Proxy Request 98986017-6b64-418f-8869-ad688734c4d6

Parent Attack e2d4cd5a-c9cc-4f55-bdfb-a5c49a635c98
Date 2019-03-16 11:08:07AM
URL
xchecker.net/proxy2017/http/engine16.php
Form Data ["xrumer: inside"]
Headers ["Content-Type: application/x-www-form-urlencoded", "Pragma: no-cache", "Referer: /proxy2017/http/engine16.php", "User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0", "Accept: */*", "Cache-Control: no-cache", "Connection: close", "Content-Length: 13"]
 


<p>
ProxyChecker Script Engine <b>ver.2.0</b>
</p>
<form method="post">
<input type="text" name="zpost" value="inside">
<input type="submit" value="Check POST method">
Click here for test engine.php: <small><a href="engine.php?list=check">Check script for problems</a></small><br><br>
</form>
<small>Header values list:</small><hr><i><small>HTTP_HOST: xchecker.net
HTTP_USER_AGENT: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
HTTP_ACCEPT: */*
HTTP_CACHE_CONTROL: no-cache
HTTP_CONNECTION: close
HTTP_PRAGMA: no-cache
HTTP_REFERER: /proxy2017/http/engine16.php
HTTP_ACCEPT_ENCODING: gzip
REMOTE_ADDR: 109.70.100.25
REMOTE_PORT: 59981
FLASHWM.NET
</small></i><hr>
© 2021 threat.gg