# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 172.71.102.103 2 GET /flask_recon/host host=
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 2a02:a460:2668:1:5dad:55a9:c4be:6cf9
Cf-Ray 8a6a2c6a45536656-AMS
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
Cf-Ew-Via 15
Cdn-Loop cloudflare; subreqs=1
Accept-Language en-US,en;q=0.5
Accept text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/png,image/svg+xml,*/*;q=0.8
Referer https://www.ottodanp.dev/flask-recon/hosts-by-endpoint?endpoint=/fonts/ftnt-icons.woff
User-Agent Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:128.0) Gecko/20100101 Firefox/128.0
Cf-Connecting-Ip 2a02:a460:2668:1:5dad:55a9:c4be:6cf9
Cf-Pseudo-Ipv4 246.8.111.1
Priority u=0, i
Sec-Fetch-Dest document
Sec-Fetch-Mode navigate
Sec-Fetch-Site same-origin
Sec-Fetch-User ?1
Upgrade-Insecure-Requests 1
Cf-Ipcountry NL
Parameter Value
False 2024-07-21 09:30:39.132970 80
OTHER