| Hostname | Request Count |
|---|---|
| www.darcherif.fr | 83 |
| 1 | |
| akamai.darcherif.fr | 1 |
| Path | Distinct Hostnames |
|---|---|
| index.php/wp-json/wp/v2/pages/25 | 1 |
| wp-content/themes/mesmerize/assets/fonts/fontawesome-webfont.ttf | 1 |
| index.php/category/cybersecurity/ | 1 |
| index.php/wp-json/wp/v2/posts/40 | 1 |
| index.php/tag/industry-4-0/feed/ | 1 |
| index.php/author/admin3157/feed/ | 1 |
| index.php/tag/industry-4-0/ | 1 |
| index.php/2023/04/27/ddos-what-is-it-how-does-it-work-and-how-to-be-protected/ | 1 |
| wp-content/uploads/2020/05/ConferenceIndiaCropped.png | 1 |
| wp-includes/js/imagesloaded.min.js | 1 |
| index.php/2020/01/24/industry-4-0-corrupted-smart-factories-examples/ | 1 |
| wp-content/themes/highlight/assets/js/theme-child.js | 1 |
| index.php/wp-json/wp/v2/posts/68 | 1 |
| index.php/wp-json/wp/v2/categories/115 | 1 |
| wp-includes/js/jquery/jquery-migrate.min.js | 1 |
| wp-content/themes/highlight/style.min.css | 1 |
| index.php/feed/ | 1 |
| index.php/category/cybercrime/ | 1 |
| index.php/tag/cyber-security/feed/ | 1 |
| index.php/category/non-classe/feed/ | 1 |
| index.php/category/industry-4-0/ | 1 |
| wp-includes/css/dist/block-library/style.min.css | 1 |
| hiiNmC-QC/81HD6/wJFw/t3Ya2pc9pYf3cb/DVxdSAE/OSJgFF/tAEy4 | 1 |
| index.php/2020/01/22/industry-4-0-concept-threat-landscape-and-security-challenges-of-smart-factories/ | 1 |
| wp-content/themes/mesmerize/assets/fonts/fontawesome-webfont.woff | 1 |
| wp-includes/js/jquery/jquery.min.js | 1 |
| index.php/wp-json/wp/v2/categories/1 | 1 |
| wp-content/themes/highlight/customizer/sections/content.css | 1 |
| index.php/2020/01/24/industry-4-0-threat-landscape/ | 1 |
| index.php/category/cyberattacks/ | 1 |
| index.php/author/admin3157/ | 1 |
| index.php/wp-json/wp/v2/tags/2 | 1 |
| index.php/wp-json/wp/v2/tags/3 | 1 |
| wp-content/themes/mesmerize/style.min.css | 1 |
| wp-content/themes/mesmerize/assets/fonts/fontawesome-webfont.svg | 1 |
| wp-includes/js/wp-emoji-release.min.js | 1 |
| index.php/2020/05/13/industrial-cyber-security-evf-2019-alexandre-darcherif/ | 1 |
| index.php/wp-json/wp/v2/users/1 | 1 |
| index.php/category/cybersecurity/feed/ | 1 |
| index.php/wp-json/oembed/1.0/embed | 1 |
| wp-content/themes/mesmerize/assets/fonts/fontawesome-webfont.woff2 | 1 |
| wp-includes/js/%27,b,%27 | 1 |
| wp-includes/js/masonry.min.js | 1 |
| index.php/tag/iot/ | 1 |
| xmlrpc.php | 1 |
| index.php/comments/feed/ | 1 |
| index.php/tag/cps/feed/ | 1 |
| index.php/tag/iot/feed/ | 1 |
| index.php/tag/cps/ | 1 |
| author/admin3157/ | 1 |
High number of detected threat requests (43/44) with all requests flagged by WAF for general alert (3991023), indicating suspicious scanning or aggressive bot activity.
Extremely high percentage of detected threat requests (97.7%) and all accessed paths flagged by WAF.