Request Inspector

Everything your browser tells this server

GET /sitemap.xml
🌐 Connection
IP Address104.23.243.66 IPv4
Port43935
Server IP194.36.144.49
ProtocolHTTP/2.0
HTTPSYes
Request Time2026-05-16 20:35:02 UTC
📋 Request Headers 14
Accept */*
Accept-Encoding gzip
Cdn-Loop cloudflare; loops=1; subreqs=1
Cf-Connecting-Ip 216.73.216.213
Cf-Ew-Via 15
Cf-Ipcountry US
Cf-Ray 9fcd2aa237372a83-CMH
Cf-Visitor {"scheme":"https"}
Cf-Worker rboulton.firewall.team
Cookie __cf_bm=Ma11qRbRSrE0cH4rEWH_cqpBCG7JUnJ9hkU41l2TuWY-1778963701.7069335-1.0.1.1-tiLMcA2JA2vy3HMQUHE7N6mvvAdNBXWgqpGgYHlB6Mkiv4LS0EzqFxQr6VVEo_vlBk8WpkNRfNJBKjWE5Ewd9c7lypvV9I3znNT48Sx.cGKx9IrGUnu4uEvFjK8WvA9c
Host rboulton.firewall.team
User-Agent Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; [email protected])
X-Forwarded-For hi,216.73.216.213
X-Forwarded-Proto https
🍪 Cookies 1
__cf_bm Ma11qRbRSrE0cH4rEWH_cqpBCG7JUnJ9hkU41l2TuWY-1778963701.7069335-1.0.1.1-tiLMcA2JA2vy3HMQUHE7N6mvvAdNBXWgqpGgYHlB6Mkiv4LS0EzqFxQr6VVEo_vlBk8WpkNRfNJBKjWE5Ewd9c7lypvV9I3znNT48Sx.cGKx9IrGUnu4uEvFjK8WvA9c
🖥️ Server Environment
Hostrboulton.firewall.team
Server Softwarenginx/1.24.0
PHP Version8.3.6
Document Root/var/www/wildcard
Script Filename/var/www/wildcard/index.php
Request Schemehttps
Content Type
Content Length