File Access Bruteforce Attempts for 2020-11-30

Share on:

Last Updated: 23:11 GMT+8

  • .git//index
  • /2018/wp-includes/wlwmanifest.xml
  • /2019/wp-includes/wlwmanifest.xml
  • /blog/wp-includes/wlwmanifest.xml
  • /cms/wp-includes/wlwmanifest.xml
  • /media/wp-includes/wlwmanifest.xml
  • /news/wp-includes/wlwmanifest.xml
  • /shop/wp-includes/wlwmanifest.xml
  • /site/wp-includes/wlwmanifest.xml
  • /sito/wp-includes/wlwmanifest.xml
  • /test/wp-includes/wlwmanifest.xml
  • /web/wp-includes/wlwmanifest.xml
  • /website/wp-includes/wlwmanifest.xml
  • /wordpress/wp-includes/wlwmanifest.xml
  • /wp/wp-includes/wlwmanifest.xml
  • /wp1/wp-includes/wlwmanifest.xml
  • /wp2/wp-includes/wlwmanifest.xml
  • /xmlrpc.php?rsd
  • 176.122.169.95
  • 176.122.169.95/
  • LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
  • admin/.env
  • api/.env
  • blog/.env
  • favicon.ico
  • laravel/.env
  • phishingdomains-2020-11-20/
  • public/.env
  • shop/.env
  • sites/.env
  • system/.env
  • test/.env
  • vendor/.env
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/ioptimization/IOptimize.php?rchk
  • wp-login.php