# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 45.156.130.8 4 GET /status.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-06-29 07:54:04.300699 80
ATTACK
SCAN
RECON
WEBAPP_VULN
2 45.156.130.8 4 GET /owncloud/status.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-06-29 07:44:40.175264 80
ATTACK
SCAN
RECON
WEBAPP_VULN
3 45.156.130.8 4 GET /status.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-06-29 02:29:58.151443 80
ATTACK
SCAN
RECON
WEBAPP_VULN
4 45.156.130.8 4 GET /owncloud/status.php
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
Accept */*
Accept-Encoding gzip
Parameter Value
False 2024-06-29 02:29:58.149012 80
ATTACK
SCAN
RECON
WEBAPP_VULN