File Access Bruteforce Attempts for 2021-01-03

Share on:

Last Updated: 20:01 GMT+8

  • 0bef
  • 2019/wp-includes/wlwmanifest.xml
  • 2020/wp-includes/wlwmanifest.xml
  • CVE-2008-7140/
  • CVE-2019-10927/
  • TP/html/public/index.php
  • TP/index.php
  • TP/public/index.php
  • _fragment
  • _profiler/phpinfo
  • actuator/health
  • app_dev.php/_fragment
  • app_dev.php/_profiler/phpinfo
  • asdf.php
  • blog/wp-includes/wlwmanifest.xml
  • cms/wp-includes/wlwmanifest.xml
  • console/
  • dns-query?dns=AAABAAABAAAAAAAAA3d3dwdleGFtcGxlA2NvbQAAAQAB
  • elrekt.php
  • faq/
  • favicon.ico
  • html/public/index.php
  • i.php
  • index.php
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • info.php
  • infophp.php
  • manager/html/
  • news/wp-includes/wlwmanifest.xml
  • nmap-scanning-hosts-2020-07-30/
  • php.php
  • php_info.php
  • phpinfo.php
  • phpversion.php
  • pinfo.php
  • port34398/favicon.ico
  • public/index.php
  • shop/wp-includes/wlwmanifest.xml
  • site/wp-includes/wlwmanifest.xml
  • sito/wp-includes/wlwmanifest.xml
  • solr/admin/info/system?wt=json
  • test.php
  • test/wp-includes/wlwmanifest.xml
  • thinkphp/html/public/index.php
  • time.php
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • web/wp-includes/wlwmanifest.xml
  • website/wp-includes/wlwmanifest.xml
  • wordpress/wp-includes/wlwmanifest.xml
  • wp-admin/
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-includes/wlwmanifest.xml
  • wp-login.php
  • wp/wp-includes/wlwmanifest.xml
  • wp1/wp-includes/wlwmanifest.xml
  • wp2/wp-includes/wlwmanifest.xml
  • xmlrpc.php?rsd