# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 46.23.108.242 5 GET /phpMyAdmin/scripts/setup.php
Header Value
Accept */*
Accept-Language en-us
Accept-Encoding gzip, deflate
Host 167.172.53.140
Connection Close
Parameter Value
False 2024-05-15 10:18:20.117710 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 46.23.108.242 5 GET /phpMyAdmin/scripts/setup.php
Header Value
Accept */*
Accept-Language en-us
Accept-Encoding gzip, deflate
Host 167.172.53.140
Connection Close
Parameter Value
False 2024-05-14 16:51:52.914282 80
ATTACK
SCAN
RECON
WEBAPP_VULN
3 46.23.108.242 5 GET /phpMyAdmin/scripts/setup.php
Header Value
Accept */*
Accept-Language en-us
Accept-Encoding gzip, deflate
Host 167.172.53.140
Connection Close
Parameter Value
False 2024-05-12 03:08:35.267456 80
ATTACK
SCAN
RECON
WEBAPP_VULN
4 46.23.108.242 5 GET /phpMyAdmin/scripts/setup.php
Header Value
Accept */*
Accept-Language en-us
Accept-Encoding gzip, deflate
Host 167.172.53.140
Connection Close
Parameter Value
False 2024-05-10 06:49:26.263205 80
ATTACK
SCAN
RECON
WEBAPP_VULN
5 46.23.108.242 5 GET /phpMyAdmin/scripts/setup.php
Header Value
Accept */*
Accept-Language en-us
Accept-Encoding gzip, deflate
Host 167.172.53.140
Connection Close
Parameter Value
False 2024-05-05 14:25:45.590829 80
ATTACK
SCAN
RECON
WEBAPP_VULN
6 46.23.108.242 5 GET /phpMyAdmin/scripts/setup.php
Header Value
Accept */*
Accept-Language en-us
Accept-Encoding gzip, deflate
Host 167.172.53.140
Connection Close
Parameter Value
False 2024-05-05 14:25:44.073707 80
ATTACK
SCAN
RECON
WEBAPP_VULN