# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 31.207.35.43 3 GET /flask-recon/view-endpoints/wp-admin/admin-ajax.php action=add_custom_font
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 31.207.35.43
Cf-Ray 8a26a2a81b2e7030-CDG
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (iPad; CPU OS 5_0 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9A334 Safari/7534.48.3
Cf-Connecting-Ip 31.207.35.43
Cdn-Loop cloudflare
Cf-Ipcountry FR
Parameter Value
False 2024-07-13 04:47:06.506331 80
RECON
ATTACK
SCAN
WEBAPP_VULN
2 31.207.35.43 3 GET /flask-recon/view-endpoints/wp-admin/admin-ajax.php action=add_custom_font
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 31.207.35.43
Cf-Ray 8a26a231aae5d632-CDG
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Mozilla/5.0 (iPad; CPU OS 5_0 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9A334 Safari/7534.48.3
Cf-Connecting-Ip 31.207.35.43
Cdn-Loop cloudflare
Cf-Ipcountry FR
Parameter Value
False 2024-07-13 04:45:55.880896 80
RECON
ATTACK
SCAN
WEBAPP_VULN