File Access Bruteforce Attempts for 2021-01-02

Share on:

Last Updated: 23:01 GMT+8

  • .env
  • .git/index
  • 202.157.138.93
  • 202.157.138.93/
  • GNxx.php5
  • HNAP1
  • TP/html/public/index.php
  • TP/index.php
  • TP/public/index.php
  • actuator/health
  • assets/css/fa.min.css
  • assets/css/main.css
  • assets/fonts/FiraCode-Regular.woff
  • assets/fonts/fontawesome-webfont.woff2?v=4.7.0
  • assets/img/favicon.ico
  • assets/img/favicon.ico?
  • config/getuser?index=0
  • console/
  • elrekt.php
  • evox/about
  • faq/
  • favicon.ico
  • html/public/index.php
  • hudson
  • index.php
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • login
  • manager/html
  • manager/html/
  • nmap-scanning-hosts-2020-07-30/
  • nmaplowercheck1609518104
  • phishingdomains-2020-11-23/
  • phishingdomains-2020-12-01/
  • phpmyadmin/index.php
  • pmd/index.php
  • portal/redlion
  • public/index.php
  • solr/admin/info/system?wt=json
  • stix2-json-feed-2020-11-12/
  • thinkphp/html/public/index.php
  • vendor/phpunit/phpunit/src/Util/PHP/XsamXadoo_Bot.php
  • vendor/phpunit/phpunit/src/Util/PHP/XsamXadoo_Bot_.php
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • wp-admin/admin-ajax.php?action=
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-login.php