# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 44.213.121.182 3 GET /dist/js/bootstrap.bundle.min.js
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 44.213.121.182
Cf-Ray 898a4c4e58a7878b-IAD
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0.1) Gecko/20100101 Firefox/7.0.1
Accept-Charset utf-8
Cf-Connecting-Ip 44.213.121.182
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-06-24 05:24:44.445280 80
GRAB
SCAN
RECON
2 44.213.121.182 3 GET /cdn.js
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 44.213.121.182
Cf-Ray 898a4b0fefa9395b-IAD
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
User-Agent Mozilla/5.0 (Maemo; Linux armv7l; rv:2.0.1) Gecko/20100101 Firefox/4.0.1 Fennec/2.0.1
Accept-Charset utf-8
Cf-Connecting-Ip 44.213.121.182
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-06-24 05:24:44.443189 80
GRAB
SCAN
RECON