| Hostname | Request Count |
|---|---|
| www.darcherif.fr | 184 |
| akamai.darcherif.fr | 22 |
| Path | Distinct Hostnames |
|---|---|
| author/wadminw | 1 |
| author/admin/ | 1 |
| wp-login.php | 1 |
| js/scripts.js | 1 |
| author/root | 1 |
| js/mpulse.js | 1 |
| xmlrpc.php | 1 |
| wp-json/wp/v2/users/ | 1 |
| author/baxc454urj/ | 1 |
| netstorage/ns-product-brief.pdf | 1 |
| assets/mail/contact_me.js | 1 |
| index.php/author/admin3157/ | 1 |
| assets/mail/jqBootstrapValidation.js | 1 |
Extremely high threat request ratio (39/15), all accessed paths flagged by WAF including WordPress sensitive paths ('xmlrpc.php', 'wp-login.php'), multiple security alerts (e.g., 'BOT-BROWSER-IMPERSONATOR'), and critical WAF deny rules ('IPBLOCK-PENALTY-BOX', 'PLATFORM-ANOMALY') were triggered. This pattern is consistent with other blocklisted malicious entities.