# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 49.13.14.123 5 GET /.env
Header Value
Host 188.245.40.243
User-Agent python-requests/2.22.0
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-08-10 06:15:42.113130 80
OTHER
GRAB
ATTACK
LFI
2 49.13.14.123 5 GET /.env
Header Value
Host 188.245.40.243
User-Agent python-requests/2.22.0
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-08-10 05:11:50.449073 80
OTHER
GRAB
ATTACK
LFI
3 49.13.14.123 5 GET /_profiler/phpinfo
Header Value
Host 188.245.40.243
User-Agent python-requests/2.22.0
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-08-10 00:46:03.404604 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN
4 49.13.14.123 5 GET /_profiler/phpinfo
Header Value
Host 188.245.40.243
User-Agent python-requests/2.22.0
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-08-10 00:44:52.764028 80
OTHER
ATTACK
SCAN
RECON
WEBAPP_VULN