# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 103.112.62.50 3 GET /aws.yml
Header Value
Host 188.245.40.243
Accept */*
User-Agent Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_15) AppleWebKit/537.86.6 (KHTML, like Gecko) Version/9.1.1 Safari/537.86.6
Parameter Value
False 2024-10-02 22:10:03.927149 80
OTHER
2 103.112.62.50 3 GET /aws.yml
Header Value
Host 188.245.40.243
Accept */*
User-Agent Mozilla/5.0 (webOS/1.4.5.1; U; en-US) AppleWebKit/532.2 (KHTML, like Gecko) Version/1.0 Safari/532.2 Pixi/1.1
Parameter Value
False 2024-08-10 06:15:36.524590 80
OTHER
3 103.112.62.50 3 GET /aws.yml
Header Value
Host 188.245.40.243
Accept */*
User-Agent Mozilla/5.0 (Windows NT 6.1; WOW64; rv:15.0) Gecko/20120623 Firefox/16.0.1
Parameter Value
False 2024-08-07 22:12:45.381578 80
OTHER
4 103.112.62.50 3 GET /aws.yml
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-12 19:47:30.252056 80
OTHER
5 103.112.62.50 3 GET /aws.yml
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-07 07:09:08.536606 80
OTHER