Proxy Request 06db8e2f-7922-4429-b81b-442389861e9d

Parent Attack b1ed2101-12f9-4e6a-8d1d-46e4963ba10c
Date 2020-07-13 04:32:55AM
URL
185.209.22.211/vneza.php
Form Data []
Headers ["Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2", "Connection: keep-alive", "User-Agent: Java/1.8.0_152"]
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> 
    <head> 
	<title>AZ Environment variables 1.04</title> 
    </head> 
<body> 
<pre> 
HTTP_HOST = 185.209.22.211
HTTP_X_FORWARDED_FOR = 194.71.109.44
HTTP_CONNECTION = close
HTTP_USER_AGENT = Java/1.8.0_152
HTTP_ACCEPT = text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
HTTP_ACCEPT_ENCODING = gzip
REMOTE_ADDR = 194.71.109.44
REQUEST_SCHEME = http
REMOTE_PORT = 53214
REQUEST_METHOD = GET
REQUEST_URI = /vneza.php
REQUEST_TIME_FLOAT = 1551778964.926
REQUEST_TIME = 1551778964
 
</pre> 
</body> 
</html>
© 2021 threat.gg