😀 Some routes people use to probe your system
I am very surprised to see people probing my server at those API endpoints. Luckily they didn’t succeed.
Or maybe it’s just my project architecture is so bad that they couldn’t even locate the usual suspects to attack? Hopefully this is not the case. Lol
–
references:
24 Oct 2016