| Hostname | Request Count |
|---|---|
| akamai.darcherif.fr | 25 |
| Path | Distinct Hostnames |
|---|---|
| data.php | 1 |
| wp-good.php | 1 |
| e.php | 1 |
| 990.php | 1 |
| xxxx.php | 1 |
| ws.php | 1 |
| abcd.php | 1 |
| z.php | 1 |
| 1.php | 1 |
| pro.php | 1 |
| ver.php | 1 |
| css.php | 1 |
| ultra.php | 1 |
| error.php | 1 |
| wp-configs.php | 1 |
| admin.php | 1 |
| check.php | 1 |
| file56.php | 1 |
| bless.php | 1 |
| wp-content/plugins/hellopress/wp_filemanager.php | 1 |
| xmlrpc.php | 1 |
| image.php | 1 |
| file22.php | 1 |
| wp-header-json.php | 1 |
| fm.php | 1 |
All requests (100%) from this IP were detected as threats, all accessed suspicious PHP files including a 'wp_filemanager.php' exploit were flagged by WAF, and a critical 'IPBLOCK' deny rule was triggered. Its associated ASN (AS8075) is already blocklisted for persistent and identical malicious activity from multiple other IPs.