# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 162.243.164.96 2 GET /teorema505 t=1
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-09 12:06:53.988532 80
OTHER
2 162.243.164.96 3 GET /t4
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-09 12:06:50.767460 80
OTHER
3 162.243.164.96 4 GET /alive.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-09 12:06:50.210693 80
ATTACK
SCAN
RECON
WEBAPP_VULN
4 162.243.164.96 5 GET /ab2h
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 zgrab/0.x
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-09 12:06:49.632228 80
SCAN
ATTACK
MULTIPLE
5 162.243.164.96 5 GET /ab2g
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 zgrab/0.x
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-07-09 12:06:49.629924 80
SCAN
ATTACK
MULTIPLE