# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 185.214.97.248 3 GET /simple.php p=2f686f6d652f7074317464616379696b39722f7075626c69635f68746d6c&tod=75706c6f6164
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 185.214.97.248
Cf-Ray 8b00b8fc8fcd99c8-CDG
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.102 Safari/537.36
Accept */*
Cf-Connecting-Ip 185.214.97.248
Cdn-Loop cloudflare
Cf-Ipcountry ES
Parameter Value
False 2024-08-08 16:01:00.948473 80
ATTACK
SCAN
RECON
WEBAPP_VULN