We put the Requested URL into URL Decoding and find the payload sent by the attacker. After URL Decoding, it has been confirmed that it is SQL Injection. When we filtered by source address from the Log Management page, we saw other requests made. When the requests were examined, we saw that all of them were related to the SQL Injection vulnerability.