# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 173.244.35.231 3 GET /client/static/icon/hangqingicon.png
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 173.244.35.231
Cf-Ray 8aa8395add4e43b9-FRA
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Accept */*
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Cache-Control max-age=259200
Cf-Connecting-Ip 173.244.35.231
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-07-28 22:14:46.294432 80
OTHER