# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 78.142.18.92 3 GET /.well-known/
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 78.142.18.92
Cf-Ray 8af3581eca736652-AMS
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Accept */*
User-Agent Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36
Cf-Connecting-Ip 78.142.18.92
Cdn-Loop cloudflare
Cf-Ipcountry BG
Parameter Value
False 2024-08-07 01:02:51.274767 80
OTHER
2 78.142.18.92 3 GET /.well-known/
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 78.142.18.92
Cf-Ray 89faf5626d5766cd-AMS
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Accept */*
User-Agent Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36
Cf-Connecting-Ip 78.142.18.92
Cdn-Loop cloudflare
Cf-Ipcountry BG
Parameter Value
False 2024-07-07 21:34:25.295236 80
OTHER