Investigation Workspace

Entity: 3%7e415f6cb3e8aefec4 (Tls)

Entity Details
Type
Tls
Linked Entities
IPs Linked to TLS Fingerprint (2)
Hostnames Targeted
Hostname Request Count
akamai.darcherif.fr 303
www.darcherif.fr 127
Paths Targeted (with Request Counts)
Path Request Count
.env 9
.env.local 8
.env.bak 8
.env.production 8
.env.old 7
.env.backup 7
.env.staging 7
.env.save 7
/ 7
checkout 6
env 6
__cve_probe_cve_test_404 6
.env.dev 6
index.html 6
.env.example 5
@vite/client 5
robots.txt 5
config.env 5
payment/.env 5
stripe/.env 5
main.js 4
constants.js 4
laravel/.env 4
.env.development 4
assets/.env 4
config.js 4
.env.live 4
docker/.env 4
__env.js 4
wp-config.php.save 4
stripe.js 4
index.js 4
core/.env 4
bundle.js 4
.env.prod 4
api/.env 4
app.js 4
backend/.env 4
sitemap.xml 4
app/.env 4
env.js 4
admin/.env 4
vendor.js 3
wp-config.php.old 3
wp-config.php.bak 3
.vscode/sftp.json 3
wp-config.php.txt 3
.git/HEAD 3
.env.vite 3
checkout.js 3
🚫

Block

Critical malicious activity detected. Attempted access to highly sensitive files and directories (e.g., .env.old, wp-config.php.txt, .git/config, admin/settings, payment.js, stripe.js). All suspicious paths were flagged by WAF, and multiple security rules were triggered, including Local File Inclusion (LFI) anomalies and high-volume burst blocking. Extremely high number of detected threat requests (552).

2026-02-15 00:32:51