IP Address Inspector
67.202.49.215
This IP addresses has been seen by at least one Honey Pot. However, none of its visits have resulted in any bad events yet. It's possible that this IP is just a harmless web spider or Internet user. If you know something about this IP, please leave a comment.
Lookup IP In: Domain Tools | SpamHaus | Spamcop | SenderBase | Google Groups | Google
Geographic Location | United States |
Spider First Seen | approximately 11 years, 1 month, 3 weeks ago |
Spider Last Seen | within 11 years, 1 month, 3 weeks |
Spider Sightings | 1 visit(s) |
User-Agents | seen with 1 user-agent(s) |
4 comment(s) - Comment on this IP | Collapse All
|
I.Darbin commented...
Looking for non-existent URLs
/sf /bundles April 28 2013 01:06 PM |
J.Darlington commented...
Possible vulnerability probe; searching for seemingly innocuous CSS files could be an attempt to identify vulnerable third-party frameworks. Eight attempts, no legitimate requests. Amazon AWS IP listed at BarracudaCentral.org.
67.202.49.215 - - [09/Apr/2013:08:47:39 +0000] "GET /sf/sf_default/css/screen.css HTTP/1.1" 301 383 "-" "Go http package" 67.202.49.215 - - [09/Apr/2013:08:47:42 +0000] "GET /bundles/framework/css/exception.css HTTP/1.1" 301 390 "-" "Go http package" 67.202.49.215 - - [09/Apr/2013:08:47:45 +0000] "GET /?_format=rdf HTTP/1.1" 301 367 "-" "Go http package" April 10 2013 09:08 AM |
M.Otgaar commented...
Agree with A.World
Looking for non-existent URLs /bundles/framework/css/exception.css /sf/sf_default/css/screen.css BANNED March 24 2013 06:10 AM |
A.World commented...
Snooping for some hidden things apparently belonging to some framework. "bundles/framework/css/exception.css", "/sf/sf_default/css/screen.css", "?_format=rdf"
March 16 2013 09:49 AM |
Page generated on: April 26 2024 04:46:29 PM
Privacy Policy | Terms of Use | About Project Honey Pot | FAQ | Cloudflare Site Protection | Contact Us
Copyright © 2004–24, Unspam Technologies, Inc. All rights reserved.
Advertisements displayed on this page are not necessarily endorsed by Project Honey Pot