# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 78.142.18.92 4 GET /test.php
Header Value
Host 188.245.40.243
Accept */*
User-Agent Mozilla/5.0 (Macintosh; U; PPC Mac OS X; it-it) AppleWebKit/312.5.1 (KHTML, like Gecko) Safari/312.3.1
Parameter Value
False 2024-09-27 04:32:11.277144 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 78.142.18.92 5 GET /test.php
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 78.142.18.92
Cf-Ray 89d47131abcf66d2-AMS
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Accept */*
User-Agent python-requests/2.27.1
Cf-Connecting-Ip 78.142.18.92
Cdn-Loop cloudflare
Cf-Ipcountry BG
Parameter Value
False 2024-07-03 04:01:29.235253 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN