{
  "type": "Domain",
  "indicator": "briative.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/briative.com",
    "alexa": "http://www.alexa.com/siteinfo/briative.com",
    "indicator": "briative.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 3754058383,
      "indicator": "briative.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "69e1d9cd805ecfc463bed935",
          "name": "BlackNet RAT clone credit octoseek",
          "description": "",
          "modified": "2026-04-18T00:51:09.427000",
          "created": "2026-04-17T06:57:17.378000",
          "tags": [
            "united",
            "heur",
            "bank",
            "covid19 scam",
            "anonymizer",
            "malicious site",
            "telefonica peru",
            "cyber threat",
            "proxy",
            "malware",
            "phishing",
            "zbot",
            "suppobox",
            "team",
            "trojanx",
            "service",
            "facebook",
            "win64",
            "trojan",
            "artemis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "engineering",
            "download",
            "microsoft",
            "generic",
            "union",
            "bazaloader",
            "media",
            "runescape",
            "blacklist https",
            "generic malware",
            "metro",
            "tmobile",
            "on us",
            "mls season",
            "home internet",
            "shop",
            "autopay",
            "free",
            "metro store",
            "limit",
            "pass",
            "close",
            "galaxy",
            "easy",
            "back",
            "stream",
            "find",
            "twitter",
            "intnavfnav",
            "conditions",
            "service url",
            "search live",
            "api blog",
            "docs pricing",
            "september",
            "instagram url",
            "facebook url",
            "value",
            "variables",
            "visitor object",
            "alpine object",
            "cookies",
            "taq boolean",
            "get h2",
            "kb script",
            "b xhr",
            "post h2",
            "frame",
            "b image",
            "kb image",
            "redirect chain",
            "frame c0bc",
            "kb stylesheet",
            "covid19",
            "phishing site",
            "malicious",
            "cve201711882",
            "cobalt strike",
            "squirrelwaffle",
            "pony",
            "binder",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "bambernek",
            "alexa",
            "unsafe",
            "opencandy",
            "downldr",
            "irata",
            "dbatloader",
            "vidar",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "blacknet rat",
            "stealer",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "riskware",
            "coinminer",
            "xrat",
            "swrort",
            "installcore",
            "trojanspy",
            "mbydkqdhtu0h",
            "pbiptbmvd0k4",
            "pbzpdldtg",
            "detection list",
            "glelexoputyh",
            "linkid252669",
            "s2okorbdpt2x",
            "el9km",
            "mtap2vnnnpj",
            "blacklist",
            "x22x22",
            "x22scriptx22",
            "x22dntx22",
            "date",
            "u002d2",
            "linkcode u002d",
            "srclang",
            "urllang",
            "srcurl",
            "qzid",
            "pattern match",
            "intnavtnav",
            "q0o0mahttp",
            "login",
            "windows nt",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "http traffic",
            "http",
            "suricata alerts",
            "event category",
            "description sid",
            "external",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "general",
            "file",
            "get fwlink",
            "geckohost",
            "suidm",
            "edgev1",
            "srchdafnoform",
            "srchuidv2",
            "edgesf1",
            "malware site",
            "agent",
            "exploit",
            "mimikatz",
            "quasar rat",
            "iframe",
            "beach research",
            "sgeneric",
            "static engine",
            "umbrella",
            "malware service",
            "exploit source",
            "scanning host",
            "Command and Control",
            "malicious url",
            "team malicious",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "bad traffic"
          ],
          "references": [
            "https://metro-tmo.com/",
            "Hybrid Analysis",
            "Alienvault OTX",
            "Data Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "South Africa",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:O97M/BazaLoader",
              "display_name": "TrojanDownloader:O97M/BazaLoader",
              "target": "/malware/TrojanDownloader:O97M/BazaLoader"
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Zbot",
              "display_name": "Backdoor:Win32/Zbot",
              "target": "/malware/Backdoor:Win32/Zbot"
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "Squirrelwaffle",
              "display_name": "Squirrelwaffle",
              "target": null
            },
            {
              "id": "Pony - S0453",
              "display_name": "Pony - S0453",
              "target": null
            },
            {
              "id": "TrojanDropper:VBS/Swrort",
              "display_name": "TrojanDropper:VBS/Swrort",
              "target": "/malware/TrojanDropper:VBS/Swrort"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/Metro",
              "display_name": "Virus:DOS/Metro",
              "target": "/malware/Virus:DOS/Metro"
            },
            {
              "id": "Metro",
              "display_name": "Metro",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Outbreak",
              "display_name": "Backdoor:Win32/Outbreak",
              "target": "/malware/Backdoor:Win32/Outbreak"
            },
            {
              "id": "ALF:PUA:Win32/OpenCandy",
              "display_name": "ALF:PUA:Win32/OpenCandy",
              "target": null
            },
            {
              "id": "IRATA",
              "display_name": "IRATA",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:Trojan:O97M/Emotet",
              "display_name": "ALF:Trojan:O97M/Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            }
          ],
          "attack_ids": [
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Food",
            "Gas",
            "Entertainment"
          ],
          "TLP": "white",
          "cloned_from": "650d0c66e0b02a6dde4a8b7a",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 781,
            "FileHash-SHA256": 3085,
            "domain": 528,
            "URL": 3130,
            "CVE": 6,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368
          },
          "indicator_count": 8508,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "2 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69814c479d43ae35dc46f6e3",
          "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
          "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 13 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
          "modified": "2026-03-05T01:01:32.758000",
          "created": "2026-02-03T01:15:51.129000",
          "tags": [
            "osint-volley",
            "threatfox",
            "automated",
            "unknown-malware",
            "unknown-stealer",
            "formbook",
            "c2-infrastructure"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
            "https://threatfox.abuse.ch"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Unknown malware",
              "display_name": "Unknown malware",
              "target": null
            },
            {
              "id": "Unknown Stealer",
              "display_name": "Unknown Stealer",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1219",
              "name": "Remote Access Software",
              "display_name": "T1219 - Remote Access Software"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 101,
            "URL": 6,
            "hostname": 18
          },
          "indicator_count": 125,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 172,
          "modified_text": "46 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69814d41eb0318ce29bebc60",
          "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
          "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 13 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
          "modified": "2026-03-05T01:01:32.758000",
          "created": "2026-02-03T01:20:01.606000",
          "tags": [
            "osint-volley",
            "threatfox",
            "automated",
            "unknown-malware",
            "unknown-stealer",
            "formbook",
            "c2-infrastructure"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
            "https://threatfox.abuse.ch"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Unknown malware",
              "display_name": "Unknown malware",
              "target": null
            },
            {
              "id": "Unknown Stealer",
              "display_name": "Unknown Stealer",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1219",
              "name": "Remote Access Software",
              "display_name": "T1219 - Remote Access Software"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 101,
            "URL": 6,
            "hostname": 18
          },
          "indicator_count": 125,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 172,
          "modified_text": "46 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69813f351fa3c49ef584ef88",
          "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
          "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 12 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
          "modified": "2026-03-05T00:03:04.060000",
          "created": "2026-02-03T00:20:05.907000",
          "tags": [
            "osint-volley",
            "threatfox",
            "automated",
            "unknown-malware",
            "unknown-stealer",
            "formbook",
            "c2-infrastructure"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
            "https://threatfox.abuse.ch"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Unknown malware",
              "display_name": "Unknown malware",
              "target": null
            },
            {
              "id": "Unknown Stealer",
              "display_name": "Unknown Stealer",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1219",
              "name": "Remote Access Software",
              "display_name": "T1219 - Remote Access Software"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 101,
            "URL": 6,
            "hostname": 18
          },
          "indicator_count": 125,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "46 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698146397d618924712f79ac",
          "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
          "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 12 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
          "modified": "2026-03-05T00:03:04.060000",
          "created": "2026-02-03T00:50:01.545000",
          "tags": [
            "osint-volley",
            "threatfox",
            "automated",
            "unknown-malware",
            "unknown-stealer",
            "formbook",
            "c2-infrastructure"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
            "https://threatfox.abuse.ch"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Unknown malware",
              "display_name": "Unknown malware",
              "target": null
            },
            {
              "id": "Unknown Stealer",
              "display_name": "Unknown Stealer",
              "target": null
            },
            {
              "id": "Formbook",
              "display_name": "Formbook",
              "target": null
            },
            {
              "id": "AsyncRAT",
              "display_name": "AsyncRAT",
              "target": null
            },
            {
              "id": "Remcos",
              "display_name": "Remcos",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1219",
              "name": "Remote Access Software",
              "display_name": "T1219 - Remote Access Software"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 101,
            "URL": 6,
            "hostname": 18
          },
          "indicator_count": 125,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "46 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981a65e11d2dfe42b7e4369",
          "name": "PreCog Sweep - 2026-02-03 07h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T07:40:14.568000",
          "created": "2026-02-03T07:40:14.568000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 99,
            "domain": 136,
            "URL": 21
          },
          "indicator_count": 256,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981a406bbdc6e91eb2d2937",
          "name": "PreCog Sweep - 2026-02-03 07h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T07:30:14.414000",
          "created": "2026-02-03T07:30:14.414000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 99,
            "domain": 136,
            "URL": 21
          },
          "indicator_count": 256,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981a1ad8c1c40b4d479213d",
          "name": "PreCog Sweep - 2026-02-03 07h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T07:20:13.542000",
          "created": "2026-02-03T07:20:13.542000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 92,
            "domain": 130,
            "URL": 20
          },
          "indicator_count": 242,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69819f56bbe6fb6c7e7f5d54",
          "name": "PreCog Sweep - 2026-02-03 07h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T07:10:14.371000",
          "created": "2026-02-03T07:10:14.371000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 93,
            "domain": 105,
            "URL": 20
          },
          "indicator_count": 218,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69819cfeb72f0614e89392b4",
          "name": "PreCog Sweep - 2026-02-03 07h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T07:00:14.602000",
          "created": "2026-02-03T07:00:14.602000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 27,
            "URL": 21,
            "domain": 163
          },
          "indicator_count": 211,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69819aa5c0fdbc50dba30f7d",
          "name": "PreCog Sweep - 2026-02-03 06h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T06:50:13.637000",
          "created": "2026-02-03T06:50:13.637000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 27,
            "URL": 21,
            "domain": 163
          },
          "indicator_count": 211,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981984deabd460115e2f410",
          "name": "PreCog Sweep - 2026-02-03 06h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T06:40:13.950000",
          "created": "2026-02-03T06:40:13.950000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 32,
            "URL": 20,
            "domain": 167
          },
          "indicator_count": 219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698195f53b9595e89c93bf1a",
          "name": "PreCog Sweep - 2026-02-03 06h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T06:30:13.722000",
          "created": "2026-02-03T06:30:13.722000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 20,
            "domain": 168,
            "hostname": 31
          },
          "indicator_count": 219,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698193a0efb4769b53e13ab0",
          "name": "PreCog Sweep - 2026-02-03 06h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T06:20:16.739000",
          "created": "2026-02-03T06:20:16.739000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 30,
            "domain": 187,
            "URL": 10
          },
          "indicator_count": 227,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69818ef2ecf191e6bf03b806",
          "name": "PreCog Sweep - 2026-02-03 06h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T06:00:18.527000",
          "created": "2026-02-03T06:00:18.527000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 29,
            "domain": 196,
            "URL": 10
          },
          "indicator_count": 235,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69818c9630a62331cafb426d",
          "name": "PreCog Sweep - 2026-02-03 05h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T05:50:14.465000",
          "created": "2026-02-03T05:50:14.465000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 29,
            "domain": 198,
            "URL": 10
          },
          "indicator_count": 237,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69818a3efa07b3dd81471d3c",
          "name": "PreCog Sweep - 2026-02-03 05h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T05:40:14.217000",
          "created": "2026-02-03T05:40:14.217000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 29,
            "domain": 199,
            "URL": 10
          },
          "indicator_count": 238,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698187e650e708afb4ad8e92",
          "name": "PreCog Sweep - 2026-02-03 05h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T05:30:14.480000",
          "created": "2026-02-03T05:30:14.480000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 28,
            "domain": 200,
            "URL": 10
          },
          "indicator_count": 238,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981858ef77f27fe2dec2f8a",
          "name": "PreCog Sweep - 2026-02-03 05h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T05:20:14.104000",
          "created": "2026-02-03T05:20:14.104000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 28,
            "domain": 201,
            "URL": 10
          },
          "indicator_count": 239,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69818335a534ebc061486e88",
          "name": "PreCog Sweep - 2026-02-03 05h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T05:10:13.529000",
          "created": "2026-02-03T05:10:13.529000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 28,
            "domain": 202,
            "URL": 10
          },
          "indicator_count": 240,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698180deef191cb938d5b77d",
          "name": "PreCog Sweep - 2026-02-03 05h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T05:00:14.752000",
          "created": "2026-02-03T05:00:14.752000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 27,
            "domain": 204,
            "URL": 10
          },
          "indicator_count": 241,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69817e855dc5c83c80eb2b09",
          "name": "PreCog Sweep - 2026-02-03 04h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T04:50:13.903000",
          "created": "2026-02-03T04:50:13.903000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 27,
            "domain": 204,
            "URL": 10
          },
          "indicator_count": 241,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69817c30b9576bbc7495c29e",
          "name": "PreCog Sweep - 2026-02-03 04h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T04:40:16.602000",
          "created": "2026-02-03T04:40:16.602000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 25,
            "URL": 10,
            "domain": 207
          },
          "indicator_count": 242,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698179d665f0f64acdf8be92",
          "name": "PreCog Sweep - 2026-02-03 04h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T04:30:14.285000",
          "created": "2026-02-03T04:30:14.285000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 26,
            "URL": 10,
            "domain": 207
          },
          "indicator_count": 243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981777e54677ddddc0c19ff",
          "name": "PreCog Sweep - 2026-02-03 04h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T04:20:14.786000",
          "created": "2026-02-03T04:20:14.786000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 26,
            "URL": 10,
            "domain": 207
          },
          "indicator_count": 243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981752694b3fa9f24e1c7cb",
          "name": "PreCog Sweep - 2026-02-03 04h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T04:10:14.533000",
          "created": "2026-02-03T04:10:14.533000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 26,
            "URL": 10,
            "domain": 207
          },
          "indicator_count": 243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698172cf31ea439b4b753f8a",
          "name": "PreCog Sweep - 2026-02-03 04h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T04:00:15.736000",
          "created": "2026-02-03T04:00:15.736000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 26,
            "URL": 10,
            "domain": 207
          },
          "indicator_count": 243,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69817075b6ca3e5caec450f8",
          "name": "PreCog Sweep - 2026-02-03 03h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T03:50:13.599000",
          "created": "2026-02-03T03:50:13.599000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 10,
            "hostname": 24,
            "domain": 207
          },
          "indicator_count": 241,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69816e1f21e09eb4338fced1",
          "name": "PreCog Sweep - 2026-02-03 03h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T03:40:15.613000",
          "created": "2026-02-03T03:40:15.613000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 24,
            "URL": 9,
            "domain": 207
          },
          "indicator_count": 240,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69816bc6e510008c02c944de",
          "name": "PreCog Sweep - 2026-02-03 03h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T03:30:14.019000",
          "created": "2026-02-03T03:30:14.019000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 24,
            "URL": 9,
            "domain": 207
          },
          "indicator_count": 240,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981696d89e56162f294edb8",
          "name": "PreCog Sweep - 2026-02-03 03h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T03:20:13.467000",
          "created": "2026-02-03T03:20:13.467000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 24,
            "URL": 9,
            "domain": 207
          },
          "indicator_count": 240,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69816716700acd382c5d8cdc",
          "name": "PreCog Sweep - 2026-02-03 03h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T03:10:14.373000",
          "created": "2026-02-03T03:10:14.373000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 24,
            "URL": 9,
            "domain": 207
          },
          "indicator_count": 240,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698164be83cea4dbe96e0b48",
          "name": "PreCog Sweep - 2026-02-03 03h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T03:00:14.443000",
          "created": "2026-02-03T03:00:14.443000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 21,
            "URL": 8,
            "domain": 207
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981626591b65f809a3e99bb",
          "name": "PreCog Sweep - 2026-02-03 02h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T02:50:13.665000",
          "created": "2026-02-03T02:50:13.665000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69816010bea01763e5570096",
          "name": "PreCog Sweep - 2026-02-03 02h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T02:40:16.768000",
          "created": "2026-02-03T02:40:16.768000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69815db552e6a08acc3779d8",
          "name": "PreCog Sweep - 2026-02-03 02h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T02:30:13.829000",
          "created": "2026-02-03T02:30:13.829000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69815b5fd6f52c07709dafa5",
          "name": "PreCog Sweep - 2026-02-03 02h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T02:20:15.518000",
          "created": "2026-02-03T02:20:15.518000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698159052bbfcfe3416bd922",
          "name": "PreCog Sweep - 2026-02-03 02h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T02:10:13.059000",
          "created": "2026-02-03T02:10:13.059000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698156ae7e8b196338edafb7",
          "name": "PreCog Sweep - 2026-02-03 02h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T02:00:14.289000",
          "created": "2026-02-03T02:00:14.289000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69815457d2249661d42d5f5f",
          "name": "PreCog Sweep - 2026-02-03 01h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T01:50:15.279000",
          "created": "2026-02-03T01:50:15.279000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 8,
            "domain": 207,
            "hostname": 21
          },
          "indicator_count": 236,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698151feee9c3add6a4fa5c6",
          "name": "PreCog Sweep - 2026-02-03 01h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T01:40:14.951000",
          "created": "2026-02-03T01:40:14.951000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 207,
            "URL": 11,
            "hostname": 21
          },
          "indicator_count": 239,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69814fa64ff78bcc8e09dfc8",
          "name": "PreCog Sweep - 2026-02-03 01h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T01:30:14.361000",
          "created": "2026-02-03T01:30:14.361000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69814d4e91074420ace310fa",
          "name": "PreCog Sweep - 2026-02-03 01h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T01:20:14.379000",
          "created": "2026-02-03T01:20:14.379000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69814af61b51e4bba89d753b",
          "name": "PreCog Sweep - 2026-02-03 01h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T01:10:14.506000",
          "created": "2026-02-03T01:10:14.506000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981489d08159bbfaa157d54",
          "name": "PreCog Sweep - 2026-02-03 01h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T01:00:13.646000",
          "created": "2026-02-03T01:00:13.646000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981464636686a03ce934a7a",
          "name": "PreCog Sweep - 2026-02-03 00h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T00:50:14.357000",
          "created": "2026-02-03T00:50:14.357000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698143ed98531c482ea69c07",
          "name": "PreCog Sweep - 2026-02-03 00h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T00:40:13.691000",
          "created": "2026-02-03T00:40:13.691000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981419620f869951d4704cf",
          "name": "PreCog Sweep - 2026-02-03 00h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T00:30:14.097000",
          "created": "2026-02-03T00:30:14.097000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69813f3d3d4605b614f9fb96",
          "name": "PreCog Sweep - 2026-02-03 00h",
          "description": "Novel threat indicators detected by PreCog Sweep Engine",
          "modified": "2026-02-03T00:20:13.566000",
          "created": "2026-02-03T00:20:13.566000",
          "tags": [
            "precog",
            "automated",
            "novel-ioc",
            "c2",
            "malware"
          ],
          "references": [
            "https://analytics.dugganusa.com/api/v1/stix/master",
            "https://github.com/pduggusa/dugganusa-research"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "pduggusa",
            "id": "371400",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 225,
            "URL": 64,
            "hostname": 52
          },
          "indicator_count": 341,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 171,
          "modified_text": "76 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "65580c17e69371b34a573f72",
          "name": "Masquerading",
          "description": "",
          "modified": "2023-12-17T11:03:45.376000",
          "created": "2023-11-18T00:57:59.619000",
          "tags": [
            "no expiration",
            "filehashsha256",
            "filehashmd5",
            "iocs",
            "url http",
            "expiration",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "create new",
            "blacklist http",
            "laplasclipper",
            "malicious url",
            "cisco umbrella",
            "site",
            "alexa top",
            "blacklist",
            "safe site",
            "malware site",
            "phishing site",
            "malicious site",
            "malware",
            "china unknown",
            "united",
            "unknown",
            "as54994 quantil",
            "cname",
            "nxdomain",
            "as8068",
            "as4134 chinanet",
            "passive dns",
            "domain",
            "next",
            "filehashsha1",
            "service company",
            "servers",
            "ndicator role",
            "title added",
            "active related",
            "pulses url",
            "showing",
            "entries",
            "pulses http",
            "url https",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "report spam",
            "author avatar",
            "created",
            "hour ago",
            "trojanspy",
            "redline",
            "pulses hostname",
            "blacklist https",
            "indicator role",
            "bidid",
            "adid",
            "v4us",
            "v51845481",
            "hostname",
            "http",
            "cisco",
            "umbrella rank",
            "search live",
            "api blog",
            "docs pricing",
            "november",
            "de summary",
            "frankfurt",
            "main",
            "reverse dns",
            "general full",
            "asn16509",
            "amazon02",
            "resource",
            "protocol h2",
            "security tls",
            "hash",
            "de indicators",
            "domains",
            "hashes",
            "copyright",
            "gmbh version",
            "follow",
            "value",
            "postitem",
            "variables",
            "parameters",
            "systemid object",
            "def function",
            "login",
            "get h2",
            "secrets llc",
            "agreement",
            "the site",
            "content",
            "policy",
            "this site",
            "claims",
            "florida",
            "please",
            "premium",
            "service",
            "restrict",
            "express",
            "media",
            "facebook",
            "twitter",
            "final",
            "first",
            "cloudflarenet",
            "gts ca",
            "software",
            "million",
            "hours ago",
            "chameleon",
            "heur",
            "phishing",
            "riskware",
            "agent",
            "unsafe",
            "opencandy",
            "exploit",
            "mimikatz",
            "iframe",
            "downldr",
            "presenoker",
            "artemis",
            "download",
            "beach research",
            "germany",
            "asn20940",
            "akamaiasn1",
            "threat report",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "alexa",
            "maltiverse",
            "google",
            "qtsas",
            "name value",
            "no data",
            "tag count",
            "count blacklist",
            "pbiptbmvd0k4",
            "glelexoputyh",
            "suppobox",
            "team",
            "bambernek",
            "internet storm",
            "phishtank",
            "phish",
            "trickbot",
            "telecom",
            "bank",
            "ipv4",
            "octoseek report",
            "spam https",
            "tsara brashears",
            "malvertizing",
            "tracking",
            "tagging",
            "spyder",
            "cybercrime",
            "email collection",
            "apple data collection",
            "win32 exe",
            "ms word",
            "document",
            "type name",
            "javascript",
            "network capture",
            "files",
            "detections type",
            "name",
            "ssl certificate",
            "whois whois",
            "tsara brashears",
            "whois record",
            "asn owner",
            "highly targeted",
            "kgs0",
            "kls0",
            "relacionada",
            "family",
            "lolkek",
            "emotet",
            "dark power",
            "wiper",
            "ransomware",
            "cobalt strike",
            "quasar rat",
            "ursnif",
            "remcos",
            "core",
            "redline stealer",
            "bitrat",
            "hacktool",
            "critical",
            "copy",
            "installer",
            "execution",
            "network",
            "communicating",
            "referrer",
            "parent",
            "historical ssl",
            "siblings",
            "resolutions",
            "name verdict",
            "falcon sandbox",
            "pattern match",
            "error",
            "file",
            "indicator",
            "script",
            "typeof e",
            "ascii text",
            "appdata",
            "date",
            "windir",
            "span",
            "body",
            "meta",
            "class",
            "generator",
            "info",
            "null",
            "refresh",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "form",
            "footer",
            "html",
            "union",
            "outbreak",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "unruy",
            "iobit",
            "dropper",
            "trojanx",
            "installcore",
            "webshell",
            "crack",
            "webtoolbar",
            "threat roundup",
            "contacted",
            "june",
            "july",
            "october",
            "august"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1562",
              "name": "Impair Defenses",
              "display_name": "T1562 - Impair Defenses"
            },
            {
              "id": "T1102",
              "name": "Web Service",
              "display_name": "T1102 - Web Service"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1199",
              "name": "Trusted Relationship",
              "display_name": "T1199 - Trusted Relationship"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            }
          ],
          "industries": [
            "Health",
            "Nutritional",
            "Medical",
            "Medicine"
          ],
          "TLP": "white",
          "cloned_from": "65574cb4447c8d87ad85fa75",
          "export_count": 103,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 400,
            "FileHash-SHA1": 240,
            "FileHash-SHA256": 6459,
            "hostname": 4845,
            "URL": 11514,
            "CVE": 15,
            "domain": 3179,
            "email": 31
          },
          "indicator_count": 26683,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 226,
          "modified_text": "855 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://threatfox.abuse.ch",
        "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
        "Hybrid Analysis",
        "https://metro-tmo.com/",
        "https://analytics.dugganusa.com/api/v1/stix/master",
        "Alienvault OTX",
        "https://github.com/pduggusa/dugganusa-research",
        "Data Analysis"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Irata",
            "Vidar",
            "Webtoolbar",
            "Trojanspy",
            "Backdoor:msil/bladabindi",
            "Alf:trojan:o97m/emotet",
            "Blacknet rat",
            "Pony - s0453",
            "Unknown malware",
            "Backdoor:win32/zbot",
            "Asyncrat",
            "Trojan:win32/installcore",
            "Azorult",
            "Metro",
            "Maltiverse",
            "Alf:pua:win32/opencandy",
            "Mimikatz",
            "Artemis",
            "Virus:dos/metro",
            "Cobalt strike - s0154",
            "Unknown stealer",
            "Squirrelwaffle",
            "Remcos",
            "Suppobox",
            "Beach research",
            "Quasar rat",
            "Trojandownloader:o97m/bazaloader",
            "Trojandropper:vbs/swrort",
            "Backdoor:win32/outbreak",
            "Virut",
            "Formbook",
            "Ramnit",
            "Alf:pua:win32/fusioncore"
          ],
          "industries": [
            "Food",
            "Entertainment",
            "Medical",
            "Health",
            "Medicine",
            "Nutritional",
            "Gas"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "69e1d9cd805ecfc463bed935",
      "name": "BlackNet RAT clone credit octoseek",
      "description": "",
      "modified": "2026-04-18T00:51:09.427000",
      "created": "2026-04-17T06:57:17.378000",
      "tags": [
        "united",
        "heur",
        "bank",
        "covid19 scam",
        "anonymizer",
        "malicious site",
        "telefonica peru",
        "cyber threat",
        "proxy",
        "malware",
        "phishing",
        "zbot",
        "suppobox",
        "team",
        "trojanx",
        "service",
        "facebook",
        "win64",
        "trojan",
        "artemis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "engineering",
        "download",
        "microsoft",
        "generic",
        "union",
        "bazaloader",
        "media",
        "runescape",
        "blacklist https",
        "generic malware",
        "metro",
        "tmobile",
        "on us",
        "mls season",
        "home internet",
        "shop",
        "autopay",
        "free",
        "metro store",
        "limit",
        "pass",
        "close",
        "galaxy",
        "easy",
        "back",
        "stream",
        "find",
        "twitter",
        "intnavfnav",
        "conditions",
        "service url",
        "search live",
        "api blog",
        "docs pricing",
        "september",
        "instagram url",
        "facebook url",
        "value",
        "variables",
        "visitor object",
        "alpine object",
        "cookies",
        "taq boolean",
        "get h2",
        "kb script",
        "b xhr",
        "post h2",
        "frame",
        "b image",
        "kb image",
        "redirect chain",
        "frame c0bc",
        "kb stylesheet",
        "covid19",
        "phishing site",
        "malicious",
        "cve201711882",
        "cobalt strike",
        "squirrelwaffle",
        "pony",
        "binder",
        "virut",
        "ramnit",
        "dropper",
        "formbook",
        "azorult",
        "bambernek",
        "alexa",
        "unsafe",
        "opencandy",
        "downldr",
        "irata",
        "dbatloader",
        "vidar",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "bladabindi",
        "emotet",
        "blacknet rat",
        "stealer",
        "presenoker",
        "fusioncore",
        "cleaner",
        "wacatac",
        "riskware",
        "coinminer",
        "xrat",
        "swrort",
        "installcore",
        "trojanspy",
        "mbydkqdhtu0h",
        "pbiptbmvd0k4",
        "pbzpdldtg",
        "detection list",
        "glelexoputyh",
        "linkid252669",
        "s2okorbdpt2x",
        "el9km",
        "mtap2vnnnpj",
        "blacklist",
        "x22x22",
        "x22scriptx22",
        "x22dntx22",
        "date",
        "u002d2",
        "linkcode u002d",
        "srclang",
        "urllang",
        "srcurl",
        "qzid",
        "pattern match",
        "intnavtnav",
        "q0o0mahttp",
        "login",
        "windows nt",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "http traffic",
        "http",
        "suricata alerts",
        "event category",
        "description sid",
        "external",
        "logo",
        "av detection",
        "default browser",
        "guest system",
        "professional",
        "general",
        "file",
        "get fwlink",
        "geckohost",
        "suidm",
        "edgev1",
        "srchdafnoform",
        "srchuidv2",
        "edgesf1",
        "malware site",
        "agent",
        "exploit",
        "mimikatz",
        "quasar rat",
        "iframe",
        "beach research",
        "sgeneric",
        "static engine",
        "umbrella",
        "malware service",
        "exploit source",
        "scanning host",
        "Command and Control",
        "malicious url",
        "team malicious",
        "tor known",
        "tor relayrouter",
        "exit",
        "node tcp",
        "traffic",
        "bad traffic"
      ],
      "references": [
        "https://metro-tmo.com/",
        "Hybrid Analysis",
        "Alienvault OTX",
        "Data Analysis"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "South Africa",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:O97M/BazaLoader",
          "display_name": "TrojanDownloader:O97M/BazaLoader",
          "target": "/malware/TrojanDownloader:O97M/BazaLoader"
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Zbot",
          "display_name": "Backdoor:Win32/Zbot",
          "target": "/malware/Backdoor:Win32/Zbot"
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Bladabindi",
          "display_name": "Backdoor:MSIL/Bladabindi",
          "target": "/malware/Backdoor:MSIL/Bladabindi"
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "MimiKatz",
          "display_name": "MimiKatz",
          "target": null
        },
        {
          "id": "Squirrelwaffle",
          "display_name": "Squirrelwaffle",
          "target": null
        },
        {
          "id": "Pony - S0453",
          "display_name": "Pony - S0453",
          "target": null
        },
        {
          "id": "TrojanDropper:VBS/Swrort",
          "display_name": "TrojanDropper:VBS/Swrort",
          "target": "/malware/TrojanDropper:VBS/Swrort"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Virus:DOS/Metro",
          "display_name": "Virus:DOS/Metro",
          "target": "/malware/Virus:DOS/Metro"
        },
        {
          "id": "Metro",
          "display_name": "Metro",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Ramnit",
          "display_name": "Ramnit",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Outbreak",
          "display_name": "Backdoor:Win32/Outbreak",
          "target": "/malware/Backdoor:Win32/Outbreak"
        },
        {
          "id": "ALF:PUA:Win32/OpenCandy",
          "display_name": "ALF:PUA:Win32/OpenCandy",
          "target": null
        },
        {
          "id": "IRATA",
          "display_name": "IRATA",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Cobalt Strike - S0154",
          "display_name": "Cobalt Strike - S0154",
          "target": null
        },
        {
          "id": "ALF:PUA:Win32/FusionCore",
          "display_name": "ALF:PUA:Win32/FusionCore",
          "target": null
        },
        {
          "id": "ALF:Trojan:O97M/Emotet",
          "display_name": "ALF:Trojan:O97M/Emotet",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        }
      ],
      "attack_ids": [
        {
          "id": "T1550",
          "name": "Use Alternate Authentication Material",
          "display_name": "T1550 - Use Alternate Authentication Material"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Food",
        "Gas",
        "Entertainment"
      ],
      "TLP": "white",
      "cloned_from": "650d0c66e0b02a6dde4a8b7a",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 781,
        "FileHash-SHA256": 3085,
        "domain": 528,
        "URL": 3130,
        "CVE": 6,
        "FileHash-MD5": 610,
        "FileHash-SHA1": 368
      },
      "indicator_count": 8508,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "2 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69814c479d43ae35dc46f6e3",
      "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
      "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 13 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
      "modified": "2026-03-05T01:01:32.758000",
      "created": "2026-02-03T01:15:51.129000",
      "tags": [
        "osint-volley",
        "threatfox",
        "automated",
        "unknown-malware",
        "unknown-stealer",
        "formbook",
        "c2-infrastructure"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
        "https://threatfox.abuse.ch"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Unknown malware",
          "display_name": "Unknown malware",
          "target": null
        },
        {
          "id": "Unknown Stealer",
          "display_name": "Unknown Stealer",
          "target": null
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1219",
          "name": "Remote Access Software",
          "display_name": "T1219 - Remote Access Software"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 101,
        "URL": 6,
        "hostname": 18
      },
      "indicator_count": 125,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 172,
      "modified_text": "46 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69814d41eb0318ce29bebc60",
      "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
      "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 13 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
      "modified": "2026-03-05T01:01:32.758000",
      "created": "2026-02-03T01:20:01.606000",
      "tags": [
        "osint-volley",
        "threatfox",
        "automated",
        "unknown-malware",
        "unknown-stealer",
        "formbook",
        "c2-infrastructure"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
        "https://threatfox.abuse.ch"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Unknown malware",
          "display_name": "Unknown malware",
          "target": null
        },
        {
          "id": "Unknown Stealer",
          "display_name": "Unknown Stealer",
          "target": null
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1219",
          "name": "Remote Access Software",
          "display_name": "T1219 - Remote Access Software"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 101,
        "URL": 6,
        "hostname": 18
      },
      "indicator_count": 125,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 172,
      "modified_text": "46 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69813f351fa3c49ef584ef88",
      "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
      "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 12 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
      "modified": "2026-03-05T00:03:04.060000",
      "created": "2026-02-03T00:20:05.907000",
      "tags": [
        "osint-volley",
        "threatfox",
        "automated",
        "unknown-malware",
        "unknown-stealer",
        "formbook",
        "c2-infrastructure"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
        "https://threatfox.abuse.ch"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Unknown malware",
          "display_name": "Unknown malware",
          "target": null
        },
        {
          "id": "Unknown Stealer",
          "display_name": "Unknown Stealer",
          "target": null
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1219",
          "name": "Remote Access Software",
          "display_name": "T1219 - Remote Access Software"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 101,
        "URL": 6,
        "hostname": 18
      },
      "indicator_count": 125,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "46 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "698146397d618924712f79ac",
      "name": "OSINT Volley 2026-02-03 - Unknown malware/Unknown Stealer/Formbook",
      "description": "Automated OSINT sweep from ThreatFox. Top malware: Unknown malware(81), Unknown Stealer(68), Formbook(60), AsyncRAT(25), Remcos(18). Source: abuse.ch ThreatFox API. SSL enriched: 30 IPs with HTTPS, 12 self-signed (C2 candidates). Pattern 54: sweep\u2192volley automation.",
      "modified": "2026-03-05T00:03:04.060000",
      "created": "2026-02-03T00:50:01.545000",
      "tags": [
        "osint-volley",
        "threatfox",
        "automated",
        "unknown-malware",
        "unknown-stealer",
        "formbook",
        "c2-infrastructure"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix-feed/v2",
        "https://threatfox.abuse.ch"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Unknown malware",
          "display_name": "Unknown malware",
          "target": null
        },
        {
          "id": "Unknown Stealer",
          "display_name": "Unknown Stealer",
          "target": null
        },
        {
          "id": "Formbook",
          "display_name": "Formbook",
          "target": null
        },
        {
          "id": "AsyncRAT",
          "display_name": "AsyncRAT",
          "target": null
        },
        {
          "id": "Remcos",
          "display_name": "Remcos",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1219",
          "name": "Remote Access Software",
          "display_name": "T1219 - Remote Access Software"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 101,
        "URL": 6,
        "hostname": 18
      },
      "indicator_count": 125,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "46 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6981a65e11d2dfe42b7e4369",
      "name": "PreCog Sweep - 2026-02-03 07h",
      "description": "Novel threat indicators detected by PreCog Sweep Engine",
      "modified": "2026-02-03T07:40:14.568000",
      "created": "2026-02-03T07:40:14.568000",
      "tags": [
        "precog",
        "automated",
        "novel-ioc",
        "c2",
        "malware"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix/master",
        "https://github.com/pduggusa/dugganusa-research"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 99,
        "domain": 136,
        "URL": 21
      },
      "indicator_count": 256,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "76 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6981a406bbdc6e91eb2d2937",
      "name": "PreCog Sweep - 2026-02-03 07h",
      "description": "Novel threat indicators detected by PreCog Sweep Engine",
      "modified": "2026-02-03T07:30:14.414000",
      "created": "2026-02-03T07:30:14.414000",
      "tags": [
        "precog",
        "automated",
        "novel-ioc",
        "c2",
        "malware"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix/master",
        "https://github.com/pduggusa/dugganusa-research"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 99,
        "domain": 136,
        "URL": 21
      },
      "indicator_count": 256,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "76 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6981a1ad8c1c40b4d479213d",
      "name": "PreCog Sweep - 2026-02-03 07h",
      "description": "Novel threat indicators detected by PreCog Sweep Engine",
      "modified": "2026-02-03T07:20:13.542000",
      "created": "2026-02-03T07:20:13.542000",
      "tags": [
        "precog",
        "automated",
        "novel-ioc",
        "c2",
        "malware"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix/master",
        "https://github.com/pduggusa/dugganusa-research"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 92,
        "domain": 130,
        "URL": 20
      },
      "indicator_count": 242,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "76 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69819f56bbe6fb6c7e7f5d54",
      "name": "PreCog Sweep - 2026-02-03 07h",
      "description": "Novel threat indicators detected by PreCog Sweep Engine",
      "modified": "2026-02-03T07:10:14.371000",
      "created": "2026-02-03T07:10:14.371000",
      "tags": [
        "precog",
        "automated",
        "novel-ioc",
        "c2",
        "malware"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix/master",
        "https://github.com/pduggusa/dugganusa-research"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 1,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 93,
        "domain": 105,
        "URL": 20
      },
      "indicator_count": 218,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "76 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69819cfeb72f0614e89392b4",
      "name": "PreCog Sweep - 2026-02-03 07h",
      "description": "Novel threat indicators detected by PreCog Sweep Engine",
      "modified": "2026-02-03T07:00:14.602000",
      "created": "2026-02-03T07:00:14.602000",
      "tags": [
        "precog",
        "automated",
        "novel-ioc",
        "c2",
        "malware"
      ],
      "references": [
        "https://analytics.dugganusa.com/api/v1/stix/master",
        "https://github.com/pduggusa/dugganusa-research"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "pduggusa",
        "id": "371400",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_371400/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 27,
        "URL": 21,
        "domain": 163
      },
      "indicator_count": 211,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 171,
      "modified_text": "76 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "briative.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "briative.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776724341.305428
}