# Remote Address Threat Level Method Path Query String Headers Body Acceptable Timestamp Port Request Types Attack Types Analyse Request Other Requests by Actor CSV Dump
1 80.64.30.188 4 GET /login
Header Value
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Edg/115.0.1901.203
Accept-Encoding gzip, deflate, br
Host 188.245.40.243
Connection close
Parameter Value
False 2024-09-22 14:52:03.381508 80
RECON
2 80.64.30.188 4 GET /remote/login
Header Value
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Edg/115.0.1901.203
Accept-Encoding gzip, deflate, br
Host 188.245.40.243
Connection close
Parameter Value
False 2024-09-22 12:37:02.706818 80
RECON
3 80.64.30.188 3 GET /+CSCOE+/logon.html
Header Value
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Edg/115.0.1901.203
Accept-Language ru,en;q=0.9,en-GB;q=0.8,en-US;q=0.7
Cache-Control max-age=0
Accept-Encoding gzip, deflate, br
Cookie sdesktop=
Host 188.245.40.243
Connection close
Parameter Value
False 2024-09-18 09:41:59.260763 80
OTHER
4 80.64.30.188 4 POST /global-protect/login.esp
Header Value
Content-Type application/x-www-form-urlencoded
Content-Length 134
User-Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 Edg/115.0.1901.203
Accept-Encoding gzip, deflate, br
Host 188.245.40.243
Connection close
Parameter Value
False 2024-09-18 09:41:59.258702 80
RECON