Proxy Request e3398d09-47e7-4197-b5eb-c7c495f80e9c

Parent Attack e571fb1f-64f4-421d-ac2b-968eb83c3af4
Date 2020-04-24 10:52:18AM
URL
185.209.22.211/vneza.php
Form Data []
Headers ["User-Agent: Java/1.8.0_152", "Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2", "Connection: keep-alive"]
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> 
    <head> 
	<title>AZ Environment variables 1.04</title> 
    </head> 
<body> 
<pre> 
HTTP_HOST = 185.209.22.211
HTTP_X_FORWARDED_FOR = 194.71.109.44
HTTP_CONNECTION = close
HTTP_USER_AGENT = Java/1.8.0_152
HTTP_ACCEPT = text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
HTTP_ACCEPT_ENCODING = gzip
REMOTE_ADDR = 194.71.109.44
REQUEST_SCHEME = http
REMOTE_PORT = 53214
REQUEST_METHOD = GET
REQUEST_URI = /vneza.php
REQUEST_TIME_FLOAT = 1551778964.926
REQUEST_TIME = 1551778964
 
</pre> 
</body> 
</html>
© 2021 threat.gg