# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 103.102.228.23 4 GET /.env
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 103.102.228.23
Cf-Ray 883d970feb4a6ebb-CDG
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/72.0.3626.96 Safari/537.36
Accept-Charset utf-8
Cf-Connecting-Ip 103.102.228.23
Cdn-Loop cloudflare
Cf-Ipcountry FR
Parameter Value
False 2024-05-14 20:18:23.494781 80
GRAB
ATTACK
LFI
2 103.102.228.23 4 GET /.env
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 103.102.228.23
Cf-Ray 88336735cbb22a7a-CDG
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Linux; Android 7.0; SAMSUNG SM-G925R6 Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) SamsungBrowser/5.4 Chrome/51.0.2704.106 Mobile Safari/537.36
Accept-Charset utf-8
Cf-Connecting-Ip 103.102.228.23
Cdn-Loop cloudflare
Cf-Ipcountry FR
Parameter Value
False 2024-05-13 14:40:21.456300 80
GRAB
ATTACK
LFI