# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 189.40.80.254 3 GET /wp-json/ rest_route=/wp/v2/USERS
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 189.40.80.254
Cf-Ray 899b9ee10e35a19a-GRU
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.93 Safari/537.36 Edg/90.0.818.56
Cf-Connecting-Ip 189.40.80.254
Cdn-Loop cloudflare
Cf-Ipcountry BR
Parameter Value
False 2024-06-26 07:52:55.752276 80
RECON
ATTACK
WEBAPP_VULN