Skip to content

L1337Xi/Streamlit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

Streamlit

Log Data Analyzer using Streamlit ACCESS LOGDATA ANALAYZER REPORT aswajithj14@gmail.com

1.1 Introduction

  1. An access log refers to a log file records information of access attempts to a network, system or a web application. It is important source of information for monitoring and analyzing security-related events.
  2. Access log contains details about various activities such as:
  3. User Authentication: It records and keeps the information such as the records of successful and unsuccessful login attempts which includes usernames, IP addresses, time and authentication results.
  4. Resource Access: Information about accessed files/ directories, or URLs loggins, along with IP address, details of accessed resource (examples: filename, URL path).
  5. Actions and Operation made by user or system: Logs may capture the specific action performed by user or system (examples: creating file, modifying, or deleting files or database).
  6. Errors and Exceptions: Logs also counts or stores the information about encountered errors, execeptions providing insights into potential security issues, system misconfigurations, or application vulnerabilities.

1.2 Objective The objective of this project is to develop a log data analyzer tool that coverts access logs into a visual graph format using the streamlit. This tool aims to provide a user-friendly interface for analyzing log data and presenting it in a intuitive and informative manner. the objective is to create an interactive web application that allows users to gain insights into the distribution of IP addresses and response codes present in the log data. 1.3 Analyzing Log Data Using Python

  1. Log Data Parsing: Implement a function to parse the access log data and extract relevant information, such as IP address, Response Code, Date and User-Agent. Regular expressions will be utilized to match and extract the required data from each log entry.
  2. Data Manipulation: Utilized to match and extracted log data and store it in a structured format. create a DataFrame to organize the log entries with appropriate column such as 'IP Address', 'Response Code', 'Date', and 'User Agent'
  3. Streamlit Web Application: Utilize the Streamlit framework to create a web-based interface for the log data analyzer tool. Design the user interface to display the parsed log data in a tabular format, allowing users to easily explore and analyze the data.
  4. Graph Visualization: Utilize the Altair library, compatible with Streamlit, to generate a graph that visually represents the distribution of IP addresses and response codes.
  5. Access Log Data: 49.37.227.53 - - [05/Jun/2023:14:24:45 +0000] "GET / HTTP/1.1" 200 396 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:24:45 +0000] "GET /favicon.ico HTTP/1.1" 404 134 "http://43.205.94.67/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:37:14 +0000] "GET / HTTP/1.1" 200 396 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:37:32 +0000] "GET / HTTP/1.1" 302 0 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:37:32 +0000] "GET /login.php HTTP/1.1" 200 698 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:37:33 +0000] "GET /dvwa/css/login.css HTTP/1.1" 200 406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:37:33 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:46:45 +0000] "GET /login.php HTTP/1.1" 200 700 "-" "PostmanRuntime/7.32.2" 49.37.227.53 - - [05/Jun/2023:14:46:56 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "PostmanRuntime/7.32.2" 49.37.227.53 - - [05/Jun/2023:14:47:52 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Hello I`m a Hacker" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /setup.php HTTP/1.1" 200 1698 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/css/main.css HTTP/1.1" 200 1109 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/js/dvwaPage.js HTTP/1.1" 200 466 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/js/add_event_listeners.js HTTP/1.1" 200 276 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/images/spanner.png HTTP/1.1" 200 464 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/images/logo.png HTTP/1.1" 200 5044 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/js/dvwaPage.js HTTP/1.1" 200 466 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /favicon.ico HTTP/1.1" 499 0 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:06 +0000] "GET /dvwa/js/add_event_listeners.js HTTP/1.1" 200 276 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:28 +0000] "GET /instructions.php HTTP/1.1" 200 4811 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:39 +0000] "GET /instructions.php?doc=PDF HTTP/1.1" 200 809 "http://43.205.94.67/instructions.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:42 +0000] "GET /instructions.php?doc=changelog HTTP/1.1" 200 3407 "http://43.205.94.67/instructions.php?doc=PDF" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:49:44 +0000] "GET /instructions.php?doc=readme HTTP/1.1" 200 4811 "http://43.205.94.67/instructions.php?doc=changelog" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:06 +0000] "GET /vulnerabilities/ HTTP/1.1" 200 645 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:06 +0000] "GET /icons/blank.gif HTTP/1.1" 200 148 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:06 +0000] "GET /icons/back.gif HTTP/1.1" 200 216 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:06 +0000] "GET /icons/folder.gif HTTP/1.1" 200 225 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:06 +0000] "GET /icons/unknown.gif HTTP/1.1" 200 245 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:06 +0000] "GET /favicon.ico HTTP/1.1" 200 1406 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 87.236.176.184 - - [05/Jun/2023:14:51:15 +0000] "GET / HTTP/1.1" 302 0 "-" "Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" 87.236.176.184 - - [05/Jun/2023:14:51:16 +0000] "GET /login.php HTTP/1.1" 200 699 "http://43.205.94.67" "Mozilla/5.0 (compatible; InternetMeasurement/1.0; +https://internet-measurement.com/)" 49.37.227.53 - - [05/Jun/2023:14:51:16 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 302 0 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:16 +0000] "GET /login.php HTTP/1.1" 200 698 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:16 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:20 +0000] "GET /vulnerabilities/captcha/ HTTP/1.1" 302 0 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:21 +0000] "GET /login.php HTTP/1.1" 200 698 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:25 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:25 +0000] "GET /setup.php HTTP/1.1" 200 1698 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:37 +0000] "POST /setup.php HTTP/1.1" 302 0 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:38 +0000] "GET /setup.php HTTP/1.1" 200 1833 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:43 +0000] "GET /login.php HTTP/1.1" 200 699 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:48 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:48 +0000] "GET /index.php HTTP/1.1" 200 2685 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:51:57 +0000] "GET /vulnerabilities/csrf/ HTTP/1.1" 200 1400 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:52:11 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/vulnerabilities/csrf/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 35.237.4.214 - - [05/Jun/2023:14:52:32 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 302 0 "-" "Mozilla/5.0 (compatible; Discordbot/2.0; +https://discordapp.com)" 35.237.4.214 - - [05/Jun/2023:14:52:32 +0000] "GET /login.php HTTP/1.1" 200 1523 "-" "Mozilla/5.0 (compatible; Discordbot/2.0; +https://discordapp.com)" 49.37.227.53 - - [05/Jun/2023:14:52:34 +0000] "GET /vulnerabilities/ HTTP/1.1" 200 645 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:52:37 +0000] "GET /vulnerabilities/javascript/ HTTP/1.1" 200 3264 "http://43.205.94.67/vulnerabilities/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 183.82.29.72 - - [05/Jun/2023:14:52:46 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 302 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:52:46 +0000] "GET /login.php HTTP/1.1" 200 698 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:52:46 +0000] "GET /dvwa/css/login.css HTTP/1.1" 200 406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:52:47 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:52:47 +0000] "GET /favicon.ico HTTP/1.1" 200 1406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:52:52 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 302 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:52:52 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:52:52 +0000] "GET /dvwa/css/login.css HTTP/1.1" 200 406 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:52:52 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:52:52 +0000] "GET /favicon.ico HTTP/1.1" 200 1406 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:52:52 +0000] "GET /login.php HTTP/1.1" 200 700 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 49.37.227.53 - - [05/Jun/2023:14:52:55 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/javascript/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:52:56 +0000] "GET /vulnerabilities/exec/ HTTP/1.1" 200 1364 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 49.37.227.53 - - [05/Jun/2023:14:52:58 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/113.0" 183.82.29.72 - - [05/Jun/2023:14:53:07 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:53:07 +0000] "GET /index.php HTTP/1.1" 200 2685 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:53:08 +0000] "GET /dvwa/css/main.css HTTP/1.1" 200 1109 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:53:08 +0000] "GET /dvwa/js/dvwaPage.js HTTP/1.1" 200 466 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:53:08 +0000] "GET /dvwa/js/add_event_listeners.js HTTP/1.1" 200 276 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:53:08 +0000] "GET /dvwa/images/logo.png HTTP/1.1" 200 5044 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 49.37.227.53 - - [05/Jun/2023:14:53:44 +0000] "GET /index.php HTTP/1.1" 302 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" 49.37.227.53 - - [05/Jun/2023:14:53:44 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" 49.37.227.53 - - [05/Jun/2023:14:53:45 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" 49.37.227.53 - - [05/Jun/2023:14:53:45 +0000] "GET /dvwa/css/login.css HTTP/1.1" 200 406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" 49.37.227.53 - - [05/Jun/2023:14:53:45 +0000] "GET /favicon.ico HTTP/1.1" 200 1406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:06 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1420 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:13 +0000] "GET /setup.php HTTP/1.1" 200 1969 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:13 +0000] "GET /dvwa/images/spanner.png HTTP/1.1" 200 464 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:19 +0000] "POST /setup.php HTTP/1.1" 302 0 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:20 +0000] "GET /setup.php HTTP/1.1" 200 2076 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:26 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1420 "http://43.205.94.67/setup.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:31 +0000] "GET /security.php HTTP/1.1" 200 2103 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:31 +0000] "GET /dvwa/images/lock.png HTTP/1.1" 200 761 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:38 +0000] "POST /security.php HTTP/1.1" 302 0 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:38 +0000] "GET /security.php HTTP/1.1" 200 2120 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:40 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1461 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:54:49 +0000] "POST /vulnerabilities/sqli/ HTTP/1.1" 200 1484 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:14 +0000] "GET /security.php HTTP/1.1" 200 2105 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:25 +0000] "POST /security.php HTTP/1.1" 302 0 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:26 +0000] "GET /security.php HTTP/1.1" 200 2120 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:27 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1409 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:30 +0000] "GET /vulnerabilities/sqli/session-input.php HTTP/1.1" 200 494 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:30 +0000] "GET /dvwa/css/source.css HTTP/1.1" 200 166 "http://43.205.94.67/vulnerabilities/sqli/session-input.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:34 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 302 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:34 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:34 +0000] "GET /dvwa/css/login.css HTTP/1.1" 200 406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:34 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:34 +0000] "GET /favicon.ico HTTP/1.1" 200 1406 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:37 +0000] "GET /security.php HTTP/1.1" 200 2105 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:39 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:39 +0000] "GET /login.php HTTP/1.1" 200 715 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:42 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1409 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:44 +0000] "GET /vulnerabilities/sqli/session-input.php HTTP/1.1" 200 494 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:48 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:48 +0000] "GET /index.php HTTP/1.1" 200 2685 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:48 +0000] "GET /dvwa/css/main.css HTTP/1.1" 200 1109 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:48 +0000] "GET /dvwa/js/dvwaPage.js HTTP/1.1" 200 466 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:48 +0000] "GET /dvwa/js/add_event_listeners.js HTTP/1.1" 200 276 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:48 +0000] "GET /dvwa/images/logo.png HTTP/1.1" 200 5044 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:52 +0000] "GET /security.php HTTP/1.1" 200 2105 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:55 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:57 +0000] "POST /security.php HTTP/1.1" 302 0 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:57 +0000] "GET /security.php HTTP/1.1" 200 2121 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:59 +0000] "GET /vulnerabilities/view_source.php?id=upload&security=low HTTP/1.1" 200 1052 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:55:59 +0000] "GET /dvwa/css/source.css HTTP/1.1" 200 166 "http://43.205.94.67/vulnerabilities/view_source.php?id=upload&security=low" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:55:59 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1420 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:56:22 +0000] "GET /vulnerabilities/sqli/?id=admin%27&Submit=Submit HTTP/1.1" 200 146 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:56:41 +0000] "GET /vulnerabilities/sqli/?id=admin%27or1%3D1&Submit=Submit HTTP/1.1" 200 145 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:56:54 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:58:23 +0000] "GET /vulnerabilities/brute/?username=admin&password=password&Login=Login HTTP/1.1" 200 1470 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:14:58:23 +0000] "GET /hackable/users/admin.jpg HTTP/1.1" 200 3543 "http://43.205.94.67/vulnerabilities/brute/?username=admin&password=password&Login=Login" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:14:59:08 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1437 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:22 +0000] "GET /vulnerabilities/hackable/uploads/ HTTP/1.1" 404 268 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:30 +0000] "GET /hackable/uploads/ HTTP/1.1" 200 521 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:30 +0000] "GET /icons/blank.gif HTTP/1.1" 200 148 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:31 +0000] "GET /icons/back.gif HTTP/1.1" 200 216 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:31 +0000] "GET /icons/unknown.gif HTTP/1.1" 200 245 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:31 +0000] "GET /icons/image2.gif HTTP/1.1" 200 309 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:00:59 +0000] "GET /vulnerabilities/view_source.php?id=upload&security=low HTTP/1.1" 200 1052 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:01:03 +0000] "GET /hackable/uploads/pentestmonkey.php HTTP/1.1" 200 107 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:01:32 +0000] "GET /hackable/uploads/pentestmonkey.php HTTP/1.1" 499 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:04:50 +0000] "GET /hackable/uploads/pentestmonkey.php HTTP/1.1" 499 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:04:51 +0000] "GET /hackable/uploads/ HTTP/1.1" 200 521 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:05:24 +0000] "GET /hackable/uploads/pentestmonkey.php HTTP/1.1" 200 107 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:05:34 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:07:33 +0000] "GET /vulnerabilities/brute/?username=admin&password=password&Login=Login HTTP/1.1" 200 1470 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:07:38 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1420 "http://43.205.94.67/vulnerabilities/brute/?username=admin&password=password&Login=Login" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:07:43 +0000] "GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1" 200 1441 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:07:47 +0000] "GET /vulnerabilities/sqli/?id=3&Submit=Submit HTTP/1.1" 200 1449 "http://43.205.94.67/vulnerabilities/sqli/?id=1&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:08:11 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:08:22 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:08:36 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1432 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:08:57 +0000] "GET /hackable/uploads/ HTTP/1.1" 200 543 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:08:59 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:09:18 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:09:21 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:09:22 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:09:22 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:09:23 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:09:29 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:10:07 +0000] "GET /vulnerabilities/sqli/?id=%27&Submit=Submit HTTP/1.1" 200 141 "http://43.205.94.67/vulnerabilities/sqli/?id=3&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:10:47 +0000] "GET /vulnerabilities/view_help.php?id=brute&security=low HTTP/1.1" 200 2096 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:10:48 +0000] "GET /dvwa/css/help.css HTTP/1.1" 200 186 "http://43.205.94.67/vulnerabilities/view_help.php?id=brute&security=low" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:16:21 +0000] "GET /vulnerabilities/sqli/?id=1%27+or+%271%27+%3D+%271&Submit=Submit HTTP/1.1" 200 1501 "http://43.205.94.67/vulnerabilities/sqli/?id=1&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:19:14 +0000] "GET /vulnerabilities/sqli/?id=1%27+or+%271%27+%3D+%271+UNION+SELECT+user%2C+password+FROM+user%23&Submit=Submit HTTP/1.1" 200 1481 "http://43.205.94.67/vulnerabilities/sqli/?id=1%27+or+%271%27+%3D+%271&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:19:16 +0000] "GET /vulnerabilities/brute/?username=&password=&Login=Login HTTP/1.1" 200 1453 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:19:19 +0000] "GET /vulnerabilities/view_help.php?id=brute&security=low HTTP/1.1" 200 2096 "http://43.205.94.67/vulnerabilities/brute/?username=&password=&Login=Login" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:19:54 +0000] "GET /vulnerabilities/fi/?page=include.php HTTP/1.1" 200 1306 "http://43.205.94.67/vulnerabilities/brute/?username=&password=&Login=Login" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:19:58 +0000] "GET /vulnerabilities/exec/ HTTP/1.1" 200 1364 "http://43.205.94.67/vulnerabilities/fi/?page=include.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:01 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:03 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1416 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:14 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1432 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:20:24 +0000] "GET /vulnerabilities/sqli/?id=%27UNION+SELECT+user%2Cpassword+FROM+users%23&Submit=Submit HTTP/1.1" 200 1628 "http://43.205.94.67/vulnerabilities/sqli/?id=1%27+or+%271%27+%3D+%271+UNION+SELECT+user%2C+password+FROM+user%23&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:32 +0000] "GET /hackable/uploads/ HTTP/1.1" 200 543 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 66.240.236.116 - - [05/Jun/2023:15:20:35 +0000] "GET / HTTP/1.1" 302 0 "-" "Mozilla/5.0 zgrab/0.x" 117.223.90.32 - - [05/Jun/2023:15:20:44 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:46 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:47 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:47 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:47 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:48 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:48 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:48 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:20:48 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:23:17 +0000] "GET /logout.php HTTP/1.1" 302 0 "http://43.205.94.67/vulnerabilities/sqli/?id=%27UNION+SELECT+user%2Cpassword+FROM+users%23&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:23:17 +0000] "GET /login.php HTTP/1.1" 200 725 "http://43.205.94.67/vulnerabilities/sqli/?id=%27UNION+SELECT+user%2Cpassword+FROM+users%23&Submit=Submit" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 150.129.246.5 - - [05/Jun/2023:15:23:20 +0000] "GET /login.php HTTP/1.1" 200 699 "https://www.google.com/" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36" 150.129.246.5 - - [05/Jun/2023:15:23:21 +0000] "GET /dvwa/images/login_logo.png HTTP/1.1" 200 9088 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:23:38 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:23:38 +0000] "GET /index.php HTTP/1.1" 200 2687 "http://43.205.94.67/login.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 150.129.246.5 - - [05/Jun/2023:15:23:47 +0000] "GET /dvwa/css/login.css HTTP/1.1" 200 406 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:23:52 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1422 "http://43.205.94.67/index.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:24:25 +0000] "GET /hackable/uploads/fileupload.php HTTP/1.1" 500 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:25:53 +0000] "GET /vulnerabilities/view_help.php?id=sqli&security=low HTTP/1.1" 200 1600 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:25:53 +0000] "GET /dvwa/css/help.css HTTP/1.1" 200 186 "http://43.205.94.67/vulnerabilities/view_help.php?id=sqli&security=low" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:26:12 +0000] "GET /vulnerabilities/view_source.php?id=sqli&security=low HTTP/1.1" 200 1222 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:26:17 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:26:32 +0000] "GET /security.php HTTP/1.1" 200 2104 "http://43.205.94.67/vulnerabilities/sqli/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:26:37 +0000] "POST /security.php HTTP/1.1" 302 0 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:26:37 +0000] "GET /security.php HTTP/1.1" 200 2124 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 183.82.29.72 - - [05/Jun/2023:15:26:44 +0000] "GET /vulnerabilities/sqli/ HTTP/1.1" 200 1463 "http://43.205.94.67/security.php" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:07 +0000] "GET /hackable/uploads/ HTTP/1.1" 200 553 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:09 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:10 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:11 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:11 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:12 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:13 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:14 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:20 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:34 +0000] "GET /vulnerabilities/csrf/ HTTP/1.1" 200 1400 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:42 +0000] "GET /vulnerabilities/exec/ HTTP/1.1" 200 1364 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:45 +0000] "GET /vulnerabilities/exec/ HTTP/1.1" 200 1364 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:27:50 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:31:43 +0000] "GET /vulnerabilities/view_source.php?id=exec&security=low HTTP/1.1" 200 1010 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:31:49 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:31:51 +0000] "GET /vulnerabilities/view_source.php?id=brute&security=low HTTP/1.1" 200 1367 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:31:57 +0000] "GET /vulnerabilities/view_source_all.php?id=brute HTTP/1.1" 200 3430 "http://43.205.94.67/vulnerabilities/view_source.php?id=brute&security=low" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:35:02 +0000] "GET /vulnerabilities/brute/?username=admin&password=getlost&Login=Login HTTP/1.1" 200 1453 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:37:38 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "http://43.205.94.67/vulnerabilities/brute/?username=admin&password=getlost&Login=Login" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:37:44 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1416 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:37:51 +0000] "POST /vulnerabilities/upload/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:38:21 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:38:25 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:38:26 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:38:30 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 117.223.90.32 - - [05/Jun/2023:15:38:32 +0000] "GET /hackable/uploads/upload.php HTTP/1.1" 500 0 "http://43.205.94.67/hackable/uploads/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:15 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:15 +0000] "GET /login.php HTTP/1.1" 200 726 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:16 +0000] "GET /login.php HTTP/1.1" 200 697 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:30 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 302 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:30 +0000] "GET /login.php HTTP/1.1" 200 697 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:31 +0000] "GET /login.php HTTP/1.1" 200 697 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:40 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:40 +0000] "GET /login.php HTTP/1.1" 200 725 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:40 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:43 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:43 +0000] "GET /login.php HTTP/1.1" 200 726 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:44 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:45 +0000] "POST /login.php HTTP/1.1" 302 0 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:45 +0000] "GET /login.php HTTP/1.1" 200 728 "http://43.205.94.67/login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:50:45 +0000] "GET /login.php HTTP/1.1" 200 699 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:59:14 +0000] "GET /vulnerabilities/upload/ HTTP/1.1" 200 1394 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:59:19 +0000] "GET /vulnerabilities/brute/ HTTP/1.1" 200 1429 "http://43.205.94.67/vulnerabilities/upload/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:59:22 +0000] "GET /vulnerabilities/exec/ HTTP/1.1" 200 1364 "http://43.205.94.67/vulnerabilities/brute/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:59:52 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:15:59:59 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:00:02 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:00:38 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:00:53 +0000] "GET /vulnerabilities/view_help.php?id=exec&security=low HTTP/1.1" 200 1735 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:01:13 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:01:17 +0000] "GET /vulnerabilities/view_source.php?id=exec&security=low HTTP/1.1" 200 1010 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:02:39 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:02:44 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:03:37 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:04:06 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:04:14 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:04:40 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1554 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:05:06 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:05:18 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:07:30 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1542 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 49.143.32.6 - - [05/Jun/2023:16:09:35 +0000] "POST /GponForm/diag_Form?images/ HTTP/1.1" 404 134 "-" "Hello, World" 49.143.32.6 - - [05/Jun/2023:16:09:36 +0000] "/tmp/gpon80&ipv=0" 400 166 "-" "-" 157.44.203.234 - - [05/Jun/2023:16:10:15 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1542 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:13:35 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1764 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:14:06 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:14:12 +0000] "GET /vulnerabilities/view_help.php?id=exec&security=low HTTP/1.1" 200 1735 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:14:13 +0000] "GET /vulnerabilities/view_help.php?id=exec&security=low HTTP/1.1" 200 1735 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:15:18 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 157.44.203.234 - - [05/Jun/2023:16:15:53 +0000] "POST /vulnerabilities/exec/ HTTP/1.1" 200 1370 "http://43.205.94.67/vulnerabilities/exec/" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/113.0.0.0 Safari/537.36" 43.154.128.189 - - [05/Jun/2023:16:21:46 +0000] "HEAD /Core/Skin/Login.aspx HTTP/1.1" 404 0 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36" 139.162.84.205 - - [05/Jun/2023:16:41:55 +0000] "GET / HTTP/1.0" 200 612 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/109.0.0.0 Safari/537.36" 162.243.132.10 - - [05/Jun/2023:16:42:33 +0000] "GET / HTTP/1.1" 302 0 "-" "Mozilla/5.0 zgrab/0.x" 35.203.210.102 - - [05/Jun/2023:17:23:18 +0000] "GET / HTTP/1.1" 302 0 "-" "Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com" 35.203.210.102 - - [05/Jun/2023:17:23:18 +0000] "GET /login.php HTTP/1.1" 200 1523 "http://43.205.94.67:80/" "Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers' presences on the Internet. If you would like to be excluded from our scans, please send IP addresses/domains to: scaninfo@paloaltonetworks.com"

Here, we have an access log, and our objective is to create a log data analyzer using Python for this log. 2. Using python to extract data. Here, we utilize Python to extract and analyze data from the access log. By leveraging Python's capabilities and libraries such as regular expressions, Pandas, Streamlit, and Altair, we can effectively process the access log and present the information in a structured and visually appealing manner. 2.1 Python code with explation: streamlit1 streamlit2

streamlit run streamlitaccesslog.py (streamlitaccesslog.py is the name of the file) is used to execute a streamlit web application. by running the command "streamlit run streamlitaccesslog.py". Streamlit launches a local web server and open a web browser window displaying the streamlit application which allow user to interact with the log data analyzer tool. 2.2 Streamlit Application - Log Data Analyzer streamlitlog When the application is launched, it presents the following information and features on the website:

    1. Title: The website displays a tilte "Log Data Analyzer".
    1. Access Log Data: Below the title, the application displays the access log data in a tabular format. Each row represents a log entry which includes columns for IP address, response code, date and user agent. This allow the user to view the log in a organized manner.
    1. IP Address and Response Code Distribution: The website showcases a graph that visualizes the distribution of IP addresses and response code in the access log data.

About

Log Data Analyzer using Streamlit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages