Just one sample, 1000+ times.
AbuseIPDB Β» 149.88.19.89
Check an IP Address, Domain Name, Subnet, or ASN
e.g. 83.248.201.138, microsoft.com, 5.188.10.0/24, or AS15169
83.248.201.138
149.88.19.89 was found in our database!
This IP was reported 466 times. Confidence of Abuse is 44%:?
44%
ISP Datacamp Limited
Usage Type Data Center/Web Hosting/Transit
ASN AS212238
Hostname(s) unn-149-88-19-89.datapacket.com
Domain Name cdn77.com
CountryGermany
City Frankfurt am Main, Hesse
IP info including ISP, Usage Type, and Location provided by IPInfo. Updated biweekly.
IP Abuse Reports for 149.88.19.89:
This IP address has been reported a total of 466 times from 181 distinct sources. 149.88.19.89 was first reported on December 12th 2024, and the most recent report was 31 minutes ago.
Recent Reports: We have received reports of abusive activity from this IP address within the last week. It is potentially still actively engaged in abusive activities.
Reporter IoA Timestamp (UTC) Comment Categories
dynamix 2026-04-07 00:06:29
(31 minutes ago)
Multiple WAF Violations
Web App Attack
Antinson 2026-04-06 19:06:47
(5 hours ago)
Scraping with a high error ratio and request rate Requests to unauthorized or suspicious endpoints ( ...show more
Bad Web Bot
dynamix 2026-04-05 19:02:44
(1 day ago)
Multiple WAF Violations
Web App Attack
Antinson 2026-04-05 15:16:02
(1 day ago)
Scraping with a high error ratio and request rate
Bad Web Bot
EGP Abuse Dept 2026-04-05 01:54:27
(1 day ago)
Scanning for web/db/file exploits on awardkopen.nl
SQL Injection Bad Web Bot Web App Attack
cmbplf 2026-04-03 07:31:41
(3 days ago)
254 requests with url.path */.well-known/acme-challenge/*.php
Brute-Force Bad Web Bot
hirosume2 2026-04-03 05:08:02
(3 days ago)
DDoS composite score 31.4 (challenge tier) - 1020 reqs/5min - high_traffic
DDoS Attack
mw 2026-03-28 00:35:02
(1 week ago)
HEAD /a.bak HTTP/1.1
Web App Attack
TOCE 2026-03-12 07:08:14
(3 weeks ago)
4 hits seen on 2026-03-12, ports 5901 (VNC) on a honeypot from www.toce.ch
Brute-Force
Luis Fernando Camargo 2026-03-11 23:01:38
(3 weeks ago)
Honeytrapped
Port Scan Brute-Force
tecnicorioja 2026-01-12 23:00:35
(2 months ago)
wp-login attack [12/Jan/2026:05:41:40
Brute-Force Web App Attack
paulshipley.com.au 2026-01-12 05:04:51
(2 months ago)
shop.levellapromotions.com.au:443 149.88.19.89 - - [12/Jan/2026:16:03:17 +1100] "GET /wp-includes/ H ...show more
Web App Attack
Tha_14 2026-01-12 01:12:18
(2 months ago)
Multiple erroneous requests
Web App Attack
Rizzy 2026-01-11 22:58:13
(2 months ago)
Multiple WAF Violations
Brute-Force Web App Attack
Site.eu 2026-01-11 17:01:27
(2 months ago)
Excessive 404/403 errors
Brute-Force
This is very cool database: https://github.com/borestad/blocklist-abuseipdb ...maybe I will use it to disallow those IPs to visiting the website. Sick of heavy traffic from bots.

I put that logo on, they gave total 5000 IP checks for it per day, but it filled up within something like 2 minutes only!!!! The website is under some kind of crazy attack. I activated Cloudflare attack mode, seems it has calmed down a bit now but this is totally sick. Who is doing it and why?

