# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 104.248.148.107 3 GET /wordpress/wp-admin/setup-config.php step=1
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 104.248.148.107
Cf-Ray 89cb77cb4bff5e40-SIN
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Apache/2.4.34 (Ubuntu) OpenSSL/1.1.1 (internal dummy connection)
Cf-Connecting-Ip 104.248.148.107
Cdn-Loop cloudflare
Cf-Ipcountry SG
Parameter Value
False 2024-07-02 03:14:50.501481 80
RECON
ATTACK
GRAB
SCAN
WEBAPP_VULN
2 104.248.148.107 3 GET /wp-admin/setup-config.php step=1
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 104.248.148.107
Cf-Ray 89cb77c7d8be5e40-SIN
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Apache/2.4.34 (Ubuntu) OpenSSL/1.1.1 (internal dummy connection)
Cf-Connecting-Ip 104.248.148.107
Cdn-Loop cloudflare
Cf-Ipcountry SG
Parameter Value
False 2024-07-02 03:14:50.498684 80
RECON
ATTACK
GRAB
SCAN
WEBAPP_VULN