| Hostname | Request Count |
|---|---|
| www.darcherif.fr | 947 |
| akamai.darcherif.fr | 73 |
| 15 |
| Path | Request Count |
|---|---|
| robots.txt | 101 |
| / | 61 |
| index.php/feed/ | 38 |
| index.php/2020/05/13/industrial-cyber-security-evf-2019-alexandre-darcherif/ | 20 |
| index.php/comments/feed/ | 20 |
| index.php/category/cybersecurity/feed/ | 19 |
| index.php/category/cybersecurity/ | 19 |
| index.php/2023/04/27/ddos-what-is-it-how-does-it-work-and-how-to-be-protected/ | 19 |
| index.php/category/cybercrime/ | 19 |
| index.php/2020/01/24/industry-4-0-threat-landscape/ | 19 |
| index.php/category/industry-4-0/feed/ | 19 |
| index.php/category/non-classe/feed/ | 18 |
| index.php/tag/cyber-security/feed/ | 18 |
| index.php/tag/iot/ | 18 |
| index.php/tag/iot/feed/ | 18 |
| index.php/category/cyberattacks/ | 18 |
| index.php/tag/industry-4-0/feed/ | 18 |
| index.php/category/cyberattacks/feed/ | 18 |
| index.php/author/admin3157/feed/ | 18 |
| index.php/tag/industry-4-0/ | 18 |
| index.php/category/cloud-security/feed/ | 18 |
| index.php/category/cybercrime/feed/ | 18 |
| index.php/tag/cps/feed/ | 18 |
| index.php/category/cloud-security/ | 18 |
| index.php/tag/cyber-security/ | 17 |
| index.php/2020/01/24/industry-4-0-corrupted-smart-factories-examples/ | 17 |
| index.php/category/non-classe/ | 17 |
| index.php/category/industry-4-0/ | 17 |
| index.php/tag/cps/ | 17 |
| index.php/author/admin3157/ | 17 |
| index.php/2020/01/22/industry-4-0-concept-threat-landscape-and-security-challenges-of-smart-factories/ | 17 |
| wp-includes/js/jquery/jquery.min.js | 15 |
| author/admin3157/ | 15 |
| wp-content/themes/mesmerize/style.min.css | 14 |
| wp-content/themes/mesmerize/assets/js/theme.bundle.min.js | 14 |
| wp-content/themes/highlight/style.min.css | 14 |
| wp-content/themes/mesmerize/assets/css/theme.bundle.min.css | 14 |
| wp-includes/js/jquery/jquery-migrate.min.js | 14 |
| wp-includes/js/wp-emoji-release.min.js | 14 |
| wp-content/themes/highlight/customizer/sections/content.css | 14 |
| wp-content/themes/highlight/assets/js/theme-child.js | 14 |
| wp-includes/js/imagesloaded.min.js | 14 |
| wp-includes/js/masonry.min.js | 13 |
| wp-includes/css/dist/block-library/style.min.css | 13 |
| wp-content/plugins/mesmerize-companion/theme-data/mesmerize/assets/js/companion.bundle.min.js | 13 |
| wp-content/plugins/mesmerize-companion/theme-data/mesmerize/assets/css/companion.bundle.min.css | 13 |
| css/styles.css | 6 |
| js/scripts.js | 6 |
| assets/mail/contact_me.js | 6 |
| js/mpulse.js | 6 |
High number of detected threat requests (41/45) and multiple general WAF alerts, indicating persistent suspicious scanning or bot activity.
Over 90% of requests associated with this TLS fingerprint were detected as threats, indicating persistent malicious activity.