| Hostname | Request Count |
|---|---|
| akamai.darcherif.fr | 230 |
| Path | Request Count |
|---|---|
| 0x.php | 2 |
| f35.php | 2 |
| item.php | 2 |
| bgymj.php | 2 |
| jga.php | 2 |
| erty.php | 2 |
| mh.php | 2 |
| wp-content/plugins/hellopress/wp_filemanager.php | 2 |
| x12.php | 2 |
| f6.php | 2 |
| 8.php | 2 |
| txets.php | 2 |
| chosen.php | 2 |
| 1.php | 2 |
| acp.php | 2 |
| 666.php | 2 |
| support.php | 1 |
| fetch.php | 1 |
| asix.php | 1 |
| backup.php | 1 |
| webadmin.php | 1 |
| advanc.php | 1 |
| fodds.php | 1 |
| wp-setting.php | 1 |
| tkllu.php | 1 |
| maxro.php | 1 |
| gettest.php | 1 |
| sxdfrt.php | 1 |
| install.php | 1 |
| wp-links.php | 1 |
| bless.php | 1 |
| wp-4doption1.php | 1 |
| autogooey.php | 1 |
| wp-the.php | 1 |
| daff42833e.php | 1 |
| moshou.php | 1 |
| inputs.php | 1 |
| sbhu.php | 1 |
| bolt.php | 1 |
| mini.php | 1 |
| ant.php | 1 |
| lp6.php | 1 |
| wp-atom.php | 1 |
| ftyude.php | 1 |
| cwclass.php | 1 |
| pass4.php | 1 |
| blog/222.php | 1 |
| gaigu.php | 1 |
| public/vx.php | 1 |
| miansha.php | 1 |
All 143 requests detected as threats, accessing highly suspicious PHP files indicative of webshells or malicious scripts, and previously denied by an IPBLOCK security rule. This indicates active, severe malicious intent.