# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 104.234.140.70 4 GET /_info.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-25 12:44:48.193914 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 104.234.140.70 4 GET /_info.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding *
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-14 04:35:52.357836 80
ATTACK
SCAN
RECON
WEBAPP_VULN
3 104.234.140.70 4 GET /_info.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept-Encoding *
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-10 11:10:46.413452 80
ATTACK
SCAN
RECON
WEBAPP_VULN