File Access Bruteforce Attempts for 2021-02-01
Share on:
Feb 01, 2021
Reconnaissance
Last Updated: 22:02 GMT+8
- .env
- 155.4.61.15/
- CVE-2019-0351/
- LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
- _ignition/execute-solution
- actuator/health
- admin/.env
- api/.env
- assets/css/fa.min.css
- assets/css/main.css
- assets/fonts/FiraCode-Regular.woff
- assets/fonts/fontawesome-webfont.woff2?v=4.7.0
- assets/img/favicon.ico?
- blog/.env
- config/getuser?index=0
- console/
- faq/
- favicon.ico
- index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
- jenkins/login
- laravel/.env
- login
- manager/html
- ping.cgi?pingIpAddress=google.fr;%22+payload+%22&sessionKey=1039230114
- public/.env
- shop/.env
- sites/.env
- solr/admin/info/system?wt=json
- system/.env
- test/.env
- vendor/.env
- vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
- wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
- wp-content/plugins/apikey/apikey.php
- wp-content/plugins/apikey/cursed.php
- wp-content/plugins/downloads-manager/img/unlock.gif
- wp-content/plugins/ioptimization/IOptimize.php?rchk
- wp-content/plugins/wp-file-manager/readme.txt
- wp-login.php