File Access Bruteforce Attempts for 2021-01-02
Share on:
Jan 02, 2021
Reconnaissance
Last Updated: 23:01 GMT+8
- .env
- .git/index
- 202.157.138.93
- 202.157.138.93/
- GNxx.php5
- HNAP1
- TP/html/public/index.php
- TP/index.php
- TP/public/index.php
- actuator/health
- assets/css/fa.min.css
- assets/css/main.css
- assets/fonts/FiraCode-Regular.woff
- assets/fonts/fontawesome-webfont.woff2?v=4.7.0
- assets/img/favicon.ico
- assets/img/favicon.ico?
- config/getuser?index=0
- console/
- elrekt.php
- evox/about
- faq/
- favicon.ico
- html/public/index.php
- hudson
- index.php
- index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
- login
- manager/html
- manager/html/
- nmap-scanning-hosts-2020-07-30/
- nmaplowercheck1609518104
- phishingdomains-2020-11-23/
- phishingdomains-2020-12-01/
- phpmyadmin/index.php
- pmd/index.php
- portal/redlion
- public/index.php
- solr/admin/info/system?wt=json
- stix2-json-feed-2020-11-12/
- thinkphp/html/public/index.php
- vendor/phpunit/phpunit/src/Util/PHP/XsamXadoo_Bot.php
- vendor/phpunit/phpunit/src/Util/PHP/XsamXadoo_Bot_.php
- vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
- wp-admin/admin-ajax.php?action=
- wp-content/plugins/wp-file-manager/readme.txt
- wp-login.php