# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 170.64.200.221 4 GET /wp2/wp-includes/wlwmanifest.xml
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 170.64.200.221
Cf-Ray 8a7764d3448ea7ff-SYD
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Cf-Ew-Via 15
Cdn-Loop cloudflare; subreqs=1
Accept-Language en-US,en;q=0.5
Accept text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Cf-Connecting-Ip 170.64.200.221
Cf-Ipcountry AU
Parameter Value
False 2024-07-23 00:01:03.954016 80
ATTACK
RECON
WEBAPP_VULN
RCE
LFI
2 170.64.200.221 4 GET /wp2/wp-includes/wlwmanifest.xml
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 170.64.200.221
Cf-Ray 8a6d2f61071e574b-SYD
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Cf-Ew-Via 15
Cdn-Loop cloudflare; subreqs=1
Accept-Language en-US,en;q=0.5
Accept text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Cf-Connecting-Ip 170.64.200.221
Cf-Ipcountry AU
Parameter Value
False 2024-07-21 18:16:57.274529 80
ATTACK
RECON
WEBAPP_VULN
RCE
LFI