Proxy Request ded7159b-a718-42aa-9a13-5ee41da22c81

Parent Attack baf6666e-047c-473b-9715-69e5eb1b5853
Date 2019-03-16 01:09:05PM
URL
xchecker.net/proxy2017/http/engine16.php
Form Data ["xrumer: inside"]
Headers ["Referer: /proxy2017/http/engine16.php", "User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0", "Accept: */*", "Cache-Control: no-cache", "Connection: close", "Content-Length: 13", "Content-Type: application/x-www-form-urlencoded", "Pragma: no-cache"]
 


<p>
ProxyChecker Script Engine <b>ver.2.0</b>
</p>
<form method="post">
<input type="text" name="zpost" value="inside">
<input type="submit" value="Check POST method">
Click here for test engine.php: <small><a href="engine.php?list=check">Check script for problems</a></small><br><br>
</form>
<small>Header values list:</small><hr><i><small>HTTP_HOST: xchecker.net
HTTP_USER_AGENT: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
HTTP_ACCEPT: */*
HTTP_CACHE_CONTROL: no-cache
HTTP_CONNECTION: close
HTTP_PRAGMA: no-cache
HTTP_REFERER: /proxy2017/http/engine16.php
HTTP_ACCEPT_ENCODING: gzip
REMOTE_ADDR: 109.70.100.25
REMOTE_PORT: 59981
FLASHWM.NET
</small></i><hr>
© 2021 threat.gg