Establishing vulnerabiliteis on a particular website with asserted IP abuse.Compare various scan results:
https://www.abuseipdb.com/check/46.149.182.124 (random example)
Re:
https://www.shodan.io/host/46.149.176.5 (with all vuln. given there ) on that Apache HTTP-server *
No threat in data exchanges - 3 trackers blocked - No restrictions found.
Missing intermediate TLS certificate running on Apache 2.4.41, Ubuntu *
CMS: WordPress 6.2.1
Powered by: Unknown - 4 Word Press issues -
1. outdated CMS,
2. Plugin Update Status About
woocommerce 7.3.0 Warning latest release (7.7.0)
hxtps://woocommerce.com/
3. 4. User enumeration and directory listing not set at disabled.
Further website config issues
Protection
No website application firewall detected.
Please install a cloud-based WAF to prevent website hacks and DDoS attacks.
Security Headers
Missing security header for ClickJacking Protection. Alternatively,
you can use Content-Security-Policy: frame-ancestors 'none'.
Missing security header to prevent Content Type sniffing.
Missing Strict-Transport-Security security header.
Missing Content-Security-Policy directive. We recommend to add the following CSP directives
(you can use default-src if all values are the same): script-src, object-src, base-uri, frame-src
Default server banners displayed. Your site is displaying your web server default banners.
quote-info from a sucuri website scan result.
Sytange as here IP is given as above board:
https://www.ip-lookup.org/score/46.149.176.5Another source to check with - 4 detect:
https://www.criminalip.io/en/asset/report/209.97.181.37polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)