# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 165.227.231.168 2 GET /teorema505 t=1
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-10-03 21:22:34.121944 80
OTHER
2 165.227.231.168 3 GET /t4
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-10-03 21:22:33.371596 80
OTHER
3 165.227.231.168 4 GET /alive.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-10-03 21:22:33.226013 80
ATTACK
SCAN
RECON
WEBAPP_VULN
4 165.227.231.168 5 GET /ab2h
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 zgrab/0.x
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-10-03 21:22:33.083739 80
SCAN
ATTACK
MULTIPLE
5 165.227.231.168 5 GET /ab2g
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 zgrab/0.x
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-10-03 21:22:33.081073 80
SCAN
ATTACK
MULTIPLE