shell bypass 403
UnknownSec Shell
:
/
proc
/
thread-self
/
root
/
home
/
innovagencyco
/
access-logs
/ [
drwxr-x---
]
upload
mass deface
mass delete
console
info server
name :
statxpress.innovagency.co.za
35.213.231.234 - - [18/Dec/2024:18:30:15 +0200] "GET / HTTP/1.1" 200 133 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko; compatible; BW/1.2; rb.gy/oupwis) Chrome/124.0.0.0 Safari/537.36" 35.213.231.234 - - [18/Dec/2024:18:30:17 +0200] "GET /robots.txt HTTP/1.1" 404 1251 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko; compatible; BW/1.2; rb.gy/oupwis) Chrome/124.0.0.0 Safari/537.36" 147.185.132.84 - - [20/Dec/2024:21:32:51 +0200] "GET / HTTP/1.1" 200 514 "-" "Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com" 154.50.136.33 - - [20/Dec/2024:21:33:14 +0200] "GET / HTTP/1.1" 200 177 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/20.0.1132.57 Safari/537.36" 198.235.24.60 - - [20/Dec/2024:22:14:34 +0200] "GET / HTTP/1.1" 200 514 "-" "-"
© 2024 UnknownSec