# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 44.196.118.6 2 GET /flask_recon/host host=
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 44.196.118.6
Cf-Ray 8c9af10da8b22e54-DFW
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/600.2.5 (KHTML, like Gecko) Version/8.0.2 Safari/600.2.5 (Amazonbot/0.1; +https://developer.amazon.com/support/amazonbot)
Cf-Connecting-Ip 44.196.118.6
Cdn-Loop cloudflare; loops=1
Cf-Ipcountry US
Parameter Value
False 2024-09-27 10:51:59.341525 80
OTHER