# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 45.141.87.4 2 GET /Modules/Telerik/Telerik.Web.UI.DialogHandler.aspx dialogName=FlashManager
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 45.141.87.4
Cf-Ray 8c36e6ad296b5a66-VIE
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (iPhone; CPU iPhone OS 17_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) EdgiOS/116.0.1938.56 Version/17.0 Mobile/15E148 Safari/604.1
Accept */*
Cf-Connecting-Ip 45.141.87.4
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry RU
Parameter Value
False 2024-09-15 07:28:37.797719 80
OTHER