# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 78.142.18.92 4 GET /wp-includes/
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 78.142.18.92
Cf-Ray 8af357479f161c7c-AMS
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Accept */*
User-Agent Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36
Cf-Connecting-Ip 78.142.18.92
Cdn-Loop cloudflare
Cf-Ipcountry BG
Parameter Value
False 2024-08-07 01:02:17.962839 80
ATTACK
RECON
WEBAPP_VULN
RCE
LFI
2 78.142.18.92 4 GET /wp-includes/
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 78.142.18.92
Cf-Ray 89faf54dfd0db97b-AMS
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Accept */*
User-Agent Mozlila/5.0 (Linux; Android 7.0; SM-G892A Bulid/NRD90M; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/60.0.3112.107 Moblie Safari/537.36
Cf-Connecting-Ip 78.142.18.92
Cdn-Loop cloudflare
Cf-Ipcountry BG
Parameter Value
False 2024-07-07 21:34:21.226373 80
ATTACK
RECON
WEBAPP_VULN
RCE
LFI