# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 79.110.49.161 5 GET /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
Header Value
Content-Length 19
Host 188.245.40.243
User-Agent python-requests/2.25.1
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-07-08 07:04:15.867582 80
ATTACK
OTHER
SCAN
RECON
WEBAPP_VULN
RCE
LFI
2 79.110.49.161 4 GET /.env
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Linux; U; Android 4.4.2; en-US; HM NOTE 1W Build/KOT49H) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/11.0.5.850 U3/0.8.0 Mobile Safari/534.30
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-07-08 07:04:15.864848 80
GRAB
ATTACK
LFI
3 79.110.49.161 4 GET /.env
Header Value
Host 188.245.40.243
User-Agent Mozilla/5.0 (Linux; U; Android 4.4.2; en-US; HM NOTE 1W Build/KOT49H) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 UCBrowser/11.0.5.850 U3/0.8.0 Mobile Safari/534.30
Accept-Encoding gzip, deflate
Accept */*
Connection keep-alive
Parameter Value
False 2024-07-08 06:50:49.612052 80
GRAB
ATTACK
LFI