# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 43.153.214.195 4 GET /config.php
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 213.232.87.230
Cf-Ray 89cb1e8a9f3b0be9-AMS
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Go-http-client/1.1
Cf-Connecting-Ip 213.232.87.230
Cdn-Loop cloudflare
Cf-Ipcountry NL
Parameter Value
False 2024-07-02 02:13:55.194711 80
RECON
GRAB
ATTACK
SCAN
WEBAPP_VULN
2 43.153.214.195 4 GET /config.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-15 15:49:29.715272 80
RECON
GRAB
ATTACK
SCAN
WEBAPP_VULN
3 43.153.214.195 4 GET /config.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-15 15:49:28.176432 80
RECON
GRAB
ATTACK
SCAN
WEBAPP_VULN
4 43.153.214.195 4 GET /config.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-06 10:07:45.046774 80
RECON
GRAB
ATTACK
SCAN
WEBAPP_VULN