Request Inspector

Everything your browser tells this server

GET /
🌐 Connection
IP Address104.23.243.205 IPv4
Port17245
Server IP194.36.144.49
ProtocolHTTP/2.0
HTTPSYes
Request Time2026-05-20 04:29:46 UTC
📋 Request Headers 12
Accept */*
Accept-Encoding gzip, br
Cdn-Loop cloudflare; loops=1
Cf-Connecting-Ip 216.73.216.62
Cf-Ipcountry US
Cf-Ray 9fe89a2ad988c20a-CMH
Cf-Visitor {"scheme":"https"}
Cookie __cf_bm=rjmGZ9DWDC4vdW1hcLX.t6WcQ9BRsCYRDVSM4O_Dapo-1779251385.6330516-1.0.1.1-bZilpNWpqdib_ly.wUFkIhiToErr5JILQ1DukgyBxGRs66i_KZZJLTsJHkUhnRmweWT7WZ7LGy2G2rzuwyarDCJX6zZZa3pWpk5fXbkzVhudYU0h6dH9nCcS7yhOB3GR
Host ricardo.firewall.team
User-Agent Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
X-Forwarded-For 216.73.216.62
X-Forwarded-Proto https
🍪 Cookies 1
__cf_bm rjmGZ9DWDC4vdW1hcLX.t6WcQ9BRsCYRDVSM4O_Dapo-1779251385.6330516-1.0.1.1-bZilpNWpqdib_ly.wUFkIhiToErr5JILQ1DukgyBxGRs66i_KZZJLTsJHkUhnRmweWT7WZ7LGy2G2rzuwyarDCJX6zZZa3pWpk5fXbkzVhudYU0h6dH9nCcS7yhOB3GR
🖥️ Server Environment
Hostricardo.firewall.team
Server Softwarenginx/1.24.0
PHP Version8.3.6
Document Root/var/www/wildcard
Script Filename/var/www/wildcard/index.php
Request Schemehttps
Content Type
Content Length