Proxy Request fa07af26-b8db-4cf5-a00b-b23ccb101a3f

Parent Attack 74ba7288-6977-4cdc-884e-986848adb3b6
Date 2019-03-16 02:57:55PM
URL
xchecker.net/proxy2017/http/engine16.php
Form Data ["xrumer: inside"]
Headers ["Pragma: no-cache", "Referer: /proxy2017/http/engine16.php", "User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0", "Accept: */*", "Cache-Control: no-cache", "Connection: close", "Content-Length: 13", "Content-Type: application/x-www-form-urlencoded"]
 


<p>
ProxyChecker Script Engine <b>ver.2.0</b>
</p>
<form method="post">
<input type="text" name="zpost" value="inside">
<input type="submit" value="Check POST method">
Click here for test engine.php: <small><a href="engine.php?list=check">Check script for problems</a></small><br><br>
</form>
<small>Header values list:</small><hr><i><small>HTTP_HOST: xchecker.net
HTTP_USER_AGENT: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:16.0) Gecko/20100101 Firefox/16.0
HTTP_ACCEPT: */*
HTTP_CACHE_CONTROL: no-cache
HTTP_CONNECTION: close
HTTP_PRAGMA: no-cache
HTTP_REFERER: /proxy2017/http/engine16.php
HTTP_ACCEPT_ENCODING: gzip
REMOTE_ADDR: 109.70.100.25
REMOTE_PORT: 59981
FLASHWM.NET
</small></i><hr>
© 2021 threat.gg