Proxy Request ed84521f-8783-4a63-a996-43f5d34c5cdb

Parent Attack dc71c079-743e-4ef4-a111-8359a7503f54
Date 2020-09-30 05:25:13AM
URL
azenv.net/
Form Data []
Headers ["Connection: close", "Content-Length: 0", "Cookie: cookie=ok", "Pragma: no-cache", "Referer: https://www.google.com/", "Accept: */*", "Accept-Encoding: gzip, deflate", "Cache-Control: no-cache", "User-Agent: PxBroker/0.3.2/4190"]
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
<head>
<title>AZ Environment variables 1.04</title>
<meta name="keywords" content="proxyjudge, proxy judge, azenv proxy judge, azenv.php" />
</head>
<body>
<h1>PHP Proxy Judge</h1>
<pre>
HTTP_HOST = azenv.net
HTTP_CONNECTION = close
HTTP_USER_AGENT = Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0
HTTP_PROXY_CONNECTION = Keep-Alive
HTTP_ACCEPT_ENCODING = gzip
REMOTE_ADDR = 35.0.127.52
REQUEST_SCHEME = http
REMOTE_PORT = 34124
REQUEST_METHOD = GET
REQUEST_URI = /
REQUEST_TIME_FLOAT = 1542333956.775
REQUEST_TIME = 1542333956
</pre>
</body>
</html>
© 2021 threat.gg