# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 83.147.52.49 4 GET /wp-content/.git/config
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 83.147.52.49
Cf-Ray 8a0580c9dbd6438c-EWR
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Go-http-client/1.1
Cf-Connecting-Ip 83.147.52.49
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-07-09 04:17:13.575873 80
RECON
ATTACK
GRAB
WEBAPP_VULN
2 83.147.52.49 4 GET /wp-content/.git/config
Header Value
Host 188.245.40.243
User-Agent Go-http-client/1.1
Accept-Encoding gzip
Parameter Value
False 2024-07-01 10:06:49.286712 80
RECON
ATTACK
GRAB
WEBAPP_VULN
3 83.147.52.49 4 GET /wp-content/.git/config
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36 Edg/106.0.1370.52
Accept-Charset utf-8
Accept-Encoding gzip
Connection close
Parameter Value
False 2024-07-01 02:36:26.480516 80
RECON
ATTACK
GRAB
WEBAPP_VULN
4 83.147.52.49 4 GET /wp-content/.git/config
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 91.215.85.43
Cf-Ray 881452e85ba3666a-AMS
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1478.0 Safari/537.36
Accept-Charset utf-8
Cf-Connecting-Ip 91.215.85.43
Cdn-Loop cloudflare
Cf-Ipcountry RU
Parameter Value
False 2024-05-09 20:08:51.279342 80
RECON
ATTACK
GRAB
WEBAPP_VULN