# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 172.70.247.146 4 GET /flask-recon/user/login
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 2605:6400:30:f8d5::1
Cf-Ray 8aa7be4ccb821db3-FRA
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
Accept */*
Cf-Connecting-Ip 2605:6400:30:f8d5::1
Cdn-Loop cloudflare
Cf-Pseudo-Ipv4 241.33.86.67
Cf-Ipcountry T1
Parameter Value
False 2024-07-28 20:50:45.936138 80
RECON