# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 104.243.37.199 4 GET /img/.env
Header Value
Host 188.245.40.243
Accept */*
User-Agent Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.14) Gecko/2009082707 Firefox/3.0.14 ( .NET CLR 3.5.30729)
Parameter Value
False 2024-10-04 10:07:07.694132 80
GRAB
ATTACK
LFI
2 104.243.37.199 4 GET /img/.env
Header Value
Host 188.245.40.243
Accept */*
User-Agent Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.73 Safari/537.36 OPR/34.0.2036.42
Parameter Value
False 2024-09-27 14:23:36.223242 80
GRAB
ATTACK
LFI
3 104.243.37.199 4 GET /img/.env
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 104.243.37.199
Cf-Ray 8afcf1066f218cc6-EWR
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept */*
Cf-Connecting-Ip 104.243.37.199
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-08-08 05:00:11.876780 80
GRAB
ATTACK
LFI