Malicious URI path [GET /images/..%2finfo.html] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebK ... show moreMalicious URI path [GET /images/..%2finfo.html] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path & DigitalOcean User Agent Spoofing [GET /virtual/capture/ZD993/wp-admin/network/i ... show moreMalicious URI path & DigitalOcean User Agent Spoofing [GET /virtual/capture/ZD993/wp-admin/network/index.php] [Mozilla/5.0 (Linux; Android 7.0; SM-G892A Build/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Mobile Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path & DuckDuckGo Bot User Agent Spoofing [GET /wp-login.php] [DuckDuckBot-Https/1.1; ... show moreMalicious URI path & DuckDuckGo Bot User Agent Spoofing [GET /wp-login.php] [DuckDuckBot-Https/1.1; (+https://duckduckgo.com/duckduckbot)] **Reported from WAF sampled requests** show less
Scraping user agent [GET /apple-touch-icon.png] [Go-http-client/1.1] **Reported from WAF sampled req ... show moreScraping user agent [GET /apple-touch-icon.png] [Go-http-client/1.1] **Reported from WAF sampled requests** show less
Scraping user agent [HEAD /gallery/mqxQl?tab=photo] [python-requests/2.31.0] **Reported from WAF sam ... show moreScraping user agent [HEAD /gallery/mqxQl?tab=photo] [python-requests/2.31.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /actuator/] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (K ... show moreMalicious URI path [GET /actuator/] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36] **Reported from WAF sampled requests** show less
Google Bot User Agent Spoofing [GET /] [DoCoMo/2.0 N905i(c100;TB;W24H16) (compatible; Googlebot-Mobi ... show moreGoogle Bot User Agent Spoofing [GET /] [DoCoMo/2.0 N905i(c100;TB;W24H16) (compatible; Googlebot-Mobile/2.1; http://www.google.com/bot.html)] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.gitlab-ci.yml] [Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.3 ... show moreMalicious URI path [GET /.gitlab-ci.yml] [Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path [GET /actuator/] [Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Ge ... show moreMalicious URI path [GET /actuator/] [Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36] **Reported from WAF sampled requests** show less
DuckDuckGo Bot User Agent Spoofing [HEAD /photo/gif/XKE1Zn.gif] [ddg_android/5.213.0 (com.duckduckgo ... show moreDuckDuckGo Bot User Agent Spoofing [HEAD /photo/gif/XKE1Zn.gif] [ddg_android/5.213.0 (com.duckduckgo.mobile.android; Android API 34)] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/ ... show moreMalicious URI path [GET /.git/config] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /v1/docs//..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C ... show moreMalicious URI path [GET /v1/docs//..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C..%5C%5C%5C/etc/profile] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.135 Safari/537.36] **Reported from WAF sampled requests** show less
Malicious URI path & NULL user agent [GET /wp-content/plugins/wp-file-manager/css/fm_custom.css] [NU ... show moreMalicious URI path & NULL user agent [GET /wp-content/plugins/wp-file-manager/css/fm_custom.css] [NULL user agent] **Reported from WAF sampled requests** show less
Malicious URI path [GET /cgi-bin/whois.cgi?lookup=;&ext=/bin/cat%20/etc/profile] [Mozilla/5.0 (Windo ... show moreMalicious URI path [GET /cgi-bin/whois.cgi?lookup=;&ext=/bin/cat%20/etc/profile] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.97 Safari/537.36] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Malicious URI path & NULL user agent [GET /wp-content/plugins/wp-file-manager/css/fm_custom.css] [NU ... show moreMalicious URI path & NULL user agent [GET /wp-content/plugins/wp-file-manager/css/fm_custom.css] [NULL user agent] **Reported from WAF sampled requests** show less
Malicious URI path [GET /virtual/capture/ZD993/.env] [Go-http-client/2.0] **Reported from WAF sample ... show moreMalicious URI path [GET /virtual/capture/ZD993/.env] [Go-http-client/2.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less