24.106 (IE/Irelan ... show more(apache-scanners) Failed apache-scanners trigger with match [redacted] from 52.169.24.106 (IE/Ireland/-) show less