File Access Bruteforce Attempts for 2021-01-21

Share on:

Last Updated: 22:01 GMT+8

  • %22
  • .env
  • 0bef
  • 34.82.17.82
  • 73.132.162.14/
  • CVE-2007-1868
  • CVE-2007-4286/
  • CVE-2007-5276
  • CVE-2008-5264/
  • LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
  • actuator/health
  • admin/.env
  • ads.txt
  • api/.env
  • apple-touch-icon.png
  • blog/
  • blog/.env
  • config/getuser?index=0
  • console/
  • faq/
  • faq/index/result/?keyword=ViNa&cat_id=8
  • favicon.ico
  • humans.txt
  • index.php
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • jenkins/login
  • laravel/.env
  • login
  • manager/html
  • owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
  • phisingdomains
  • port54045/
  • public/.env
  • shop/.env
  • sites/.env
  • solr/admin/info/system?wt=json
  • system/.env
  • test/.env
  • vendor/.env
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • wordpress/
  • wp-admin/
  • wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
  • wp-admin/config.bak.php
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-login.php
  • wp/
  • xmlrpc.php?rsd