# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 91.215.85.43 4 GET /wp-includes/js/.git/config
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.182 Safari/537.36
Accept-Charset utf-8
Accept-Encoding gzip
Connection close
Parameter Value
False 2024-07-01 02:37:00.870964 80
RECON
ATTACK
GRAB
WEBAPP_VULN
RCE
LFI
2 91.215.85.43 4 GET /wp-includes/js/.git/config
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36
Accept-Charset utf-8
Accept-Encoding gzip
Connection close
Parameter Value
False 2024-05-24 23:39:56.973365 80
RECON
ATTACK
GRAB
WEBAPP_VULN
RCE
LFI
3 91.215.85.43 4 GET /wp-includes/js/.git/config
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 91.215.85.43
Cf-Ray 881452e81b5c9d46-DME
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1944.0 Safari/537.36
Accept-Charset utf-8
Cf-Connecting-Ip 91.215.85.43
Cdn-Loop cloudflare
Cf-Ipcountry RU
Parameter Value
False 2024-05-09 20:08:51.312808 80
RECON
ATTACK
GRAB
WEBAPP_VULN
RCE
LFI