File Access Bruteforce Attempts for 2021-01-21
Share on:
Jan 21, 2021
Reconnaissance
Last Updated: 22:01 GMT+8
- %22
- .env
- 0bef
- 34.82.17.82
- 73.132.162.14/
- CVE-2007-1868
- CVE-2007-4286/
- CVE-2007-5276
- CVE-2008-5264/
- LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
- actuator/health
- admin/.env
- ads.txt
- api/.env
- apple-touch-icon.png
- blog/
- blog/.env
- config/getuser?index=0
- console/
- faq/
- faq/index/result/?keyword=ViNa&cat_id=8
- favicon.ico
- humans.txt
- index.php
- index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
- jenkins/login
- laravel/.env
- login
- manager/html
- owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
- phisingdomains
- port54045/
- public/.env
- shop/.env
- sites/.env
- solr/admin/info/system?wt=json
- system/.env
- test/.env
- vendor/.env
- vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
- wordpress/
- wp-admin/
- wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
- wp-admin/config.bak.php
- wp-content/plugins/apikey/apikey.php
- wp-content/plugins/apikey/cursed.php
- wp-content/plugins/downloads-manager/img/unlock.gif
- wp-content/plugins/wp-file-manager/readme.txt
- wp-login.php
- wp/
- xmlrpc.php?rsd