# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 104.234.140.78 4 GET /sources/.env
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 104.243.37.199
Cf-Ray 8afcf62f7ef919bf-EWR
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/81.0.4044.129 Safari/537.36
Accept */*
Cf-Connecting-Ip 104.243.37.199
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-08-08 05:03:43.685392 80
GRAB
ATTACK
LFI
2 104.234.140.78 4 POST /sources/.env
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding *
Accept */*
Connection keep-alive
Content-Length 20
Content-Type application/x-www-form-urlencoded
Parameter Value
False 2024-05-10 11:10:01.990309 80
GRAB
ATTACK
LFI
3 104.234.140.78 4 GET /sources/.env
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept-Encoding *
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-10 11:10:01.202002 80
GRAB
ATTACK
LFI