# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 40.77.167.1 3 GET /sitemap.xml.gz
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 40.77.167.1
Cf-Ray 8c9811493d7b43a3-FRA
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
Accept */*
From bingbot(at)microsoft.com
User-Agent Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm) Chrome/116.0.1938.76 Safari/537.36
Cf-Connecting-Ip 40.77.167.1
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry US
Parameter Value
False 2024-09-27 01:58:30.921248 80
OTHER
2 40.77.167.1 3 GET /flask-recon/
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 40.77.167.1
Cf-Ray 8a443f93cf5a9c76-IAD
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
From bingbot(at)microsoft.com
Accept */*
User-Agent Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; bingbot/2.0; +http://www.bing.com/bingbot.htm) Chrome/116.0.1938.76 Safari/537.36
Cf-Connecting-Ip 40.77.167.1
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-07-16 19:02:45.391737 80
OTHER