# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 52.224.223.181 3 GET /.git/HEAD
Header Value
Host www.ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip, br
X-Forwarded-For 52.224.223.181
Cf-Ray 8a9a68cd7fabc953-IAD
X-Forwarded-Proto https
Cf-Visitor {"scheme":"https"}
Sec-Ch-Ua "Not/A)Brand";v="8", "Chromium";v="126", "Microsoft Edge";v="126"
Sec-Ch-Ua-Mobile ?0
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36 Edg/126.0.0.0
Sec-Ch-Ua-Platform "Windows"
Accept */*
Sec-Fetch-Site none
Sec-Fetch-Mode cors
Sec-Fetch-Dest empty
Accept-Language zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Priority u=1, i
Cf-Connecting-Ip 52.224.223.181
Cdn-Loop cloudflare
Cf-Ipcountry US
Parameter Value
False 2024-07-27 06:00:29.314475 80
OTHER