# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 162.158.19.168 4 GET /wp-login.php
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 2a05:b680:8:2::156
Cf-Ray 884577556abd0522-OTP
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Mozilla/5.0 (X11; Fedora; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/95.0
Cf-Connecting-Ip 2a05:b680:8:2::156
Cdn-Loop cloudflare
Cf-Ipcountry RO
Parameter Value
False 2024-05-15 19:17:05.657941 80
RECON
ATTACK
SCAN
WEBAPP_VULN