# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 18.205.41.114 3 GET /a.nel.cloud
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 18.205.41.114
Cf-Ray 8c5793ba7c9907f1-IAD
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 YaBrowser/18.11.1.715 (beta) Yowser/2.5 Safari/537.36
Accept-Charset utf-8
Cf-Connecting-Ip 18.205.41.114
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry US
Parameter Value
False 2024-09-19 06:39:10.590479 80
OTHER
2 18.205.41.114 3 GET /dist/js/bootstrap.bundle.min.js
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 18.205.41.114
Cf-Ray 8c5793baaf445b41-FRA
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/4.0 (compatible; MSIE 6.0; Windows CE; IEMobile 6.12; Microsoft ZuneHD 4.3)
Accept-Charset utf-8
Cf-Connecting-Ip 18.205.41.114
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry US
Parameter Value
False 2024-09-19 06:39:10.565079 80
GRAB
SCAN
RECON
3 18.205.41.114 3 GET /cdn.js
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 18.205.41.114
Cf-Ray 8c5793ba6d452070-FRA
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (compatible; MSIE 9.0; Windows Phone OS 7.5; Trident/5.0; IEMobile/9.0)
Accept-Charset utf-8
Cf-Connecting-Ip 18.205.41.114
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry US
Parameter Value
False 2024-09-19 06:39:10.562849 80
GRAB
SCAN
RECON