# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 34.0.133.250 4 GET /ads.txt
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 34.0.133.250
Cf-Ray 899de89f62af4690-DFW
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Cf-Ew-Via 15
Cdn-Loop cloudflare; subreqs=1
Accept-Language en-US,en;q=0.9,es;q=0.8
Accept text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Cache-Control max-age=0
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko; compatible; BW/1.2; rb.gy/oupwis) Chrome/124.0.0.0 Safari/537.36
Cf-Connecting-Ip 34.0.133.250
Sec-Fetch-Dest document
Sec-Fetch-Mode cors
Sec-Fetch-Site none
Sec-Fetch-User ?1
Upgrade-Insecure-Requests 1
Cf-Ipcountry US
Parameter Value
False 2024-06-26 14:32:47.471514 80
GRAB
RECON