File Access Bruteforce Attempts for 2021-02-01

Share on:

Last Updated: 22:02 GMT+8

  • .env
  • 155.4.61.15/
  • CVE-2019-0351/
  • LICENSE00%0D%0A%0D%0A/cgi-bin/main.php?g2_view=zipcart.Download
  • _ignition/execute-solution
  • actuator/health
  • admin/.env
  • api/.env
  • assets/css/fa.min.css
  • assets/css/main.css
  • assets/fonts/FiraCode-Regular.woff
  • assets/fonts/fontawesome-webfont.woff2?v=4.7.0
  • assets/img/favicon.ico?
  • assets/js/dark.js
  • blog/.env
  • config/getuser?index=0
  • console/
  • faq/
  • favicon.ico
  • index.php?s=/Index/\think\app/invokefunction&function=call_user_func_array&vars0]=md5&vars1]]=HelloThinkPHP21
  • jenkins/login
  • laravel/.env
  • login
  • manager/html
  • ping.cgi?pingIpAddress=google.fr;%22+payload+%22&sessionKey=1039230114
  • public/.env
  • shop/.env
  • sites/.env
  • solr/admin/info/system?wt=json
  • system/.env
  • test/.env
  • vendor/.env
  • vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
  • wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php
  • wp-content/plugins/apikey/apikey.php
  • wp-content/plugins/apikey/cursed.php
  • wp-content/plugins/downloads-manager/img/unlock.gif
  • wp-content/plugins/ioptimization/IOptimize.php?rchk
  • wp-content/plugins/wp-file-manager/readme.txt
  • wp-login.php