# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 57.128.29.253 4 GET /ads.txt
Header Value
Host ottodanp.dev
Connection Keep-Alive
Accept-Encoding gzip
X-Forwarded-For 57.128.29.253
Cf-Ray 89f115c3a6b33a96-FRA
X-Forwarded-Proto http
Cf-Visitor {"scheme":"http"}
Cf-Ew-Via 15
Cdn-Loop cloudflare; subreqs=1
Accept-Language en-US,en;q=0.5
Accept text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Cache-Control no-cache
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:125.0) Gecko/20100101 Firefox/125.0
Cf-Connecting-Ip 57.128.29.253
Pragma no-cache
Sec-Fetch-Dest document
Sec-Fetch-Mode navigate
Sec-Fetch-Site none
Sec-Fetch-User ?1
Upgrade-Insecure-Requests 1
Cf-Ipcountry FR
Parameter Value
False 2024-07-06 16:48:54.364548 80
GRAB
RECON