# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 184.168.127.103 4 GET /_profiler/phpinfo.php
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 179.43.149.114
Cf-Ray 89d2f5052a173a74-FRA
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Go-http-client/1.1
Cf-Connecting-Ip 179.43.149.114
Cdn-Loop cloudflare
Cf-Ipcountry CH
Parameter Value
False 2024-07-03 01:03:40.257293 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 184.168.127.103 4 GET /_profiler/phpinfo.php
Header Value
Host 167.172.53.140
Connection keep-alive
Accept-Encoding gzip, deflate
Accept */*
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Parameter Value
False 2024-05-24 13:43:51.230391 80
ATTACK
SCAN
RECON
WEBAPP_VULN