# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 172.233.58.223 4 GET /default.php
Header Value
Host no.com
User-Agent curl/7.54.0
Connection close
Parameter Value
False 2024-09-12 18:24:13.215368 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
2 172.233.58.223 4 GET /default.php
Header Value
Host no.com
Connection close
User-Agent curl/7.54.0
Parameter Value
False 2024-07-28 05:01:15.634164 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
3 172.233.58.223 4 GET /default.php
Header Value
Host no.com
Connection close
User-Agent curl/7.54.0
Parameter Value
False 2024-07-28 05:01:15.532803 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
4 172.233.58.223 4 GET /default.php
Header Value
Connection close
Host no.com
User-Agent curl/7.54.0
Parameter Value
False 2024-07-21 03:50:44.039550 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
5 172.233.58.223 4 GET /default.php
Header Value
Connection close
Host no.com
User-Agent curl/7.54.0
Parameter Value
False 2024-07-21 03:50:43.839035 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
6 172.233.58.223 4 GET /default.php
Header Value
User-Agent curl/7.54.0
Host no.com
Connection close
Parameter Value
False 2024-07-11 17:13:01.654457 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
7 172.233.58.223 4 GET /default.php
Header Value
Host static.243.40.245.188.clients.your-server.de
User-Agent curl/7.54.0
Connection close
Parameter Value
False 2024-06-29 08:16:41.664513 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
8 172.233.58.223 4 GET /default.php
Header Value
Connection close
User-Agent curl/7.54.0
Host 167.172.53.140
Parameter Value
False 2024-05-28 21:42:05.870377 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
9 172.233.58.223 4 GET /default.php
Header Value
Host 167.172.53.140
User-Agent curl/7.54.0
Connection close
Parameter Value
False 2024-05-15 14:18:50.979506 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN