Scanning Landscape Report
Last updated (UTC): 2026-01-08T00:10:04Z
2026-01-08
Selector: {job="nginx"} | Pulled: 24h=2465 (truncated=False), 7d=40000 (truncated=True)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 2465 | 395 | 513 |
| 7d | 40000 | 421 | 34998 |
Executive narrative — Scan traffic normalized: less volume, far more distributed sources; new emphasis on API/LLM endpoints and appliance-style paths
- Total requests dropped sharply versus yesterday’s single-scanner surge, while unique source IPs increased substantially—consistent with a return to broad background scanning rather than one dominant scan run.
- Top activity centered on generic probing (/, favicon, robots) plus sensitive-file checks (/.env, /.git) and a small but notable cluster of API-style LLM endpoints (/v1/*, /openai/*, /v1beta/*).
- Several new low-volume families appeared (containers API, Spring Actuator, /proc checks, and appliance-style +cscoe/+cscol paths), suggesting multiple opportunistic scanners with different checklists.
Why it matters: Even when overall volume is lower, distributed probing increases the chance that any exposed secret/config file or management endpoint is found quickly; the appearance of LLM API-shaped paths also indicates growing “AI endpoint discovery” noise that can lead to credential abuse if real services are exposed without strong authentication and rate controls.
Changes since yesterday:
- Request volume fell from 20,000 to 2,465 and unique IPs rose from 44 to 395, indicating scanning became much less source-concentrated (confidence: high).
- Secrets/config probing via /.env remains present but is dramatically reduced compared to yesterday’s checklist sweep (confidence: high).
- Newly visible families include /v1* and /openai* LLM-style routes, /v1beta/* (Gemini-style), plus multiple management/infra probes (containers API, Actuator, /proc) at low volumes (confidence: medium).
Technical narrative
Key observations:
- Today’s 24h window shows lower total volume but higher source diversity, aligning with mixed opportunistic scanners rather than a single dominant enumerator (24h: 2,465 requests; 395 unique IPs).
- URI mix includes (a) baseline web noise (/, /favicon.ico, /robots.txt), (b) sensitive artifact hunting (/.env, /.git/config), (c) login surface discovery (/core/skin/login.aspx, /owa/auth/logon.aspx), and (d) new API/LLM-shaped endpoints (/v1/chat/completions, /openai/v1/chat/completions, /v1beta/models/*:generatecontent).
- A small set of appliance/enterprise gateway style asset paths (+cscoe/+cscol) appeared, which are distinct from typical webapp file/backup checks and may reflect separate scanner tooling or fingerprinting lists.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| misc | 821 | 167.43 | -8.03 | / | /favicon.ico |
| files | 588 | 6.33 | -15.41 | /upl.php | /1.php |
| env | 276 | -96.73 | -82.86 | /.env | /admin/config.php |
| empty | 218 | 1881.82 | 557.76 | | |
| login | 119 | -89.19 | -42.19 | /owa/auth/logon.aspx | /core/skin/login.aspx |
| prefix:/v1 | 112 | 100.0 | 600.0 | /v1/messages | /v1/chat/completions |
| prefix:/+cscoe+ | 33 | 1550.0 | 100.0 | /+cscoe+/logon_forms.js | /+cscoe+/transfer.js |
| git | 22 | 100.0 | -50.8 | /.git/index | /.git/config |
| wp | 20 | 900.0 | -63.54 | /wp-config.php.bak | /wp-config.php.old |
| prefix:/openai | 16 | 100.0 | 100.0 | /openai/v1/chat/completions | /openai/deployments/gpt-4/chat/completions?api-version=2024-02-15-preview |
| prefix:/v1beta | 14 | 100.0 | 100.0 | /v1beta/models/gemini-1.5-pro:generatecontent | /v1beta/models/gemini-1.5-flash:generatecontent |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 45.88.186.0/24 | 182 | Top contributing source block today but only ~7% of total volume, indicating distributed activity rather than a single dominant scanner. | high |
| 4.230.25.0/24 | 153 | Consistent mid-volume contributor; no evidence in this summary of targeted exploitation vs broad probing. | medium |
| 216.180.246.0/24 | 129 | Appears among top sources in both 24h and 7d views; likely part of recurring background scanning population. | medium |
| 104.234.32.0/24 | 120 | Recurring contributor; distribution supports opportunistic scanning rather than coordinated single-source activity. | medium |
| 85.237.194.0/24 | 75 | Lower-volume top source; indistinguishable from general scanner noise given available data. | low |
2026-01-07
Selector: {job="nginx"} | Pulled: 24h=20000 (truncated=True), 7d=40000 (truncated=True)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 20000 | 44 | 19927 |
| 7d | 40000 | 47 | 34626 |
Executive narrative — High-volume, highly automated web checklist scanning surged and became extremely source-concentrated
- Request volume spiked sharply (20,000 vs 1,899 yesterday) while the scanner attempted an unusually wide set of unique URIs (19,927), consistent with automated dictionary/checklist probing.
- Traffic was overwhelmingly dominated by a single source block (144.91.101.0/24 contributed 19,873 requests), suggesting one primary scanning node/infrastructure rather than broadly distributed background noise.
- Most probes focused on high-impact misconfiguration artifacts (dotenv/secrets, backup/config files under /api, /admin, /core, /backup) plus a smaller set of technology fingerprints (Spring Actuator, Citrix-like asset paths, and local file disclosure attempts).
Why it matters: This mix is typical of opportunistic compromise workflows: rapidly enumerate common sensitive files and backups that can directly leak credentials or configuration; even one accidental exposure can convert scanning into immediate exploitation. The extreme source concentration also makes this activity easier to block/shape at the edge, but raises the likelihood it is a single coherent scan run.
Changes since yesterday:
- Requests increased from 1,899 to 20,000 and unique URIs from 338 to 19,927, indicating a return to (and exceeding) the prior broad enumeration behavior rather than the quieter mix seen yesterday (confidence: high).
- A single /24 (144.91.101.0/24) newly dominates traffic (~99% of requests), replacing yesterday’s more distributed top sources (confidence: high).
- New low-volume probe families appeared (e.g., /proc/self/environ and /@fs/ traversal-style paths, /var/log and /nginx log paths, .idea metadata) consistent with generic “exposed file” and “local file read” checklists (confidence: medium).
Technical narrative
Key observations:
- The dataset is truncated at 20,000 events for the last 24h and 40,000 for 7d; the true volume may be higher, but the observed distribution is already strongly dominated by one source block and several sensitive-file families.
- URI diversity is extremely high (19,927 unique URIs in 24h) while only 44 unique IPs were observed, aligning with a scripted scan cycling through many filenames/paths rather than organic browsing.
- Top families center on secrets/backups and admin-area artifacts: env/dotenv variants plus repeated backup/config extensions (e.g., .bak/.cfg/.conf) under /api, /admin, /core, and /backup.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| env | 8438 | 5173.75 | 367.81 | /api/env.zip | /.env.ts |
| prefix:/api | 3361 | 67120.0 | 532.45 | /api/error.bak | /api/error.cfg |
| prefix:/admin | 3305 | 54983.33 | 454.93 | /admin/backup/database.bak | /admin/backup/database.cfg |
| prefix:/core | 2696 | 100.0 | 249.81 | /core/backup/database.bak | /core/backup/database.conf |
| login | 1101 | 1151.14 | 431.52 | /login | /api/login |
| prefix:/backup | 195 | 100.0 | 446.0 | /backup/database.cfg | /backup/database.conf |
| prefix:/proc | 3 | 100.0 | 100.0 | /proc/self/environ?raw%3F%3F= | /proc/self/environ |
| prefix:/@fs | 2 | 100.0 | 100.0 | /@fs/proc/self/environ?raw%3F%3F= | /@fs/..%252f..%252f..%252f..%252f..%252fproc/self/environ?raw%3F%3F= |
| actuator | 3 | -85.71 | 100.0 | /actuator | /env |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 144.91.101.0/24 | 19873 | Overwhelmingly dominant source block (~99% of observed requests), consistent with a single automated scanning run; appears as the primary driver of the 24h spike. | high |
| 212.193.3.0/24 | 43 | Minor contributor; no additional evidence here to link it to a distinct campaign separate from general opportunistic scanning. | medium |
| 165.154.202.0/24 | 8 | Low-volume background scanning presence relative to the dominant source. | high |
| 91.232.238.0/24 | 6 | Low-volume contributor; indistinguishable from background noise at this volume. | high |
| 147.185.133.0/24 | 6 | Low-volume contributor; no notable change indicated by the provided summary alone. | medium |
2026-01-06
Selector: {job="nginx"} | Pulled: 24h=1899 (truncated=False), 7d=29847 (truncated=False)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 1899 | 362 | 338 |
| 7d | 29847 | 1649 | 6873 |
Executive narrative — Scan volume collapsed back to baseline-like levels; secrets and legacy appliance probes remain present at low-to-moderate volume
- Total requests dropped sharply vs yesterday (1,899 vs 15,567), and URI diversity also fell (338 vs 5,017), indicating the prior broad enumeration burst has subsided.
- The remaining activity is dominated by generic liveness/fingerprinting plus continued opportunistic probing for exposed secrets and source control (/.env, /.git).
- A small set of low-volume, technology-specific probes appeared (Exchange ECP export tool path, GPON form, /+cscoe+/ and /+cscol+/ paths), but counts are too small to indicate a focused campaign by themselves.
Why it matters: Even with lower volume, opportunistic checks for high-impact misconfigurations (dotenv files, Git metadata, debug endpoints) can quickly identify and exploit accidental exposure; the day’s main security value is confirming that the prior high-volume wave has ended while keeping alerting tight on any non-404/403 responses to sensitive paths.
Changes since yesterday:
- Requests decreased ~88% (15,567 -> 1,899) and unique URIs decreased ~93% (5,017 -> 338), consistent with the end of a broad checklist scan burst (confidence: high).
- Secrets/config probing fell materially (env family down ~63% vs yesterday), but remains a notable share of remaining traffic (confidence: high).
- New low-volume URI families appeared in today’s top set: /ecp/* (Exchange), /gponform/* (GPON/ONT admin pattern), /portal/redlion (industrial/OT portal naming), and /bin/* archives (confidence: medium).
Technical narrative
Key observations:
- Telemetry shows a reversion from yesterday’s high-volume, high-diversity enumeration to a smaller, more typical mix of liveness checks (/, /favicon.ico, /robots.txt) plus opportunistic misconfiguration probing (/.env, /.git/config, phpinfo/test endpoints).
- Source concentration changed: yesterday’s dominant 7-day top source blocks (e.g., the large AWS-associated /24s in the 7d list) are not today’s top sources; today’s top /24s are different and each contributes <7% of total requests, which looks more like distributed background scanning than a single concentrated burst.
- Several technology-specific probes cluster around known patterns: Spring Boot Actuator (/actuator, /env), exposed Git metadata (/.git/*), legacy/enterprise login surfaces (/core/skin/login.aspx), and appliance-style paths (cgi-bin/*, /gponform/*), but volumes are small and mostly consistent with opportunistic scanning.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| misc | 767 | -94.25 | -68.84 | / | /favicon.ico |
| files | 440 | -32.2 | -38.02 | /phpinfo.php | /vendor/phpunit/phpunit/src/util/php/eval-stdin.php |
| env | 160 | -62.7 | -34.73 | /.env | /admin/config.php |
| git | 35 | -44.44 | -57.02 | /.git/config | /.git/credentials |
| login | 88 | -33.33 | -24.6 | /login | /core/skin/login.aspx |
| actuator | 21 | 50 | 7.3 | /actuator | /env |
| prefix:/+cscoe+ | 28 | 21.74 | -7.55 | /+cscoe+/logon_forms.js | /+cscoe+/transfer.js |
| prefix:/ecp | 5 | 100 | 100 | /ecp/current/exporttool/microsoft.exchange.ediscovery.exporttool.application | /ecp/current/exporttool/microsoft.exchange.ediscovery.exporttool.application |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 35.222.41.0/24 | 115 | Top contributing /24 today (~6% of requests); not large enough to indicate the kind of concentrated burst seen yesterday. | high |
| 216.180.246.0/24 | 95 | Recurring presence also visible in 7-day top sources, consistent with ongoing opportunistic scanning infrastructure. | high |
| 207.244.227.0/24 | 93 | Newly appearing in today’s top sources list; moderate volume consistent with routine scanning rather than domination. | medium |
| 157.173.115.0/24 | 84 | Moderate contributor; no additional evidence in this summary to tie to a specific targeted pattern. | low |
| 152.233.20.0/24 | 62 | Newly appearing in today’s top sources list; volume is modest. | medium |
2026-01-05
Selector: {job="nginx"} | Pulled: 24h=15567 (truncated=False), 7d=33465 (truncated=False)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 15567 | 370 | 5017 |
| 7d | 33465 | 1669 | 7031 |
Executive narrative — Scan volume surged and became dominated by generic discovery plus elevated modern tooling and secrets probing
- Request volume jumped sharply in the last 24h (15,567 vs 2,741 yesterday), driven mostly by generic liveness/fingerprinting traffic and broad enumeration.
- Several higher-signal misconfiguration families also increased, including secret/config file probing (e.g., /.env) and dev-tooling style local file path checks under /@fs/.
- Top traffic came from a small set of source /24s contributing a majority of requests, consistent with concentrated scanning infrastructure rather than organic browsing.
Why it matters: Even when much of the volume is generic “noise,” the concurrent rise in secret/config and dev-tooling file-path probes increases the chance that any accidental exposure (dotenv files, debug endpoints, dev servers) would be found quickly and abused.
Changes since yesterday:
- Total requests increased ~5.7x day-over-day (15,567 vs 2,741), with a large increase in generic “misc” URIs.
- /@fs/*?import= probing doubled again and is far above 7-day baseline, consistent with active dev-server/tooling exposure checks.
- New low-volume URI families appeared in the top set (phpMyAdmin, OAuth endpoints, Swagger/OpenAPI docs), indicating broader technology fingerprinting.
Technical narrative
Key observations:
- Volume and URI diversity expanded substantially (5,017 unique URIs in 24h vs 730 yesterday), indicating wide checklist-style enumeration rather than a narrow single-path probe.
- The largest counted family is “misc” (13,350 requests; +1,754% vs yesterday), which typically reflects liveness and fingerprinting (/, /favicon.ico, /robots.txt) and can inflate totals without indicating successful exploitation.
- Multiple technology-targeted families increased simultaneously (env, wp, /@fs, .well-known, swagger/v2/v1, oauth, phpmyadmin), consistent with opportunistic scanners rotating broad fingerprints.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| misc | 13350 | 1754.17 | 374.12 | / | /wiki |
| files | 649 | -30.29 | -12.68 | /phpinfo.php | /info.php |
| env | 429 | 55.43 | 47.5 | /admin/config.php | /.env |
| prefix:/@fs | 232 | 100.0 | 366.67 | /@fs/etc/passwd?import= | /@fs/.docker.env?import= |
| wp | 169 | 70.71 | 136.6 | /wp-config.php.bak | /wordpress |
| prefix:/.well-known | 59 | 100.0 | 380.23 | /.well-known/caldav | /.well-known/ashrae |
| git | 63 | -1.56 | -34.18 | /.git/objects | /.git/index |
| prefix:/oauth | 12 | 100.0 | 100.0 | /oauth/device/code | /oauth/revoke |
| phpmyadmin | 12 | 100.0 | 100.0 | /phpmyadmin | /phpmyadmin2 |
| prefix:/swagger | 9 | 100.0 | 100.0 | /swagger/v1/swagger.json | /swagger/v2/swagger.json |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 13.59.55.0/24 | 4743 | Largest contributing source block (~30% of all 24h requests), suggesting concentrated scanner infrastructure rather than evenly distributed background traffic. | high |
| 54.234.91.0/24 | 4198 | Second-largest contributor (~27%); alongside the top /24s, indicates a small set of sources driving most of today’s volume. | high |
| 54.175.183.0/24 | 4006 | Third-largest contributor (~26%); top three /24s together account for ~83% of requests, consistent with a scanning burst from limited infrastructure. | high |
| 185.177.72.0/24 | 596 | Moderate-volume contributor; appears in both 24h and 7d lists, consistent with recurring opportunistic scanning presence. | medium |
| 4.194.66.0/24 | 121 | Newly appearing in top sources; volume is small relative to the dominant three /24s and likely part of rotating scanner blocks. | medium |
2026-01-04
Selector: {job="nginx"} | Pulled: 24h=2741 (truncated=False), 7d=20982 (truncated=False)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 2741 | 349 | 730 |
| 7d | 20982 | 1679 | 2879 |
Executive narrative — Scanning volume stayed steady, but probing broadened and shifted toward WordPress and modern dev-server file read patterns
- Overall request volume remained in the same range as yesterday (2741 vs 2565), consistent with ongoing opportunistic internet scanning.
- Two standouts in the last 24h were a sharp rise in WordPress-related probes and a new spike in “/@fs/*?import=” paths consistent with Vite/Node dev-server style local-file read checks.
- Several new low-volume but high-signal families appeared (e.g., Tomcat manager, AWS credentials file paths), indicating broader misconfiguration/credential-hunting checklists in rotation.
Why it matters: The dominant activity remains misconfiguration hunting (secrets, exposed repos, debug/admin panels). The increased WordPress and “/@fs” probing matters because both are commonly automated “quick win” checks that can lead to credential theft or file disclosure if anything is mispublished or misrouted to production.
Changes since yesterday:
- WordPress probing spiked sharply (+725% day-over-day), suggesting a scanner wave emphasizing WP file and plugin/config exposure paths.
- New and pronounced increase in “/@fs/*?import=” requests (up 100% vs yesterday; far above 7-day baseline), consistent with modern tooling/dev-server LFI-style probes.
- Top source blocks rotated; today’s leading /24 contributed ~11% of all requests, but no single source dominated traffic.
Technical narrative
Key observations:
- Traffic volume is steady, but URI diversity increased materially vs yesterday (730 unique URIs vs 446), indicating broader enumeration lists rather than a narrow single-CVE focus.
- High-impact misconfiguration checks remain prominent: dotenv/secret file probing (/.env), VCS metadata (/.git/config), and common debug/test PHP endpoints (phpinfo.php, test.php, php.php).
- Two clusters stand out as “newer” relative to recent baseline: the “/@fs/…?import=” prefix spike and the WordPress family surge; both look like automated list-based probing rather than interactive exploitation, based on breadth and low per-URI counts.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| files | 931 | 42.14 | 25.11 | /alive.php | /phpinfo.php |
| misc | 720 | -11.87 | -31.21 | / | /favicon.ico |
| env | 276 | 6.15 | -9.21 | /.env | /admin/config.php |
| prefix:/@fs | 116 | 100.0 | 600.0 | /@fs/etc/passwd?import= | /@fs/.docker.env?import= |
| wp | 99 | 725.0 | 31.0 | /wp-config.php.bak | /wp-content/w3tc-config/master-preview.php |
| git | 64 | -38.46 | -27.04 | /.git/config | /.github/workflows/build.yaml |
| prefix:/manager | 11 | 100.0 | 100.0 | /manager/html | /manager/html |
| prefix:/.aws | 7 | 100.0 | 100.0 | /.aws/credentials | /.aws/credentials.gpg |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 185.177.72.0/24 | 298 | Largest contributing /24 (~10.9% of requests). Concentrated contribution suggests a more active scanner block, but not singularly dominant. | medium |
| 4.230.24.0/24 | 170 | High-volume contributor; without per-source URI breakdown, treat as general scanning traffic. | low |
| 4.197.161.0/24 | 170 | High-volume contributor; appears as part of rotating infrastructure typical of opportunistic scanning. | low |
| 4.197.192.0/24 | 161 | High-volume contributor; similar magnitude to other top /24s, consistent with distributed probing. | low |
| 129.212.189.0/24 | 102 | Newly appearing in today’s top sources list; moderate volume consistent with rotating scanner blocks. | medium |
2026-01-03
Selector: {job="nginx"} | Pulled: 24h=2565 (truncated=False), 7d=17868 (truncated=False)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 2565 | 372 | 446 |
| 7d | 17868 | 1544 | 2603 |
Executive narrative — Opportunistic scanning remains steady; emphasis shifted to secret/config exposure checks (.env) while prior phpunit-heavy probing cooled
- Overall traffic volume stayed essentially flat vs yesterday (2565 vs 2613 requests), consistent with ongoing background internet scanning.
- The largest day-over-day change is a sharp increase in “env” probing (e.g., /.env and config files), while exposed-file probing as a whole decreased.
- Top sources rotated again, with a single /24 contributing ~12% of all requests, suggesting a mix of distributed noise plus one more active scanner block.
Why it matters: The dominant probes focus on high-impact misconfigurations—exposed secrets (.env), exposed repository metadata (.git), and web-accessible vendor tooling (phpunit paths)—which can enable rapid credential theft or remote code execution if any endpoint returns something other than an error.
Changes since yesterday:
- “env” family increased substantially (+150% vs yesterday) and is near its 7-day norm (slightly below baseline).
- “files” family decreased materially (-24.8% vs yesterday), indicating the prior exposed-file/phpunit-heavy mix cooled.
- Multiple small, newly observed path-prefix families appeared (/assets, /static, /css, /portal), indicating broader enumeration lists being exercised (low volume).
Technical narrative
Key observations:
- Traffic composition remains dominated by generic discovery plus misconfiguration checks: “/” (537), /.git/config (86), /.env (72), and multiple phpunit eval-stdin path permutations (14–15 each).
- Day-over-day mix shifted: “env” rose sharply while “files” and “misc” declined, suggesting scanner campaigns rotated rather than overall volume changing.
- Some management/admin surface probing is present and increased vs yesterday in small families (e.g., /api*, /sdk*, cgi-bin), but volumes remain small relative to total requests.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| env | 260 | 150.0 | -2.57 | /.env | /admin/config.php |
| files | 655 | -24.8 | 7.58 | /vendor/phpunit/phpunit/src/util/php/eval-stdin.php | /index.php |
| git | 104 | -14.05 | 31.17 | /.git/config | /.github/workflows/build.yaml |
| login | 122 | 29.79 | 11.78 | /core/skin/login.aspx | /owa/auth/logon.aspx |
| prefix:/sdk | 23 | 109.09 | 17.52 | /sdk/weblanguage | /sdk/weblanguage |
| cgi-bin | 20 | 66.67 | 1.45 | /cgi-bin/authlogin.cgi | /cgi-bin/main.pl |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 172.232.9.0/24 | 318 | Largest contributing /24 (~12% of all requests). Concentration suggests one more active scanner block in an otherwise distributed set of sources. | medium |
| 178.128.49.0/24 | 102 | Newly appearing in the top list today per novelty; consistent with rotating opportunistic scanner infrastructure. | medium |
| 165.227.216.0/24 | 102 | Newly appearing in the top list today per novelty; volume is moderate and not singularly dominant. | medium |
| 103.40.61.0/24 | 93 | Moderate contributor; without per-source URI attribution, treat as general probing activity. | low |
| 147.93.154.0/24 | 47 | Newly appearing in the top list today per novelty; low-to-moderate volume consistent with distributed scans. | low |
2026-01-02
Selector: {job="nginx"} | Pulled: 24h=2613 (truncated=False), 7d=15655 (truncated=False)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 2613 | 418 | 635 |
| 7d | 15655 | 1358 | 2550 |
Executive narrative — Opportunistic scanning steady; biggest shift is a surge in exposed-file and legacy PHP (phpunit) probing, with a more distributed source mix than yesterday
- Overall request volume stayed flat vs yesterday (2613 vs 2638), but scanning emphasis shifted toward exposed files (notably phpunit eval-stdin variants) and Git metadata checks.
- Several management/admin surface probes increased vs baseline (Spring Actuator, Docker API /containers/json, Tomcat manager), but remain small in absolute volume.
- Top traffic sources changed materially: yesterday’s single dominant source is no longer present in today’s top list, and activity appears spread across multiple /24s.
Why it matters: The dominant request families map to high-impact misconfigurations (exposed .git, exposed secrets like .env, and web-accessible vendor tooling such as phpunit) plus management surfaces (Actuator/Tomcat/Docker). These are commonly used as fast “yes/no” checks for follow-on compromise when misconfigurations exist.
Changes since yesterday:
- “files” family spiked sharply (+85.32% vs yesterday; +66.27% vs 7-day baseline), driven by repeated phpunit eval-stdin path variants.
- New low-volume families appeared (prefix:/manager, prefix:/druid, prefix:/epa, prefix:/bin), consistent with broadened endpoint enumeration rather than a single-technology focus.
- Top sources rotated: new /24s lead today (52.178.176.0/24, 172.161.148.0/24), and yesterday’s dominant source (195.178.110.0/24) is absent from today’s top list.
Technical narrative
Key observations:
- URI mix is dominated by opportunistic exposure checks and enumeration: /.git/config (121), /.env (71), and multiple phpunit eval-stdin variants (12 each), alongside generic “/” (567) and commodity discovery paths (robots.txt, favicon.ico).
- Compared to yesterday, scanning volume is similar but redistributed: the “files” family increased substantially while “misc” decreased (misc -41.18% vs yesterday). This suggests scanner campaign mix changed even though total traffic did not.
- Management/admin probing is elevated vs 7-day baseline in several small families (actuator +140.2%, /containers +68.52%, /manager new), but counts are low enough that this presently resembles broad opportunistic coverage rather than a focused attack.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| files | 871 | 85.32 | 66.27 | /vendor/phpunit/phpunit/src/util/php/eval-stdin.php | /vendor/phpunit/phpunit/util/php/eval-stdin.php |
| git | 121 | 0.83 | 87.39 | /.git/config | /.git/config |
| env | 104 | 15.56 | -54.81 | /.env | /.env.production |
| actuator | 35 | 118.75 | 140.2 | /actuator | /actuator/mappings |
| prefix:/containers | 13 | 30 | 68.52 | /containers/json | /containers/json |
| prefix:/manager | 10 | 100 | 100 | /manager/text/list | /manager/text/list |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 52.178.176.0/24 | 173 | Largest contributing /24 today; volume is elevated but not dominant, consistent with distributed opportunistic scanning. | medium |
| 172.161.148.0/24 | 151 | Second-largest /24 today; contributes to the more distributed top-source profile vs yesterday. | medium |
| 103.232.121.0/24 | 92 | New top source today per novelty list; activity fits general probing patterns in this dataset. | medium |
| 157.173.115.0/24 | 84 | New top source today per novelty list; moderate volume with no single-family attribution provided in summary. | low |
| 157.230.187.0/24 | 84 | New top source today per novelty list; recurring cloud-hosted scanning is plausible but not provable from /24 alone. | low |
2026-01-01
Selector: {job="nginx"} | Pulled: 24h=2638 (truncated=False), 7d=14222 (truncated=False)
| Window | Requests | Unique IPs | Unique URIs |
| 24h | 2638 | 399 | 693 |
| 7d | 14222 | 1280 | 2260 |
Executive narrative — Opportunistic web scanning remains steady; strongest signal is repeated secret-file and source-control exposure probing
- Most activity matches broad, automated probing for exposed files and common admin endpoints, led by /.git/config, /.env, and phpunit eval-stdin paths.
- One /24 source (195.178.110.0/24) generated a disproportionate share of requests, suggesting a single scanner or tightly controlled infrastructure segment.
- Several smaller families rose above baseline (Spring Actuator and Git exposure checks), while direct /.env probing dropped sharply versus yesterday and baseline.
Why it matters: These requests map to well-known high-impact misconfigurations (exposed Git metadata, leaked environment files, and exposed framework diagnostics/admin endpoints) that can enable credential leakage or remote code execution when present; even if the honeypot is not vulnerable, the pattern indicates what attackers are currently hunting at scale.
Changes since yesterday:
- Git exposure probing increased (+15.89% vs yesterday) and is well above the 7-day baseline (+118.64%).
- Spring Actuator probing increased (+47.83% vs yesterday) and is far above baseline (+155.91%).
- Direct /.env and related sensitive-file probing decreased sharply (-72.7% vs yesterday; -59.96% vs baseline).
Technical narrative
Key observations:
- Top URI indicators in the last 24h include /.git/config (120), /.env (68), and multiple phpunit eval-stdin variants (13 each), consistent with automated opportunistic scanners checking for common high-value exposures and legacy RCE paths.
- Source concentration is notable: 195.178.110.0/24 contributed 507 requests (~19.2% of all 24h requests) while the remaining top sources are an order of magnitude lower (46–92), which may reflect a dominant scanner rather than broadly distributed noise.
- Framework/admin surface probing is present but smaller in absolute volume (e.g., /actuator* and /manager/text/list). While counts are low, their deltas vs baseline suggest increased interest in these endpoint classes today.
Top URI families
| Family | 24h | Δ vs prev24h % | Δ vs 7d baseline % | Examples |
|---|
| git | 124 | 15.89 | 118.64 | /.git/config | /.git/index |
| files | 551 | -25.03 | 26.96 | /vendor/phpunit/phpunit/src/util/php/eval-stdin.php | /vendor/phpunit/phpunit/util/php/eval-stdin.php |
| env | 89 | -72.7 | -59.96 | /.env | /config.zip |
| actuator | 34 | 47.83 | 155.91 | /actuator/gateway/routes | /actuator |
| prefix:/+cscoe+ | 29 | -3.33 | 46.04 | /+cscoe+/logon.html | /+cscoe+/logon_forms.js |
| prefix:/manager | 10 | 100.0 | 100.0 | /manager/text/list | /manager/text/list |
Top sources
| Source | 24h | Note | Confidence |
|---|
| 195.178.110.0/24 | 507 | Dominant source segment (~19.2% of 24h requests), consistent with a single heavy scanner or concentrated infrastructure. | high |
| 217.60.236.0/24 | 92 | New top source today per novelty list; moderate volume relative to the leading source. | medium |
| 109.105.210.0/24 | 81 | New top source today per novelty list; activity appears consistent with general web probing. | medium |
| 216.180.246.0/24 | 80 | Also present as a top source over 7 days; likely recurring scanner infrastructure. | high |
| 206.189.82.0/24 | 46 | Shows malformed/empty-URI POSTs in samples (status 400), suggesting generic probing or tooling errors rather than targeted exploitation. | medium |