Proxy Request e94ffe8f-03b4-4937-b95a-eb729371d5c3

Parent Attack 75a0a60a-a489-4d86-ba4c-ed42e76fdc58
Date 2020-07-13 04:17:52AM
URL
185.209.22.211/vneza.php
Form Data []
Headers ["Accept: text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2", "Connection: keep-alive", "User-Agent: Java/1.8.0_152"]
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> 
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> 
    <head> 
	<title>AZ Environment variables 1.04</title> 
    </head> 
<body> 
<pre> 
HTTP_HOST = 185.209.22.211
HTTP_X_FORWARDED_FOR = 194.71.109.44
HTTP_CONNECTION = close
HTTP_USER_AGENT = Java/1.8.0_152
HTTP_ACCEPT = text/html, image/gif, image/jpeg, *; q=.2, */*; q=.2
HTTP_ACCEPT_ENCODING = gzip
REMOTE_ADDR = 194.71.109.44
REQUEST_SCHEME = http
REMOTE_PORT = 53214
REQUEST_METHOD = GET
REQUEST_URI = /vneza.php
REQUEST_TIME_FLOAT = 1551778964.926
REQUEST_TIME = 1551778964
 
</pre> 
</body> 
</html>
© 2021 threat.gg