Access Logs for 185.190.238.118

March 4, 2025, 12:06 p.m.GET /static/blog/js/search.js 200
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/94.0.4606.61 Safari/537.36
March 4, 2025, 12:06 p.m.GET /static/js/customAlert.js 200
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/94.0.4606.61 Safari/537.36
March 4, 2025, 12:06 p.m.GET /blog/part-2-core-methodologies-techniques-in-ip-threat-intelligence/ 200
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/94.0.4606.61 Safari/537.36
March 4, 2025, 12:06 p.m.GET /static/css/prism.css 200
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/94.0.4606.61 Safari/537.36
March 4, 2025, 12:06 p.m.GET /blog/part-2-core-methodologies-techniques-in-ip-threat-intelligence 301
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/94.0.4606.61 Safari/537.36
March 4, 2025, 12:06 p.m.GET /static/styles/main.css 200
User-Agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/94.0.4606.61 Safari/537.36