{
  "type": "URL",
  "indicator": "https://antia-serverlist-develop.puzzleplusgames.net/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://antia-serverlist-develop.puzzleplusgames.net/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3683885975,
      "indicator": "https://antia-serverlist-develop.puzzleplusgames.net/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "6529c91a4f8f0c898f48088c",
          "name": "quick look at vk.com",
          "description": "",
          "modified": "2025-06-26T22:23:19.431000",
          "created": "2023-10-13T22:47:54.295000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "skocherhan",
            "id": "249290",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 18,
            "FileHash-SHA1": 18,
            "FileHash-SHA256": 1981,
            "domain": 506,
            "hostname": 1258,
            "URL": 3080
          },
          "indicator_count": 6861,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 180,
          "modified_text": "297 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a921559dd331e2b31e4c",
          "name": "Brontok",
          "description": "",
          "modified": "2023-12-06T17:02:25.638000",
          "created": "2023-12-06T17:02:25.638000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "hostname": 432,
            "domain": 161,
            "FileHash-SHA256": 714,
            "URL": 750,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a8ec0568abca6f44e16f",
          "name": "quick look at vk.com",
          "description": "",
          "modified": "2023-12-06T17:01:32.275000",
          "created": "2023-12-06T17:01:32.275000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1981,
            "domain": 506,
            "hostname": 1262,
            "URL": 3080,
            "FileHash-MD5": 18,
            "FileHash-SHA1": 18
          },
          "indicator_count": 6865,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709ba68f91ad4dbf340ffa",
          "name": "v3- json from VT graph - link from youtube video complaining about British Tel/openreach",
          "description": "",
          "modified": "2023-12-06T16:04:54.602000",
          "created": "2023-12-06T16:04:54.602000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 178,
            "domain": 29,
            "URL": 315,
            "FileHash-SHA256": 177,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 6
          },
          "indicator_count": 711,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "652ac38b58830eb3825f84e8",
          "name": "Brontok",
          "description": "Colorado Malicious link found in Colorado Secretary of State Website. \n.\nhttps://www.sos.state.co.us/ucc/pages/biz/bizSearch.xhtml \nCritical vulnerabilities:\nVNC Server Authentication-less; The VNC server installed on the remote host allows an attacker to connect to the remote host as no authentication is required to access this service.\n\nBrontok: a computer worm running on Microsoft Windows \n\nRedLine Stealer: infostealer malware stealing password credentials, credit card numbers, etc,. \n\nVulnerable to CVE exploits: 21 CVE's over time.\ncyber criminal web attack?",
          "modified": "2023-11-13T15:00:53.499000",
          "created": "2023-10-14T16:36:27.390000",
          "tags": [
            "united",
            "proxy",
            "firehol",
            "anonymizer",
            "host",
            "team malware",
            "noname057",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "phishing site",
            "malicious site",
            "artemis",
            "installcore",
            "unsafe",
            "alexa",
            "redline stealer",
            "outbreak",
            "iobit",
            "dropper",
            "crack",
            "riskware",
            "acint",
            "conduit",
            "installpack",
            "mediaget",
            "live",
            "presenoker",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "agent",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "team",
            "unruy",
            "trojanx",
            "webshell",
            "exploit",
            "maltiverse",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "site top",
            "html",
            "malware site",
            "win64",
            "opencandy",
            "phishing",
            "fusioncore",
            "wacatac",
            "iframe",
            "downldr",
            "softcnapp",
            "cleaner",
            "tiggre",
            "vidar",
            "raccoon",
            "union",
            "xtrat",
            "bank",
            "cve201711882",
            "phish",
            "nsis",
            "xrat",
            "stealer",
            "download",
            "first",
            "vnc",
            "slimware",
            "trojanspy",
            "blacklist https",
            "Phishing Banco De Brasil",
            "remote",
            "msil, rat,revenge-rat -evasive"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "VNC",
              "display_name": "VNC",
              "target": null
            },
            {
              "id": "Slimware",
              "display_name": "Slimware",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "PUP.Bundler",
              "display_name": "PUP.Bundler",
              "target": null
            },
            {
              "id": "DangerousObject. Agent",
              "display_name": "DangerousObject. Agent",
              "target": null
            },
            {
              "id": "WebToolBar.Backdoor",
              "display_name": "WebToolBar.Backdoor",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "NBAE",
              "display_name": "NBAE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "domain": 161,
            "hostname": 432,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "FileHash-SHA256": 714,
            "URL": 750,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "653f1d0b195d4b6afe502318",
          "name": "Brontok",
          "description": "",
          "modified": "2023-11-13T15:00:53.499000",
          "created": "2023-10-30T03:03:39.499000",
          "tags": [
            "united",
            "proxy",
            "firehol",
            "anonymizer",
            "host",
            "team malware",
            "noname057",
            "cisco umbrella",
            "heur",
            "site",
            "safe site",
            "malware",
            "alexa top",
            "million",
            "phishing site",
            "malicious site",
            "artemis",
            "installcore",
            "unsafe",
            "alexa",
            "redline stealer",
            "outbreak",
            "iobit",
            "dropper",
            "crack",
            "riskware",
            "acint",
            "conduit",
            "installpack",
            "mediaget",
            "live",
            "presenoker",
            "psexec",
            "occamy",
            "brontok",
            "zpevdo",
            "startpage",
            "nanocore",
            "keygen",
            "fareit",
            "secrisk",
            "agent",
            "downer",
            "shell",
            "mediamagnet",
            "sality",
            "swrort",
            "adaptivebee",
            "team",
            "unruy",
            "trojanx",
            "webshell",
            "exploit",
            "maltiverse",
            "generic malware",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "site top",
            "html",
            "malware site",
            "win64",
            "opencandy",
            "phishing",
            "fusioncore",
            "wacatac",
            "iframe",
            "downldr",
            "softcnapp",
            "cleaner",
            "tiggre",
            "vidar",
            "raccoon",
            "union",
            "xtrat",
            "bank",
            "cve201711882",
            "phish",
            "nsis",
            "xrat",
            "stealer",
            "download",
            "first",
            "vnc",
            "slimware",
            "trojanspy",
            "blacklist https",
            "Phishing Banco De Brasil",
            "remote",
            "msil, rat,revenge-rat -evasive"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "VNC",
              "display_name": "VNC",
              "target": null
            },
            {
              "id": "Slimware",
              "display_name": "Slimware",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "PUP.Bundler",
              "display_name": "PUP.Bundler",
              "target": null
            },
            {
              "id": "DangerousObject. Agent",
              "display_name": "DangerousObject. Agent",
              "target": null
            },
            {
              "id": "WebToolBar.Backdoor",
              "display_name": "WebToolBar.Backdoor",
              "target": null
            },
            {
              "id": "Gregory",
              "display_name": "Gregory",
              "target": null
            },
            {
              "id": "NBAE",
              "display_name": "NBAE",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            }
          ],
          "industries": [],
          "TLP": "green",
          "cloned_from": "652ac38b58830eb3825f84e8",
          "export_count": 15,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "domain": 161,
            "hostname": 432,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "FileHash-SHA256": 714,
            "URL": 750,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "888 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "646c74e83167377978da32aa",
          "name": "v3- json from VT graph - link from youtube video complaining about British Tel/openreach",
          "description": "",
          "modified": "2023-06-23T22:19:18.469000",
          "created": "2023-05-23T08:10:16.836000",
          "tags": [
            "pe resource",
            "referrer",
            "youtube vid link"
          ],
          "references": [
            "http://bit.do/BT-openreach-SCAM-Ignore-Question-Telephones-LOCATION"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "callmeDoris",
            "id": "205385",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 178,
            "domain": 29,
            "URL": 315,
            "FileHash-SHA256": 177,
            "FileHash-MD5": 6,
            "FileHash-SHA1": 6
          },
          "indicator_count": 711,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 90,
          "modified_text": "1031 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://bit.do/BT-openreach-SCAM-Ignore-Question-Telephones-LOCATION"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Webtoolbar.backdoor",
            "Dangerousobject. agent",
            "Gregory",
            "Maltiverse",
            "Pup.bundler",
            "Nbae",
            "Trojanspy",
            "Slimware",
            "Vnc"
          ],
          "industries": [],
          "unique_indicators": 11396
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/puzzleplusgames.net",
    "whois": "http://whois.domaintools.com/puzzleplusgames.net",
    "domain": "puzzleplusgames.net",
    "hostname": "antia-serverlist-develop.puzzleplusgames.net"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "6529c91a4f8f0c898f48088c",
      "name": "quick look at vk.com",
      "description": "",
      "modified": "2025-06-26T22:23:19.431000",
      "created": "2023-10-13T22:47:54.295000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "skocherhan",
        "id": "249290",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_249290/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 18,
        "FileHash-SHA1": 18,
        "FileHash-SHA256": 1981,
        "domain": 506,
        "hostname": 1258,
        "URL": 3080
      },
      "indicator_count": 6861,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 180,
      "modified_text": "297 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a921559dd331e2b31e4c",
      "name": "Brontok",
      "description": "",
      "modified": "2023-12-06T17:02:25.638000",
      "created": "2023-12-06T17:02:25.638000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 21,
        "hostname": 432,
        "domain": 161,
        "FileHash-SHA256": 714,
        "URL": 750,
        "FileHash-MD5": 1400,
        "FileHash-SHA1": 706,
        "Mutex": 1,
        "FilePath": 1,
        "URI": 1
      },
      "indicator_count": 4187,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a8ec0568abca6f44e16f",
      "name": "quick look at vk.com",
      "description": "",
      "modified": "2023-12-06T17:01:32.275000",
      "created": "2023-12-06T17:01:32.275000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 1981,
        "domain": 506,
        "hostname": 1262,
        "URL": 3080,
        "FileHash-MD5": 18,
        "FileHash-SHA1": 18
      },
      "indicator_count": 6865,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65709ba68f91ad4dbf340ffa",
      "name": "v3- json from VT graph - link from youtube video complaining about British Tel/openreach",
      "description": "",
      "modified": "2023-12-06T16:04:54.602000",
      "created": "2023-12-06T16:04:54.602000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 178,
        "domain": 29,
        "URL": 315,
        "FileHash-SHA256": 177,
        "FileHash-MD5": 6,
        "FileHash-SHA1": 6
      },
      "indicator_count": 711,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "652ac38b58830eb3825f84e8",
      "name": "Brontok",
      "description": "Colorado Malicious link found in Colorado Secretary of State Website. \n.\nhttps://www.sos.state.co.us/ucc/pages/biz/bizSearch.xhtml \nCritical vulnerabilities:\nVNC Server Authentication-less; The VNC server installed on the remote host allows an attacker to connect to the remote host as no authentication is required to access this service.\n\nBrontok: a computer worm running on Microsoft Windows \n\nRedLine Stealer: infostealer malware stealing password credentials, credit card numbers, etc,. \n\nVulnerable to CVE exploits: 21 CVE's over time.\ncyber criminal web attack?",
      "modified": "2023-11-13T15:00:53.499000",
      "created": "2023-10-14T16:36:27.390000",
      "tags": [
        "united",
        "proxy",
        "firehol",
        "anonymizer",
        "host",
        "team malware",
        "noname057",
        "cisco umbrella",
        "heur",
        "site",
        "safe site",
        "malware",
        "alexa top",
        "million",
        "phishing site",
        "malicious site",
        "artemis",
        "installcore",
        "unsafe",
        "alexa",
        "redline stealer",
        "outbreak",
        "iobit",
        "dropper",
        "crack",
        "riskware",
        "acint",
        "conduit",
        "installpack",
        "mediaget",
        "live",
        "presenoker",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "agent",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "team",
        "unruy",
        "trojanx",
        "webshell",
        "exploit",
        "maltiverse",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "site top",
        "html",
        "malware site",
        "win64",
        "opencandy",
        "phishing",
        "fusioncore",
        "wacatac",
        "iframe",
        "downldr",
        "softcnapp",
        "cleaner",
        "tiggre",
        "vidar",
        "raccoon",
        "union",
        "xtrat",
        "bank",
        "cve201711882",
        "phish",
        "nsis",
        "xrat",
        "stealer",
        "download",
        "first",
        "vnc",
        "slimware",
        "trojanspy",
        "blacklist https",
        "Phishing Banco De Brasil",
        "remote",
        "msil, rat,revenge-rat -evasive"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "VNC",
          "display_name": "VNC",
          "target": null
        },
        {
          "id": "Slimware",
          "display_name": "Slimware",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "PUP.Bundler",
          "display_name": "PUP.Bundler",
          "target": null
        },
        {
          "id": "DangerousObject. Agent",
          "display_name": "DangerousObject. Agent",
          "target": null
        },
        {
          "id": "WebToolBar.Backdoor",
          "display_name": "WebToolBar.Backdoor",
          "target": null
        },
        {
          "id": "Gregory",
          "display_name": "Gregory",
          "target": null
        },
        {
          "id": "NBAE",
          "display_name": "NBAE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 21,
        "domain": 161,
        "hostname": 432,
        "FileHash-MD5": 1400,
        "FileHash-SHA1": 706,
        "FileHash-SHA256": 714,
        "URL": 750,
        "Mutex": 1,
        "FilePath": 1,
        "URI": 1
      },
      "indicator_count": 4187,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "888 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "653f1d0b195d4b6afe502318",
      "name": "Brontok",
      "description": "",
      "modified": "2023-11-13T15:00:53.499000",
      "created": "2023-10-30T03:03:39.499000",
      "tags": [
        "united",
        "proxy",
        "firehol",
        "anonymizer",
        "host",
        "team malware",
        "noname057",
        "cisco umbrella",
        "heur",
        "site",
        "safe site",
        "malware",
        "alexa top",
        "million",
        "phishing site",
        "malicious site",
        "artemis",
        "installcore",
        "unsafe",
        "alexa",
        "redline stealer",
        "outbreak",
        "iobit",
        "dropper",
        "crack",
        "riskware",
        "acint",
        "conduit",
        "installpack",
        "mediaget",
        "live",
        "presenoker",
        "psexec",
        "occamy",
        "brontok",
        "zpevdo",
        "startpage",
        "nanocore",
        "keygen",
        "fareit",
        "secrisk",
        "agent",
        "downer",
        "shell",
        "mediamagnet",
        "sality",
        "swrort",
        "adaptivebee",
        "team",
        "unruy",
        "trojanx",
        "webshell",
        "exploit",
        "maltiverse",
        "generic malware",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "site top",
        "html",
        "malware site",
        "win64",
        "opencandy",
        "phishing",
        "fusioncore",
        "wacatac",
        "iframe",
        "downldr",
        "softcnapp",
        "cleaner",
        "tiggre",
        "vidar",
        "raccoon",
        "union",
        "xtrat",
        "bank",
        "cve201711882",
        "phish",
        "nsis",
        "xrat",
        "stealer",
        "download",
        "first",
        "vnc",
        "slimware",
        "trojanspy",
        "blacklist https",
        "Phishing Banco De Brasil",
        "remote",
        "msil, rat,revenge-rat -evasive"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "VNC",
          "display_name": "VNC",
          "target": null
        },
        {
          "id": "Slimware",
          "display_name": "Slimware",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "PUP.Bundler",
          "display_name": "PUP.Bundler",
          "target": null
        },
        {
          "id": "DangerousObject. Agent",
          "display_name": "DangerousObject. Agent",
          "target": null
        },
        {
          "id": "WebToolBar.Backdoor",
          "display_name": "WebToolBar.Backdoor",
          "target": null
        },
        {
          "id": "Gregory",
          "display_name": "Gregory",
          "target": null
        },
        {
          "id": "NBAE",
          "display_name": "NBAE",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        }
      ],
      "industries": [],
      "TLP": "green",
      "cloned_from": "652ac38b58830eb3825f84e8",
      "export_count": 15,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 21,
        "domain": 161,
        "hostname": 432,
        "FileHash-MD5": 1400,
        "FileHash-SHA1": 706,
        "FileHash-SHA256": 714,
        "URL": 750,
        "Mutex": 1,
        "FilePath": 1,
        "URI": 1
      },
      "indicator_count": 4187,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "888 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "646c74e83167377978da32aa",
      "name": "v3- json from VT graph - link from youtube video complaining about British Tel/openreach",
      "description": "",
      "modified": "2023-06-23T22:19:18.469000",
      "created": "2023-05-23T08:10:16.836000",
      "tags": [
        "pe resource",
        "referrer",
        "youtube vid link"
      ],
      "references": [
        "http://bit.do/BT-openreach-SCAM-Ignore-Question-Telephones-LOCATION"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "callmeDoris",
        "id": "205385",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 178,
        "domain": 29,
        "URL": 315,
        "FileHash-SHA256": 177,
        "FileHash-MD5": 6,
        "FileHash-SHA1": 6
      },
      "indicator_count": 711,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 90,
      "modified_text": "1031 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://antia-serverlist-develop.puzzleplusgames.net/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://antia-serverlist-develop.puzzleplusgames.net/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776683958.4148345
}