# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 104.248.191.107 4 GET /password.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-25 19:34:12.281390 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 104.248.191.107 4 GET /systembc/password.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-25 19:34:11.795206 80
ATTACK
SCAN
RECON
RCE
LFI
WEBAPP_VULN
3 104.248.191.107 4 GET /1.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-25 19:34:10.820326 80
ATTACK
SCAN
RECON
WEBAPP_VULN
4 104.248.191.107 3 GET /geoip/
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-25 19:34:10.003102 80
OTHER
5 104.248.191.107 4 GET /upl.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-25 19:34:09.515276 80
ATTACK
SCAN
RECON
WEBAPP_VULN
6 104.248.191.107 4 GET /form.html
Header Value
Host 188.245.40.243
User-Agent curl/8.1.2
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-25 19:34:09.512957 80
OTHER