| Hostname | Request Count |
|---|---|
| akamai.darcherif.fr | 49 |
| Path | Request Count |
|---|---|
| as.php | 1 |
| ioxi002.PhP7 | 1 |
| mar.php | 1 |
| f.php | 1 |
| a.php | 1 |
| ty.php | 1 |
| log.php | 1 |
| c.php | 1 |
| up.php | 1 |
| edit.php | 1 |
| file.php | 1 |
| k.php | 1 |
| 1.php | 1 |
| db.php | 1 |
| wp.php | 1 |
| info.php | 1 |
| cc.php | 1 |
| moon.php | 1 |
| text.php | 1 |
| new.php | 1 |
| content.php | 1 |
| about.php | 1 |
| function.php | 1 |
| plugin.php | 1 |
| simple.php | 1 |
| radio.php | 1 |
| click.php | 1 |
| network.php | 1 |
| wp-login.php | 1 |
| wp-trackback.php | 1 |
| wp-mail.php | 1 |
| configs.php | 1 |
| atomlib.php | 1 |
| file7.php | 1 |
| about.php7 | 1 |
| class.php | 1 |
| wp-activate.php | 1 |
| app/webroot/filemanager.php | 1 |
| filemanager.php | 1 |
| cloud.php | 1 |
| wp-class.php | 1 |
| dialog.php | 1 |
| makeasmtp.php | 1 |
| dropdown.php | 1 |
| system_log.php | 1 |
| autoload_classmap.php | 1 |
| tinyfilemanager.php | 1 |
| wp-content/plugins/hellopress/wp_filemanager.php | 1 |
| mah.php | 1 |
All requests (100%) from this IP were detected as threats, all accessed suspicious PHP files including a known WordPress File Manager exploit ('wp-content/plugins/hellopress/wp_filemanager.php') were flagged by WAF, and a critical 'IPBLOCK' deny rule was triggered. Its associated ASN (AS8075) is already blocklisted for persistent and identical malicious activity from multiple other IPs.