Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_2) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_2) AppleWebKit/535.39 (KHTML, like Gecko111) Chrome/94.3 Safari/539.32] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_3) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_3) AppleWebKit/538.37 (KHTML, like Gecko111) Chrome/97.4 Safari/535.35] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/533.38 (KHTML, like Gecko111) Chrome/96.8 Safari/536.35] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/532.32 (KHTML, like Gecko111) Chrome/92.9 Safari/532.33] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/536.37 (KHTML, like Gecko111) Chrome/97.6 Safari/531.37] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_8) AppleWebKit/532.33 (KHTML, like Gecko111) Chrome/92.8 Safari/536.34] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/539.37 (KHTML, like Gecko111) Chrome/95.9 Safari/534.32] **Reported from WAF sampled requests** show less
Malicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_9) AppleWebKit/5 ... show moreMalicious URI path [POST /xmlrpc.php] [Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_9) AppleWebKit/533.32 (KHTML, like Gecko111) Chrome/94.9 Safari/539.32] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [python-requests/2.32.3] **Reported from WAF sampled requests* ... show moreMalicious URI path [GET /.git/config] [python-requests/2.32.3] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [python-requests/2.32.3] **Reported from WAF sampled requests* ... show moreMalicious URI path [GET /.git/config] [python-requests/2.32.3] **Reported from WAF sampled requests** show less
Malicious URI path [GET /.git/config] [Nokia7250/1.0 (3.14) Profile/MIDP-1.0 Configuration/CLDC-1.0] ... show moreMalicious URI path [GET /.git/config] [Nokia7250/1.0 (3.14) Profile/MIDP-1.0 Configuration/CLDC-1.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Malicious URI path & DuckDuckGo Bot User Agent Spoofing [GET /wp-login.php] [ddg_android/5.169.0 (co ... show moreMalicious URI path & DuckDuckGo Bot User Agent Spoofing [GET /wp-login.php] [ddg_android/5.169.0 (com.duckduckgo.mobile.android; Android API 33)] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0] **Reported from WAF sampled requests** show less
Unsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; ... show moreUnsupported user agent typically used for Wordpress exploits [GET /wp-login.php] [Mozilla/5.0 (X11; Gentoo; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0] **Reported from WAF sampled requests** show less
Malicious URI path [GET /login/wp-includes/wlwmanifest.xml] [Mozilla/5.0 (Windows NT 10.0; Win64; x6 ... show moreMalicious URI path [GET /login/wp-includes/wlwmanifest.xml] [Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0 Safari/537.36] **Reported from WAF sampled requests** show less