File Access Bruteforce Attempts for 2021-01-30

Share on:

Last Updated: 23:01 GMT+8

  • .env
  • .git/config
  • 114.122.69.27
  • 114.122.69.27/
  • HNAP1
  • LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
  • aaa9
  • aab9
  • actuator/health
  • admin/.env
  • api/.env
  • bag2
  • blog/.env
  • boaform/admin/formLogin?username=ec8&psd=ec8
  • config/getuser?index=0
  • console/
  • dns-query?dns=AAABAAABAAAAAAAAA3d3dwViYWlkdQNjb20AAAEAAQ
  • evox/about
  • favicon.ico
  • images/file/vol.php5?cek
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • info.php
  • jenkins/login
  • laravel/.env
  • login
  • manager/html
  • nmaplowercheck1611973137
  • openidserver
  • owa/auth/logon.aspx?url=https%3a%2f%2f1%2fecp%2f
  • phishingdomains-2020-11-20/
  • php-fpm/status?json
  • phpmyadmin
  • phpmyadmin/
  • public/.env
  • shop/.env
  • sites/.env
  • solr/admin/info/system?wt=json
  • system/.env
  • telescope/requests
  • test/.env
  • vendor/.env
  • vendor/phpunit/phpunit/phpunit.xml
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • webboard/images/file/vol.php5?cek
  • webfig/
  • wp-admin/
  • wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/ioptimization/IOptimize.php?rchk
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-login.php