User mrb2202 joined AbuseIPDB in November 2022 and has reported 23 IP addresses.

Standing (weight) is good.

INACTIVE USER
IP Date Comment Categories
46.232.41.141
Web App Attack
5.161.214.153
/storage/logs/debug.log
/config/php.ini
Web App Attack
194.233.85.101
Web App Attack
79.110.62.169
/vendor/.env
/config/.env
/back/.env.production
Web App Attack
143.198.94.84
Web App Attack
185.209.196.227
Web App Attack
216.105.168.26
Web App Attack
137.220.197.141
/e/ViewImg/index.html
Web App Attack
137.220.197.141
Web App Attack
206.81.0.176
Web App Attack
51.15.16.66
/status%3E%3Cscript%3Ealert(31337)%3C%2Fscript%3E
/__nuxt_error
Web App Attack
162.240.159.247
specific dns-based urls: e.g. /myplant.io/error.log
Web Spam SQL Injection Web App Attack
194.61.120.40
/scripts/unlock_tasks.php
Brute-Force Web App Attack
38.60.146.109
uri example: /wp-content/plugins/phpfreechat/lib/csstidy-1.2/css_optimiser.php
SQL Injection Web App Attack
191.101.3.75
httpRequest.uri: /servlets/OmaDsServlet
SQL Injection Web App Attack
64.252.105.108
/admin/ajax/avatar.php?id=-1+union+select+md5(999999999)%23
SQL Injection Web App Attack
194.59.165.249
SQL Injection Web App Attack
191.101.3.75
httpRequest.uri: /%3Cscript%3Ealert(document.domain)%3C/script%3E
Web App Attack
223.190.87.229
httpRequest.args: search==%00{.exec|cmd.exe+/c+ping+127.0.0.1+-n+10.}
SQL Injection Web App Attack
122.161.91.49
/cpanelwebcall/%3Cimg%20src=x%20onerror=%22prompt%28document.domain%29%22%3Eaaaaaaaaaaaa
Web App Attack
179.43.133.139
DNS-targeted web scan
Brute-Force Web App Attack
77.243.183.168
re-occurring scans from this IP against our domains
SQL Injection Brute-Force Web App Attack
37.120.148.139
nmap scan against various endpoints of our company
Web App Attack