# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 165.227.111.8 3 GET /script
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; Media Center PC 6.0; InfoPath.3; MS-RTC LM 8; Zune 4.7)
Accept-Charset utf-8
Accept-Encoding gzip
Connection close
Parameter Value
False 2024-05-06 23:17:54.452916 80
OTHER
2 165.227.111.8 3 GET /cluster/cluster/
Header Value
Host 167.172.53.140
User-Agent Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
Accept-Charset utf-8
Accept-Encoding gzip
Connection close
Parameter Value
False 2024-05-05 14:25:44.947743 80
OTHER
3 165.227.111.8 4 GET /phpmyadmin/index.php
Header Value
Host 167.172.53.140
User-Agent Mediapartners-Google
Accept-Charset utf-8
Accept-Encoding gzip
Connection close
Parameter Value
False 2024-05-05 14:25:44.460278 80
RECON
ATTACK
SCAN
WEBAPP_VULN