# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 172.68.192.148 3 GET /wp-json/ rest_route=/wp/v2/USERS
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 2a01:4f8:c010:a838::1
Cf-Ray 89a273b79b9b1c28-FRA
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.114 Safari/537.36
Cf-Connecting-Ip 2a01:4f8:c010:a838::1
Cdn-Loop cloudflare
Cf-Ipcountry DE
Parameter Value
False 2024-06-27 03:46:47.640207 80
RECON
ATTACK
WEBAPP_VULN