| Hostname | Request Count |
|---|---|
| www.darcherif.fr | 42 |
| 5 |
| Path | Request Count |
|---|---|
| bgLUG8ngI/AI/03aOPkA/mYOLXSYNiDhS1kiz/fQEkCFEB/FwlCTi/F9O0w | 6 |
| RUug7/gyu/sD-F/cT/Nb_-bi/7bw3bJb9uwf56VXuwa/GSQqEQE/GmkhP/EYCbwwC | 3 |
| wp-content/plugins/mesmerize-companion/theme-data/mesmerize/assets/css/companion.bundle.min.css | 2 |
| wp-content/themes/mesmerize/assets/js/theme.bundle.min.js | 2 |
| wp-content/themes/mesmerize/assets/fonts/fontawesome-webfont.woff2 | 2 |
| wp-content/themes/highlight/assets/images/hero-2.jpg | 2 |
| favicon.ico | 2 |
| wp-content/uploads/2020/05/ConferenceIndiaCropped.png | 2 |
| wp-includes/js/masonry.min.js | 2 |
| wp-includes/js/imagesloaded.min.js | 2 |
| wp-content/themes/highlight/assets/images/hero-1.jpg | 2 |
| wp-content/plugins/mesmerize-companion/theme-data/mesmerize/assets/js/companion.bundle.min.js | 2 |
| / | 2 |
| wp-content/themes/highlight/assets/js/theme-child.js | 2 |
| wp-content/themes/mesmerize/assets/css/theme.bundle.min.css | 1 |
| wp-content/themes/highlight/assets/images/hero-4.jpg | 1 |
| akam/13/10f5c67c | 1 |
| wp-includes/js/jquery/jquery.min.js | 1 |
| wp-includes/css/dist/block-library/style.min.css | 1 |
| wp-content/themes/mesmerize/style.min.css | 1 |
| wp-content/themes/highlight/style.min.css | 1 |
| wp-includes/js/jquery/jquery-migrate.min.js | 1 |
| wp-content/uploads/2020/01/Czech-Republic-operation-Temelin-Nuclear-Power-Plant-2003.jpg | 1 |
| akam/13/pixel_10f5c67c | 1 |
| index.php/2020/05/13/industrial-cyber-security-evf-2019-alexandre-darcherif/ | 1 |
| wp-includes/js/wp-emoji-release.min.js | 1 |
| wp-content/themes/highlight/assets/images/hero-3.jpg | 1 |
| wp-content/themes/highlight/customizer/sections/content.css | 1 |
Accessed a highly obfuscated and suspicious path, indicating potential reconnaissance or evasion, despite no WAF flags or explicit threat detections.
Previously flagged by AI with medium severity and a suspicious path in requests. No new threat activity or WAF flags detected in the latest context, but the unique and potentially obfuscated path warrants continued monitoring.
The entity has shown no activity since being added to the watchlist, with zero total requests, WAF flags, or security rule hits. No current threat detected.
Accessed an highly unusual and obfuscated path ('RUug7/gyu/sD-F/cT/Nb_-bi/7bw3bJb9uwf56VXuwa/GSQqEQE/GmkhP/EYCbwwC'), which may indicate a reconnaissance attempt, vulnerability probing, or obfuscated command execution.
Presence of a highly unusual and potentially obfuscated path in access logs, suggesting probing or exploit attempts. This aligns with its existing AI confidence score and medium severity rating in the watchlist, despite no new WAF or security rule hits.
The entity remains on the watchlist based on a prior AI assessment (confidence 0.75, medium severity). No new activity was detected in this period to warrant removal or an immediate block.
Previously identified by AI with medium confidence and severity. While no recent activity is observed in the provided snapshot, there is no information to invalidate the prior assessment. Keeping it in the watchlist for continued monitoring is prudent.
This IP address is on the watchlist with an AI confidence score of 0.75 and medium severity. While no recent activity or WAF hits were observed in the current context, the prior AI assessment suggests it warrants continued monitoring.
Entity remains suspicious based on prior AI confidence score (0.75) and medium severity, despite no recent activity detected on our systems. Further monitoring is required for this watchlist item.
Despite an AI confidence score for watchlist inclusion, the entity exhibits no recent activity, zero total requests, zero detected threat requests, and no security rule hits in the provided context. No current evidence supports its malicious nature.
Entity shows a 'last_seen' timestamp in the future, indicating data integrity issues or a sophisticated attempt to evade detection, combined with access to a highly anomalous and obfuscated-looking path (RUug7/gyu/sD-F/cT/Nb_-bi/7bw3bJb9uwf56VXuwa/GSQqEQE/GmkhP/EYCbwwC) commonly associated with vulnerability scanning or exploitation attempts.