# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 45.141.87.4 2 GET /App_Master/Telerik.Web.UI.WebResource.axd type=rau
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 45.141.87.4
Cf-Ray 8c36e6af3fba5a71-VIE
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Edg/121.0.0.0 Trailer/92.3.3357.27
Accept */*
Cf-Connecting-Ip 45.141.87.4
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry RU
Parameter Value
False 2024-09-15 07:28:38.129342 80
OTHER
2 45.141.87.4 3 GET /App_Master/Telerik.Web.UI.WebResource.axd
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 45.141.87.4
Cf-Ray 8c36e6ae29195aa3-VIE
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (iPhone; CPU iPhone OS 17_0_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.0 Mobile/15E148 Safari/604.1 OPT/4.3.1
Accept */*
Cf-Connecting-Ip 45.141.87.4
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry RU
Parameter Value
False 2024-09-15 07:28:37.962224 80
OTHER