# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 94.156.71.118 4 POST /phpMyAdmin/scripts/setup.php
Header Value
Te deflate,gzip;q=0.3
Keep-Alive 300
Connection Keep-Alive, TE
Host 167.172.53.140
Referer http://167.172.53.140/phpMyAdmin/scripts/setup.php
User-Agent Mozilla/4.0 (compatible; MSIE 6.0; MSIE 5.5; Windows NT 5.1) Opera 7.01 [en]
Content-Type application/x-www-form-urlencoded
Content-Length 201
Parameter Value
False 2024-05-11 21:23:39.865264 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 94.156.71.118 4 GET /phpMyAdmin/scripts/setup.php
Header Value
Te deflate,gzip;q=0.3
Keep-Alive 300
Connection Keep-Alive, TE
Host 167.172.53.140
User-Agent Mozilla/4.0 (compatible; MSIE 6.0; MSIE 5.5; Windows NT 5.1) Opera 7.01 [en]
Parameter Value
False 2024-05-11 21:23:39.862945 80
ATTACK
SCAN
RECON
WEBAPP_VULN