{
  "type": "URL",
  "indicator": "https://alt459.igoogle.ca",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://alt459.igoogle.ca",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3230003852,
      "indicator": "https://alt459.igoogle.ca",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 10,
      "pulses": [
        {
          "id": "659d687f92ebb4f3d613ae0c",
          "name": "Mimikatz | www.ssc.spaceforce.mil ",
          "description": "",
          "modified": "2024-01-09T15:38:39.547000",
          "created": "2024-01-09T15:38:39.547000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655cd0f065d2e5a6c92369e5",
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "831 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655cd0f065d2e5a6c92369e5",
          "name": "www.ssc.spaceforce.mil",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-11-21T15:46:56.740000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655ce5116519bd86d1f1bdee",
          "name": "FormBook | www.ssc.spaceforce.mil 'Hoax' | Spyware | Fraud Services",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-11-21T17:12:49.783000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656aa27f81a9096f5889a9d0",
          "name": "WebToolbar | www.ssc.spaceforce.mil ",
          "description": "",
          "modified": "2023-12-21T15:00:07.190000",
          "created": "2023-12-02T03:20:31.494000",
          "tags": [
            "a domains",
            "united",
            "as20940",
            "aaaa",
            "as16625 akamai",
            "link",
            "passive dns",
            "space systems",
            "urls",
            "search",
            "encrypt",
            "ssl certificate",
            "whois record",
            "whois whois",
            "historical ssl",
            "referrer",
            "resolutions",
            "communicating",
            "collections",
            "contacted",
            "sneaky server",
            "team",
            "metro",
            "hacktool",
            "tsara brashears",
            "apple ios",
            "highly targeted",
            "core",
            "android",
            "formbook",
            "emotet",
            "download",
            "malware",
            "malicious",
            "critical",
            "copy",
            "relic",
            "monitoring",
            "installer",
            "first",
            "utc submissions",
            "submitters",
            "gandi sas",
            "csc corporate",
            "domains",
            "cloudflare",
            "cloudflarenet",
            "akamaias",
            "summary iocs",
            "b item",
            "cisco umbrella",
            "site",
            "maltiverse",
            "heur",
            "safe site",
            "alexa top",
            "million",
            "tsgeneric",
            "riskware",
            "unsafe",
            "phishing",
            "union",
            "bank",
            "opencandy",
            "exploit",
            "agent",
            "mimikatz",
            "webtoolbar",
            "no expiration",
            "expiration",
            "indicator role",
            "pulses url",
            "url https",
            "domain",
            "url http",
            "brashears type",
            "showing",
            "entries"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "WebToolbar",
              "display_name": "WebToolbar",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "655cd0f065d2e5a6c92369e5",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 101,
            "FileHash-SHA1": 81,
            "hostname": 1376,
            "URL": 3305,
            "domain": 572,
            "FileHash-SHA256": 3300,
            "CVE": 4,
            "email": 1
          },
          "indicator_count": 8740,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 224,
          "modified_text": "850 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f3a39d889e6d85ae6e0",
          "name": "more of the same fake or compromised pages on websites",
          "description": "",
          "modified": "2023-12-06T14:03:38.459000",
          "created": "2023-12-06T14:03:38.459000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 381,
            "domain": 237,
            "URL": 1245,
            "hostname": 539
          },
          "indicator_count": 2403,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707ec3c760eea3873db672",
          "name": "BernieSanders.com (Pt.3)",
          "description": "",
          "modified": "2023-12-06T14:01:39.582000",
          "created": "2023-12-06T14:01:39.582000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 1950,
            "hostname": 1620,
            "domain": 900,
            "URL": 6563
          },
          "indicator_count": 11034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6218ef296da429f808fd078a",
          "name": "more of the same fake or compromised pages on websites",
          "description": "",
          "modified": "2022-03-27T00:00:39.057000",
          "created": "2022-02-25T15:00:57.930000",
          "tags": [
            "ssl certificate"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 4,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1245,
            "hostname": 539,
            "FileHash-SHA256": 381,
            "domain": 237,
            "CVE": 1
          },
          "indicator_count": 2403,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 393,
          "modified_text": "1484 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6213f8adc8cfe3f681957ed1",
          "name": "BernieSanders.com (Pt.3)",
          "description": "",
          "modified": "2022-03-23T00:02:04.887000",
          "created": "2022-02-21T20:40:13.490000",
          "tags": [
            "ssl certificate",
            "whois record",
            "whois"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Government"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1620,
            "URL": 6563,
            "FileHash-SHA256": 1950,
            "domain": 900,
            "CVE": 1
          },
          "indicator_count": 11034,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 409,
          "modified_text": "1488 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Webtoolbar"
          ],
          "industries": [
            "Government"
          ],
          "unique_indicators": 51649
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/igoogle.ca",
    "whois": "http://whois.domaintools.com/igoogle.ca",
    "domain": "igoogle.ca",
    "hostname": "alt459.igoogle.ca"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 10,
  "pulses": [
    {
      "id": "659d687f92ebb4f3d613ae0c",
      "name": "Mimikatz | www.ssc.spaceforce.mil ",
      "description": "",
      "modified": "2024-01-09T15:38:39.547000",
      "created": "2024-01-09T15:38:39.547000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655cd0f065d2e5a6c92369e5",
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "831 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655cd0f065d2e5a6c92369e5",
      "name": "www.ssc.spaceforce.mil",
      "description": "",
      "modified": "2023-12-21T15:00:07.190000",
      "created": "2023-11-21T15:46:56.740000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655ce5116519bd86d1f1bdee",
      "name": "FormBook | www.ssc.spaceforce.mil 'Hoax' | Spyware | Fraud Services",
      "description": "",
      "modified": "2023-12-21T15:00:07.190000",
      "created": "2023-11-21T17:12:49.783000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656aa27f81a9096f5889a9d0",
      "name": "WebToolbar | www.ssc.spaceforce.mil ",
      "description": "",
      "modified": "2023-12-21T15:00:07.190000",
      "created": "2023-12-02T03:20:31.494000",
      "tags": [
        "a domains",
        "united",
        "as20940",
        "aaaa",
        "as16625 akamai",
        "link",
        "passive dns",
        "space systems",
        "urls",
        "search",
        "encrypt",
        "ssl certificate",
        "whois record",
        "whois whois",
        "historical ssl",
        "referrer",
        "resolutions",
        "communicating",
        "collections",
        "contacted",
        "sneaky server",
        "team",
        "metro",
        "hacktool",
        "tsara brashears",
        "apple ios",
        "highly targeted",
        "core",
        "android",
        "formbook",
        "emotet",
        "download",
        "malware",
        "malicious",
        "critical",
        "copy",
        "relic",
        "monitoring",
        "installer",
        "first",
        "utc submissions",
        "submitters",
        "gandi sas",
        "csc corporate",
        "domains",
        "cloudflare",
        "cloudflarenet",
        "akamaias",
        "summary iocs",
        "b item",
        "cisco umbrella",
        "site",
        "maltiverse",
        "heur",
        "safe site",
        "alexa top",
        "million",
        "tsgeneric",
        "riskware",
        "unsafe",
        "phishing",
        "union",
        "bank",
        "opencandy",
        "exploit",
        "agent",
        "mimikatz",
        "webtoolbar",
        "no expiration",
        "expiration",
        "indicator role",
        "pulses url",
        "url https",
        "domain",
        "url http",
        "brashears type",
        "showing",
        "entries"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "WebToolbar",
          "display_name": "WebToolbar",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "655cd0f065d2e5a6c92369e5",
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 101,
        "FileHash-SHA1": 81,
        "hostname": 1376,
        "URL": 3305,
        "domain": 572,
        "FileHash-SHA256": 3300,
        "CVE": 4,
        "email": 1
      },
      "indicator_count": 8740,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 224,
      "modified_text": "850 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707f3a39d889e6d85ae6e0",
      "name": "more of the same fake or compromised pages on websites",
      "description": "",
      "modified": "2023-12-06T14:03:38.459000",
      "created": "2023-12-06T14:03:38.459000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 381,
        "domain": 237,
        "URL": 1245,
        "hostname": 539
      },
      "indicator_count": 2403,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707ec3c760eea3873db672",
      "name": "BernieSanders.com (Pt.3)",
      "description": "",
      "modified": "2023-12-06T14:01:39.582000",
      "created": "2023-12-06T14:01:39.582000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 1,
        "FileHash-SHA256": 1950,
        "hostname": 1620,
        "domain": 900,
        "URL": 6563
      },
      "indicator_count": 11034,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707e5b7df6f60133e8fb50",
      "name": "Jeeng / Powerbox",
      "description": "",
      "modified": "2023-12-06T13:59:55.129000",
      "created": "2023-12-06T13:59:55.129000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 3,
        "FileHash-SHA256": 9072,
        "domain": 2500,
        "hostname": 3584,
        "URL": 13548,
        "FileHash-MD5": 197,
        "FileHash-SHA1": 162,
        "email": 19,
        "CIDR": 20,
        "SSLCertFingerprint": 2,
        "BitcoinAddress": 1
      },
      "indicator_count": 29108,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "620c3b1f8af7ea0dcf2c1218",
      "name": "Jeeng / Powerbox",
      "description": "",
      "modified": "2022-06-12T22:01:23.105000",
      "created": "2022-02-15T23:45:35.234000",
      "tags": [
        "Jeeng",
        "tim pool",
        "timcast"
      ],
      "references": [
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scnrscnr",
        "id": "126475",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 9072,
        "domain": 2500,
        "URL": 13548,
        "hostname": 3584,
        "FileHash-MD5": 197,
        "FileHash-SHA1": 162,
        "CVE": 3,
        "CIDR": 20,
        "SSLCertFingerprint": 2,
        "email": 19,
        "BitcoinAddress": 1
      },
      "indicator_count": 29108,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 97,
      "modified_text": "1407 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6218ef296da429f808fd078a",
      "name": "more of the same fake or compromised pages on websites",
      "description": "",
      "modified": "2022-03-27T00:00:39.057000",
      "created": "2022-02-25T15:00:57.930000",
      "tags": [
        "ssl certificate"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 4,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "dorkingbeauty1",
        "id": "80137",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1245,
        "hostname": 539,
        "FileHash-SHA256": 381,
        "domain": 237,
        "CVE": 1
      },
      "indicator_count": 2403,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 393,
      "modified_text": "1484 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6213f8adc8cfe3f681957ed1",
      "name": "BernieSanders.com (Pt.3)",
      "description": "",
      "modified": "2022-03-23T00:02:04.887000",
      "created": "2022-02-21T20:40:13.490000",
      "tags": [
        "ssl certificate",
        "whois record",
        "whois"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Government"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1620,
        "URL": 6563,
        "FileHash-SHA256": 1950,
        "domain": 900,
        "CVE": 1
      },
      "indicator_count": 11034,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 409,
      "modified_text": "1488 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://alt459.igoogle.ca",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://alt459.igoogle.ca",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776641593.0581822
}