# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 138.199.29.33 3 GET /flask-recon/ip-lookup
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 138.199.29.33
Cf-Ray 89aa43f34180886e-LHR
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
Cf-Ew-Via 15
Cdn-Loop cloudflare; subreqs=1
Accept-Language en-GB,en;q=0.9,nl-GB;q=0.8,nl;q=0.7,en-US;q=0.6
Accept text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Cf-Connecting-Ip 138.199.29.33
Dnt 1
Priority u=0, i
Sec-Ch-Ua "Not/A)Brand";v="8", "Chromium";v="126", "Google Chrome";v="126"
Sec-Ch-Ua-Mobile ?0
Sec-Ch-Ua-Platform "Windows"
Sec-Fetch-Dest document
Sec-Fetch-Mode navigate
Sec-Fetch-Site none
Sec-Fetch-User ?1
Upgrade-Insecure-Requests 1
Cf-Ipcountry GB
Parameter Value
False 2024-06-28 02:32:17.192571 80
OTHER