SQL Injection
Attempts to execute SQL database commands through the web address are listed here.
Do not attempt to browse to these urls in anything other than a test environment since calling these in a live of production environment may lead to data loss.
SQL Injection via URL
| IP Address |
Date |
Response |
URL (decoded) |
| DEMO | 29 Oct 2025 | 200 (OK) | https://www.WebsiteLogAnalyzer.com/prices=SearchText or (1,2)=(select*from(select name_const(ololosher,1),name_const(ololosher,1))a) -- and 1=1 |
SQL Injection via Referrer
| IP Address |
Date |
Response |
Referrer |
SQL Injection via User agent
| IP Address |
Date |
Response |
User agent |
| DEMO | 28 Oct 2025 | 200 (OK) | Mozilla/5.0 (compatible; MSIE 11.0; Windows NT 6.1; Win64; x64; Trident/5.0)'+(select*from(select(sleep(20)))a)+ |