# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 185.196.220.26 4 GET /proxy.php link=https://www.mqrjvwam4pfn.com/
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 185.196.220.26
Cf-Ray 880827638e6cb91e-AMS
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36
Accept text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language en-US,en;q=0.5
Upgrade-Insecure-Requests 1
Cf-Connecting-Ip 185.196.220.26
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-05-08 08:41:59.633679 80
ATTACK
SCAN
RECON
WEBAPP_VULN
RFI