Scanning Landscape Report

Last updated (UTC): 2026-01-08T00:10:04Z

2026-01-08

Selector: {job="nginx"} | Pulled: 24h=2465 (truncated=False), 7d=40000 (truncated=True)
WindowRequestsUnique IPsUnique URIs
24h2465395513
7d4000042134998
Executive narrative — Scan traffic normalized: less volume, far more distributed sources; new emphasis on API/LLM endpoints and appliance-style paths

Why it matters: Even when overall volume is lower, distributed probing increases the chance that any exposed secret/config file or management endpoint is found quickly; the appearance of LLM API-shaped paths also indicates growing “AI endpoint discovery” noise that can lead to credential abuse if real services are exposed without strong authentication and rate controls.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
misc821167.43-8.03/ | /favicon.ico
files5886.33-15.41/upl.php | /1.php
env276-96.73-82.86/.env | /admin/config.php
empty2181881.82557.76 |
login119-89.19-42.19/owa/auth/logon.aspx | /core/skin/login.aspx
prefix:/v1112100.0600.0/v1/messages | /v1/chat/completions
prefix:/+cscoe+331550.0100.0/+cscoe+/logon_forms.js | /+cscoe+/transfer.js
git22100.0-50.8/.git/index | /.git/config
wp20900.0-63.54/wp-config.php.bak | /wp-config.php.old
prefix:/openai16100.0100.0/openai/v1/chat/completions | /openai/deployments/gpt-4/chat/completions?api-version=2024-02-15-preview
prefix:/v1beta14100.0100.0/v1beta/models/gemini-1.5-pro:generatecontent | /v1beta/models/gemini-1.5-flash:generatecontent

Top sources

Source24hNoteConfidence
45.88.186.0/24182Top contributing source block today but only ~7% of total volume, indicating distributed activity rather than a single dominant scanner.high
4.230.25.0/24153Consistent mid-volume contributor; no evidence in this summary of targeted exploitation vs broad probing.medium
216.180.246.0/24129Appears among top sources in both 24h and 7d views; likely part of recurring background scanning population.medium
104.234.32.0/24120Recurring contributor; distribution supports opportunistic scanning rather than coordinated single-source activity.medium
85.237.194.0/2475Lower-volume top source; indistinguishable from general scanner noise given available data.low

2026-01-07

Selector: {job="nginx"} | Pulled: 24h=20000 (truncated=True), 7d=40000 (truncated=True)
WindowRequestsUnique IPsUnique URIs
24h200004419927
7d400004734626
Executive narrative — High-volume, highly automated web checklist scanning surged and became extremely source-concentrated

Why it matters: This mix is typical of opportunistic compromise workflows: rapidly enumerate common sensitive files and backups that can directly leak credentials or configuration; even one accidental exposure can convert scanning into immediate exploitation. The extreme source concentration also makes this activity easier to block/shape at the edge, but raises the likelihood it is a single coherent scan run.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
env84385173.75367.81/api/env.zip | /.env.ts
prefix:/api336167120.0532.45/api/error.bak | /api/error.cfg
prefix:/admin330554983.33454.93/admin/backup/database.bak | /admin/backup/database.cfg
prefix:/core2696100.0249.81/core/backup/database.bak | /core/backup/database.conf
login11011151.14431.52/login | /api/login
prefix:/backup195100.0446.0/backup/database.cfg | /backup/database.conf
prefix:/proc3100.0100.0/proc/self/environ?raw%3F%3F= | /proc/self/environ
prefix:/@fs2100.0100.0/@fs/proc/self/environ?raw%3F%3F= | /@fs/..%252f..%252f..%252f..%252f..%252fproc/self/environ?raw%3F%3F=
actuator3-85.71100.0/actuator | /env

Top sources

Source24hNoteConfidence
144.91.101.0/2419873Overwhelmingly dominant source block (~99% of observed requests), consistent with a single automated scanning run; appears as the primary driver of the 24h spike.high
212.193.3.0/2443Minor contributor; no additional evidence here to link it to a distinct campaign separate from general opportunistic scanning.medium
165.154.202.0/248Low-volume background scanning presence relative to the dominant source.high
91.232.238.0/246Low-volume contributor; indistinguishable from background noise at this volume.high
147.185.133.0/246Low-volume contributor; no notable change indicated by the provided summary alone.medium

2026-01-06

Selector: {job="nginx"} | Pulled: 24h=1899 (truncated=False), 7d=29847 (truncated=False)
WindowRequestsUnique IPsUnique URIs
24h1899362338
7d2984716496873
Executive narrative — Scan volume collapsed back to baseline-like levels; secrets and legacy appliance probes remain present at low-to-moderate volume

Why it matters: Even with lower volume, opportunistic checks for high-impact misconfigurations (dotenv files, Git metadata, debug endpoints) can quickly identify and exploit accidental exposure; the day’s main security value is confirming that the prior high-volume wave has ended while keeping alerting tight on any non-404/403 responses to sensitive paths.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
misc767-94.25-68.84/ | /favicon.ico
files440-32.2-38.02/phpinfo.php | /vendor/phpunit/phpunit/src/util/php/eval-stdin.php
env160-62.7-34.73/.env | /admin/config.php
git35-44.44-57.02/.git/config | /.git/credentials
login88-33.33-24.6/login | /core/skin/login.aspx
actuator21507.3/actuator | /env
prefix:/+cscoe+2821.74-7.55/+cscoe+/logon_forms.js | /+cscoe+/transfer.js
prefix:/ecp5100100/ecp/current/exporttool/microsoft.exchange.ediscovery.exporttool.application | /ecp/current/exporttool/microsoft.exchange.ediscovery.exporttool.application

Top sources

Source24hNoteConfidence
35.222.41.0/24115Top contributing /24 today (~6% of requests); not large enough to indicate the kind of concentrated burst seen yesterday.high
216.180.246.0/2495Recurring presence also visible in 7-day top sources, consistent with ongoing opportunistic scanning infrastructure.high
207.244.227.0/2493Newly appearing in today’s top sources list; moderate volume consistent with routine scanning rather than domination.medium
157.173.115.0/2484Moderate contributor; no additional evidence in this summary to tie to a specific targeted pattern.low
152.233.20.0/2462Newly appearing in today’s top sources list; volume is modest.medium

2026-01-05

Selector: {job="nginx"} | Pulled: 24h=15567 (truncated=False), 7d=33465 (truncated=False)
WindowRequestsUnique IPsUnique URIs
24h155673705017
7d3346516697031
Executive narrative — Scan volume surged and became dominated by generic discovery plus elevated modern tooling and secrets probing

Why it matters: Even when much of the volume is generic “noise,” the concurrent rise in secret/config and dev-tooling file-path probes increases the chance that any accidental exposure (dotenv files, debug endpoints, dev servers) would be found quickly and abused.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
misc133501754.17374.12/ | /wiki
files649-30.29-12.68/phpinfo.php | /info.php
env42955.4347.5/admin/config.php | /.env
prefix:/@fs232100.0366.67/@fs/etc/passwd?import= | /@fs/.docker.env?import=
wp16970.71136.6/wp-config.php.bak | /wordpress
prefix:/.well-known59100.0380.23/.well-known/caldav | /.well-known/ashrae
git63-1.56-34.18/.git/objects | /.git/index
prefix:/oauth12100.0100.0/oauth/device/code | /oauth/revoke
phpmyadmin12100.0100.0/phpmyadmin | /phpmyadmin2
prefix:/swagger9100.0100.0/swagger/v1/swagger.json | /swagger/v2/swagger.json

Top sources

Source24hNoteConfidence
13.59.55.0/244743Largest contributing source block (~30% of all 24h requests), suggesting concentrated scanner infrastructure rather than evenly distributed background traffic.high
54.234.91.0/244198Second-largest contributor (~27%); alongside the top /24s, indicates a small set of sources driving most of today’s volume.high
54.175.183.0/244006Third-largest contributor (~26%); top three /24s together account for ~83% of requests, consistent with a scanning burst from limited infrastructure.high
185.177.72.0/24596Moderate-volume contributor; appears in both 24h and 7d lists, consistent with recurring opportunistic scanning presence.medium
4.194.66.0/24121Newly appearing in top sources; volume is small relative to the dominant three /24s and likely part of rotating scanner blocks.medium

2026-01-04

Selector: {job="nginx"} | Pulled: 24h=2741 (truncated=False), 7d=20982 (truncated=False)
WindowRequestsUnique IPsUnique URIs
24h2741349730
7d2098216792879
Executive narrative — Scanning volume stayed steady, but probing broadened and shifted toward WordPress and modern dev-server file read patterns

Why it matters: The dominant activity remains misconfiguration hunting (secrets, exposed repos, debug/admin panels). The increased WordPress and “/@fs” probing matters because both are commonly automated “quick win” checks that can lead to credential theft or file disclosure if anything is mispublished or misrouted to production.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
files93142.1425.11/alive.php | /phpinfo.php
misc720-11.87-31.21/ | /favicon.ico
env2766.15-9.21/.env | /admin/config.php
prefix:/@fs116100.0600.0/@fs/etc/passwd?import= | /@fs/.docker.env?import=
wp99725.031.0/wp-config.php.bak | /wp-content/w3tc-config/master-preview.php
git64-38.46-27.04/.git/config | /.github/workflows/build.yaml
prefix:/manager11100.0100.0/manager/html | /manager/html
prefix:/.aws7100.0100.0/.aws/credentials | /.aws/credentials.gpg

Top sources

Source24hNoteConfidence
185.177.72.0/24298Largest contributing /24 (~10.9% of requests). Concentrated contribution suggests a more active scanner block, but not singularly dominant.medium
4.230.24.0/24170High-volume contributor; without per-source URI breakdown, treat as general scanning traffic.low
4.197.161.0/24170High-volume contributor; appears as part of rotating infrastructure typical of opportunistic scanning.low
4.197.192.0/24161High-volume contributor; similar magnitude to other top /24s, consistent with distributed probing.low
129.212.189.0/24102Newly appearing in today’s top sources list; moderate volume consistent with rotating scanner blocks.medium

2026-01-03

Selector: {job="nginx"} | Pulled: 24h=2565 (truncated=False), 7d=17868 (truncated=False)
WindowRequestsUnique IPsUnique URIs
24h2565372446
7d1786815442603
Executive narrative — Opportunistic scanning remains steady; emphasis shifted to secret/config exposure checks (.env) while prior phpunit-heavy probing cooled

Why it matters: The dominant probes focus on high-impact misconfigurations—exposed secrets (.env), exposed repository metadata (.git), and web-accessible vendor tooling (phpunit paths)—which can enable rapid credential theft or remote code execution if any endpoint returns something other than an error.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
env260150.0-2.57/.env | /admin/config.php
files655-24.87.58/vendor/phpunit/phpunit/src/util/php/eval-stdin.php | /index.php
git104-14.0531.17/.git/config | /.github/workflows/build.yaml
login12229.7911.78/core/skin/login.aspx | /owa/auth/logon.aspx
prefix:/sdk23109.0917.52/sdk/weblanguage | /sdk/weblanguage
cgi-bin2066.671.45/cgi-bin/authlogin.cgi | /cgi-bin/main.pl

Top sources

Source24hNoteConfidence
172.232.9.0/24318Largest contributing /24 (~12% of all requests). Concentration suggests one more active scanner block in an otherwise distributed set of sources.medium
178.128.49.0/24102Newly appearing in the top list today per novelty; consistent with rotating opportunistic scanner infrastructure.medium
165.227.216.0/24102Newly appearing in the top list today per novelty; volume is moderate and not singularly dominant.medium
103.40.61.0/2493Moderate contributor; without per-source URI attribution, treat as general probing activity.low
147.93.154.0/2447Newly appearing in the top list today per novelty; low-to-moderate volume consistent with distributed scans.low

2026-01-02

Selector: {job="nginx"} | Pulled: 24h=2613 (truncated=False), 7d=15655 (truncated=False)
WindowRequestsUnique IPsUnique URIs
24h2613418635
7d1565513582550
Executive narrative — Opportunistic scanning steady; biggest shift is a surge in exposed-file and legacy PHP (phpunit) probing, with a more distributed source mix than yesterday

Why it matters: The dominant request families map to high-impact misconfigurations (exposed .git, exposed secrets like .env, and web-accessible vendor tooling such as phpunit) plus management surfaces (Actuator/Tomcat/Docker). These are commonly used as fast “yes/no” checks for follow-on compromise when misconfigurations exist.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
files87185.3266.27/vendor/phpunit/phpunit/src/util/php/eval-stdin.php | /vendor/phpunit/phpunit/util/php/eval-stdin.php
git1210.8387.39/.git/config | /.git/config
env10415.56-54.81/.env | /.env.production
actuator35118.75140.2/actuator | /actuator/mappings
prefix:/containers133068.52/containers/json | /containers/json
prefix:/manager10100100/manager/text/list | /manager/text/list

Top sources

Source24hNoteConfidence
52.178.176.0/24173Largest contributing /24 today; volume is elevated but not dominant, consistent with distributed opportunistic scanning.medium
172.161.148.0/24151Second-largest /24 today; contributes to the more distributed top-source profile vs yesterday.medium
103.232.121.0/2492New top source today per novelty list; activity fits general probing patterns in this dataset.medium
157.173.115.0/2484New top source today per novelty list; moderate volume with no single-family attribution provided in summary.low
157.230.187.0/2484New top source today per novelty list; recurring cloud-hosted scanning is plausible but not provable from /24 alone.low

2026-01-01

Selector: {job="nginx"} | Pulled: 24h=2638 (truncated=False), 7d=14222 (truncated=False)
WindowRequestsUnique IPsUnique URIs
24h2638399693
7d1422212802260
Executive narrative — Opportunistic web scanning remains steady; strongest signal is repeated secret-file and source-control exposure probing

Why it matters: These requests map to well-known high-impact misconfigurations (exposed Git metadata, leaked environment files, and exposed framework diagnostics/admin endpoints) that can enable credential leakage or remote code execution when present; even if the honeypot is not vulnerable, the pattern indicates what attackers are currently hunting at scale.

Changes since yesterday:

Technical narrative

Key observations:

Top URI families

Family24hΔ vs prev24h %Δ vs 7d baseline %Examples
git12415.89118.64/.git/config | /.git/index
files551-25.0326.96/vendor/phpunit/phpunit/src/util/php/eval-stdin.php | /vendor/phpunit/phpunit/util/php/eval-stdin.php
env89-72.7-59.96/.env | /config.zip
actuator3447.83155.91/actuator/gateway/routes | /actuator
prefix:/+cscoe+29-3.3346.04/+cscoe+/logon.html | /+cscoe+/logon_forms.js
prefix:/manager10100.0100.0/manager/text/list | /manager/text/list

Top sources

Source24hNoteConfidence
195.178.110.0/24507Dominant source segment (~19.2% of 24h requests), consistent with a single heavy scanner or concentrated infrastructure.high
217.60.236.0/2492New top source today per novelty list; moderate volume relative to the leading source.medium
109.105.210.0/2481New top source today per novelty list; activity appears consistent with general web probing.medium
216.180.246.0/2480Also present as a top source over 7 days; likely recurring scanner infrastructure.high
206.189.82.0/2446Shows malformed/empty-URI POSTs in samples (status 400), suggesting generic probing or tooling errors rather than targeted exploitation.medium