# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 172.69.192.210 3 GET /flask-recon/hosts-by-endpoint/wp-admin/admin-ajax.php action=add_custom_font
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 2a03:6f00:1::5c35:6025
Cf-Ray 89f72bc91a35a878-RIX
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
User-Agent Mozilla/5.0 (iPad; CPU OS 5_0 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9A334 Safari/7534.48.3
Cf-Connecting-Ip 2a03:6f00:1::5c35:6025
Cdn-Loop cloudflare
Cf-Ipcountry RU
Parameter Value
False 2024-07-07 10:32:30.963502 80
RECON
ATTACK
SCAN
WEBAPP_VULN