Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [Mozilla/5.0 (Linux; Android 4.4; Nexus 5 Build/BuildID) Apple ... show moreMalicious URI path [GET /.git/config] [Mozilla/5.0 (Linux; Android 4.4; Nexus 5 Build/BuildID) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/30.0.0.0 Mobile Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-admin/includes/admin-ajax.php] [Linux Mozilla] **Reported from WAF sampl ... show moreMalicious URI path [GET /wp-admin/includes/admin-ajax.php] [Linux Mozilla] **Reported from WAF sampled requests** show less
Malicious URI path [HEAD /db.tar.gz] [Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/17.0 Firefox/17.0] ... show moreMalicious URI path [HEAD /db.tar.gz] [Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/17.0 Firefox/17.0] **Reported from WAF sampled requests** show less
Malicious URI path [HEAD /localhost.tar.gz] [Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/17.0 Firefo ... show moreMalicious URI path [HEAD /localhost.tar.gz] [Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/17.0 Firefox/17.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /wp-login.php] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36] **Reported from WAF sampled requests** show less
DuckDuckGo Bot User Agent Spoofing [HEAD /photo/still/10V6Mg.jpg] [ddg_android/5.215.0 (com.duckduck ... show moreDuckDuckGo Bot User Agent Spoofing [HEAD /photo/still/10V6Mg.jpg] [ddg_android/5.215.0 (com.duckduckgo.mobile.android; Android API 34)] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/2 ... show moreMalicious URI path [GET /.git/config] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:25.0) Gecko/20100101 Firefox/25.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Malicious URI path [HEAD /backup.zip] [Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/17.0 Firefox/17.0 ... show moreMalicious URI path [HEAD /backup.zip] [Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/17.0 Firefox/17.0] **Reported from WAF sampled requests** show less
DuckDuckGo Bot User Agent Spoofing [HEAD /photo/still/WYMjdw.jpg] [ddg_android/5.215.0 (com.duckduck ... show moreDuckDuckGo Bot User Agent Spoofing [HEAD /photo/still/WYMjdw.jpg] [ddg_android/5.215.0 (com.duckduckgo.mobile.android; Android API 34)] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 ... show moreMalicious URI path [GET /.git/config] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3798.0 Safari/537.36] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less