# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 104.234.140.74 4 GET /phpinfo
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept-Encoding *
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-10 11:10:41.777405 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 104.234.140.74 4 POST /docker/.env
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept-Encoding *
Accept */*
Connection keep-alive
Content-Length 20
Content-Type application/x-www-form-urlencoded
Parameter Value
False 2024-05-10 11:09:52.632040 80
GRAB
ATTACK
LFI
3 104.234.140.74 4 GET /.env.prod
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (X11; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept-Encoding *
Accept */*
Connection keep-alive
Parameter Value
False 2024-05-10 11:09:16.330728 80
GRAB
ATTACK
LFI
4 104.234.140.74 4 POST /lib/phpunit/src/Util/PHP/eval-stdin.php
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.82 Safari/537.36
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Content-Length 29
Parameter Value
False 2024-05-10 11:09:08.476869 80
ATTACK
SCAN
RECON
WEBAPP_VULN
RCE
LFI