| Hostname | Request Count |
|---|---|
| akamai.darcherif.fr | 326 |
| Path | Distinct Hostnames |
|---|---|
| bless11.php | 1 |
| class20.php | 1 |
| ooaiyc.php | 1 |
| file3.php | 1 |
| acwfihfh.php | 1 |
| admiin.php | 1 |
| file13.php | 1 |
| class19.php | 1 |
| file9.php | 1 |
| bless14.php | 1 |
| lalala.php | 1 |
| anskrit.php | 1 |
| revision.php | 1 |
| sad/about.php | 1 |
| randkeyword.php | 1 |
| family.php | 1 |
| out.php | 1 |
| webix.php | 1 |
| xl2023.php | 1 |
| shell1.php | 1 |
| bless5.php | 1 |
| file2.php | 1 |
| simple.php | 1 |
| wp-freya.php | 1 |
| wp-configs.php | 1 |
| horeg.php | 1 |
| class-t.api.php | 1 |
| tempfuns.php | 1 |
| alfaindex.php | 1 |
| error.php | 1 |
| baxa1.phP8 | 1 |
| xeeex.php | 1 |
| utchiha.php | 1 |
| .cache/x.php | 1 |
| 2clas.php | 1 |
| 87.php | 1 |
| alfa.php | 1 |
| o.php | 1 |
| hexx.php | 1 |
| redi.php | 1 |
| byp.php | 1 |
| lock.php | 1 |
| sid3.php | 1 |
| ws36.php | 1 |
| 0x.php | 1 |
| abcd.php | 1 |
| 1.php | 1 |
| mans.php | 1 |
| 403.php | 1 |
| a2.php | 1 |
All requests (100%) were detected as threats, all accessed suspicious PHP files were flagged by WAF, and a critical 'IPBLOCK' deny rule was triggered. Its associated ASN (AS8075) is already blocklisted for persistent malicious activity with other IPs showing identical behavior.