| Hostname | Request Count |
|---|---|
| akamai.darcherif.fr | 31 |
| Path | Request Count |
|---|---|
| _sec/cp_challenge/challenge | 10 |
| / | 3 |
| xmlrpc.php | 1 |
| wp/wp-includes/wlwmanifest.xml | 1 |
| website/wp-includes/wlwmanifest.xml | 1 |
| site/wp-includes/wlwmanifest.xml | 1 |
| shop/wp-includes/wlwmanifest.xml | 1 |
| news/wp-includes/wlwmanifest.xml | 1 |
| media/wp-includes/wlwmanifest.xml | 1 |
| sito/wp-includes/wlwmanifest.xml | 1 |
| cms/wp-includes/wlwmanifest.xml | 1 |
| wp-includes/wlwmanifest.xml | 1 |
| blog/wp-includes/wlwmanifest.xml | 1 |
| 2019/wp-includes/wlwmanifest.xml | 1 |
| wp2/wp-includes/wlwmanifest.xml | 1 |
| wp1/wp-includes/wlwmanifest.xml | 1 |
| 2018/wp-includes/wlwmanifest.xml | 1 |
| wordpress/wp-includes/wlwmanifest.xml | 1 |
| web/wp-includes/wlwmanifest.xml | 1 |
| test/wp-includes/wlwmanifest.xml | 1 |
Extremely high ratio of detected threat requests (95 over 31 requests), all accessed WordPress enumeration paths ('wlwmanifest.xml') flagged by WAF, triggered critical security alerts including 'BOT-BROWSER-IMPERSONATOR', and hit a critical WAF deny rule ('IPBLOCK-BURST4-318403'). Its associated ASN AS14061 is already blocklisted for identical, severe malicious activity from numerous other IPs, confirming a coordinated and persistent threat.