{
  "type": "URL",
  "indicator": "https://bat.bing.com/bat.js",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://bat.bing.com/bat.js",
    "type": "url",
    "type_title": "URL",
    "validation": [
      {
        "source": "alexa",
        "message": "Alexa rank: #29",
        "name": "Listed on Alexa"
      },
      {
        "source": "akamai",
        "message": "Akamai rank: #93",
        "name": "Akamai Popular Domain"
      },
      {
        "source": "whitelist",
        "message": "Whitelisted domain bing.com",
        "name": "Whitelisted domain"
      },
      {
        "source": "majestic",
        "message": "Whitelisted domain bing.com",
        "name": "Whitelisted domain"
      }
    ],
    "base_indicator": {
      "id": 2593373118,
      "indicator": "https://bat.bing.com/bat.js",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 8,
      "pulses": [
        {
          "id": "66ae5afda5bae047f7433aaa",
          "name": "hxxps://nait[.]ca - 05.05.25",
          "description": "Detected (08.05.24 via DNS Twist) TLD Compromise: TLD -> Addition, bitsquatting, dictionary, homoglyph, omission, replacement, tld-swap, transposition, vowel-swap problems\nAdded Malcore IOCs: https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
          "modified": "2025-06-05T02:05:37.765000",
          "created": "2024-08-03T16:29:49.667000",
          "tags": [
            "entity",
            "please",
            "javascript",
            "UAlberta"
          ],
          "references": [
            "https://www.virustotal.com/graph/embed/gbd9dc992da5f49728d22429d5552c000303449923a744f018453892e1abeca74?theme=dark",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/iocs",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/summary",
            "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/graph",
            "https://dnstwist.it/#7c697f80-c2c3-43a2-85c0-05ed178bb050",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/66b3cdc90a0b888d183249be",
            "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
            "https://www.filescan.io/uploads/68197948d95f3e34e9615af0/reports/7b5b7977-b6ee-49c0-af35-1ee866e64e4e/ioc",
            "https://www.hybrid-analysis.com/sample/cc2438f2ce5688ebea0b6fc1d556d44e0384ba1651dee3c30fc5ed4c595a40b6/6819791dee8ee1fe7b07b5d4",
            "https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [
            "Education",
            "Technology",
            "Government",
            "Telecommunications",
            "Energy",
            "Healthcare"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Disable_Duck",
            "id": "244325",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 54,
            "FileHash-SHA1": 53,
            "FileHash-SHA256": 549,
            "domain": 970,
            "hostname": 891,
            "URL": 735,
            "SSLCertFingerprint": 474,
            "email": 10
          },
          "indicator_count": 3736,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 129,
          "modified_text": "318 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65612df1531ea0c35d79b1f4",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-11-24T23:12:49.909000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 16,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65612df2a7b287c614a94f94",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-11-24T23:12:50.158000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 222,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "656e19dfeee6ead11dc6354e",
          "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
          "description": "",
          "modified": "2023-12-24T22:02:36.942000",
          "created": "2023-12-04T18:26:39.448000",
          "tags": [
            "adgroupid",
            "x350",
            "lwii",
            "ejan",
            "kfrontier",
            "qkvt0tvj ejan",
            "eja ota",
            "njii",
            "mqkvt0tvj ejan",
            "eqkoatlvqia",
            "unknown",
            "expiration",
            "no expiration",
            "url https",
            "url http",
            "iocs",
            "vj101",
            "slc1",
            "scan endpoints",
            "all octoseek",
            "create new",
            "uw1600",
            "uh1200",
            "next",
            "pulse use",
            "searchbox0",
            "kwwikipedia",
            "bit64",
            "oswindows",
            "cardstandard",
            "pack",
            "kw1download",
            "qchlemail no",
            "bit32bit",
            "ver9",
            "from",
            "mpass",
            "num0",
            "dig0",
            "kbetu1",
            "maxads0",
            "kld1040",
            "opnslfp1",
            "downloader",
            "pdf report",
            "clickid",
            "price",
            "campaignid",
            "domain",
            "text",
            "hostname",
            "aufffdufffd",
            "hostname xn",
            "pcap",
            "filehashsha256",
            "stix",
            "filehashmd5",
            "filehashsha1"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "65612df2a7b287c614a94f94",
          "export_count": 17,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 805,
            "URL": 9065,
            "hostname": 3080,
            "FileHash-MD5": 1373,
            "domain": 1190,
            "FileHash-SHA256": 3468,
            "email": 6,
            "CIDR": 4,
            "CVE": 12
          },
          "indicator_count": 19003,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 230,
          "modified_text": "846 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c27074200c710e3b35c",
          "name": "Malware hosting - metronetinc.com",
          "description": "",
          "modified": "2023-12-06T14:58:47.235000",
          "created": "2023-12-06T14:58:47.235000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 447,
            "hostname": 1241,
            "domain": 536,
            "URL": 3731
          },
          "indicator_count": 5955,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707fe93d9d2c85eb7d457f",
          "name": "Obama.org 03.02.22",
          "description": "",
          "modified": "2023-12-06T14:06:33.765000",
          "created": "2023-12-06T14:06:33.765000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 551,
            "FileHash-SHA256": 2008,
            "domain": 187,
            "URL": 888,
            "CIDR": 21,
            "FileHash-MD5": 63,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3719,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "625f93fe2c0237a71e262354",
          "name": "Malware hosting - metronetinc.com",
          "description": "If(65535) by the end of the year, if (65534) a.sigBytes is a single word, then if, as expected, b.com(d)",
          "modified": "2022-05-20T00:01:19.453000",
          "created": "2022-04-20T05:02:54.354000",
          "tags": [
            "ebattid",
            "click",
            "getclicktarget",
            "date",
            "contexttrack",
            "view",
            "installtrigger",
            "processlink",
            "typeof blog",
            "msie",
            "image",
            "function",
            "asyncfunction",
            "proxy",
            "typeof t",
            "symbol",
            "typeof n",
            "typeerror",
            "typeof window",
            "array",
            "foundation",
            "mit license",
            "http",
            "typeof define",
            "ui disable",
            "selection",
            "ui focusable",
            "this",
            "typeof module",
            "handles",
            "notice block",
            "dataid",
            "block",
            "desc",
            "ofyncl",
            "sorry",
            "cloc",
            "null",
            "object",
            "makes",
            "close",
            "code",
            "find",
            "typeof e",
            "nullt",
            "bottom",
            "left",
            "html",
            "right",
            "width",
            "next",
            "february",
            "april",
            "june",
            "august",
            "back",
            "bounce",
            "atom",
            "cookie",
            "must",
            "number",
            "livevalidation",
            "copyright",
            "alec hill",
            "modified",
            "oracle",
            "format",
            "email",
            "error",
            "closure library",
            "zindex1",
            "msgesture",
            "mspointerdown",
            "fnumber",
            "woothemes",
            "tyler smith",
            "regexp",
            "class",
            "attr",
            "pseudo",
            "child",
            "udc66udc67",
            "ud83d",
            "ufe0f",
            "ud83e",
            "udc68udc69",
            "udfcbudfcc",
            "u2640u2642",
            "source",
            "ud83dudc6cud83c",
            "script",
            "boolean",
            "reduceright",
            "x3ex3cscriptx3e",
            "x3ex3ciframex3e",
            "string",
            "custom",
            "trackevent",
            "path",
            "derek",
            "void",
            "iterator",
            "facebook pixel",
            "pixel code",
            "facebook",
            "service",
            "phonenumber",
            "meta",
            "optin",
            "elqsitevisited",
            "qnew date",
            "rnew date",
            "dlkey",
            "dllookup",
            "httponly",
            "pfunction",
            "contenttype",
            "zfunction",
            "bfunction",
            "mvoid",
            "ofunction",
            "g3xj902fy6q",
            "r300",
            "uint8array",
            "typeof d",
            "caca",
            "array int8array",
            "caregexp",
            "legacy",
            "customevent",
            "09af",
            "ver0",
            "tag0",
            "extdata0",
            "ua ch",
            "window",
            "math",
            "redfq",
            "base64",
            "azaz09s",
            "jeff mott",
            "https",
            "kenji urushima",
            "explorer"
          ],
          "references": [
            "xfe-URL-metronetinc.com-stix2-2.1-export.json",
            "https://a2.adform.net/Serving/TrackPoint/?pm=508052&ADFPageName=Metronet%7CHomepage&ADFdivider=%7C&ord=735079476141&Set1=en-US%7Cen-US%7C390x844%7C32&ADFtpmode=2&loc=https%3A%2F%2Fwww.metronetinc.com%2F",
            "https://a2.adform.net/serving/scripts/trackpoint/async/",
            "https://www.googleadservices.com/pagead/conversion_async.js",
            "https://www.googletagmanager.com/gtag/js?id=G-3XJ902FY6Q&l=dataLayer&cx=c",
            "https://www.google-analytics.com/analytics.js",
            "https://img03.en25.com/i/elqCfg.min.js",
            "https://connect.facebook.net/signals/config/2196524664009793?v=2.9.57&r=stable",
            "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
            "https://www.googletagmanager.com/gtm.js?id=GTM-W3GQ4F",
            "https://static.zdassets.com/ekr/snippet.js?key=e7dd7ff5-a219-47a1-b096-069f750c234f",
            "https://www.metronetinc.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8.4",
            "https://www.metronetinc.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
            "https://www.metronetinc.com/wp-content/themes/MetroNet/js/jquery.flexslider-min.js?ver=5.8.4",
            "https://www.metronetinc.com/wp-content/themes/MetroNet/js/flexslider-init.js?ver=5.8.4",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/982771034/?random=1650430003990&cv=9&fst=1650430003990&num=1&label=Remarketing%20-%20All%20Pages&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C",
            "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&hn=www.googleadservic",
            "https://www.googleadservices.com/pagead/conversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&value=0&label=6dFBCIm13s4BENqltrQC&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&",
            "https://bat.bing.com/p/action/140000459.js",
            "https://img03.en25.com/i/livevalidation_standalone.compressed.js",
            "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/jquery-ui.min.js?ver=1.2",
            "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/lt-ajax-mn-channelguide.js?ver=1.1",
            "https://www.metronetinc.com/wp-content/plugins/atomic-blocks/dist/assets/js/dismiss.js?ver=1625889728",
            "https://www.metronetinc.com/wp-includes/js/hoverIntent.min.js?ver=1.10.1",
            "https://www.metronetinc.com/wp-includes/js/jquery/ui/core.min.js?ver=1.12.1",
            "https://www.metronetinc.com/wp-content/plugins/pixel-caffeine/build/frontend.js?ver=2.3.3",
            "https://stats.wp.com/e-202216.js",
            "https://bs.serving-sys.com/Serving/ActivityServer.bs?cn=as&ActivityID=1073779012&rnd=922949.8781851793",
            "https://secure-ds.serving-sys.com/SemiCachedScripts/ebAttribution.js",
            "https://11057407.fls.doubleclick.net/activityi;src=11057407;type=count0;cat=sitev0;ord=1;num=5426507653008;gtm=2wg4i1;auiddc=1460077727.1650429649;~oref=https%3A%2F%2Fwww.metronetinc.com%2F",
            "xfe-URL-bat.bing.com-stix2-2.1-export 2.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "Tunisia",
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 447,
            "hostname": 1241,
            "URL": 3731,
            "domain": 536
          },
          "indicator_count": 5955,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1430 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6220467ddfb338c3914fe025",
          "name": "Obama.org 03.02.22",
          "description": "",
          "modified": "2022-04-01T00:01:54.852000",
          "created": "2022-03-03T04:39:25.385000",
          "tags": [],
          "references": [
            "obama.org.pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 889,
            "hostname": 551,
            "domain": 187,
            "FileHash-SHA256": 2008,
            "CIDR": 21,
            "FileHash-MD5": 63,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3720,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1479 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader",
        "https://www.metronetinc.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8.4",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/982771034/?random=1650430003990&cv=9&fst=1650430003990&num=1&label=Remarketing%20-%20All%20Pages&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4",
        "https://www.metronetinc.com/wp-includes/js/hoverIntent.min.js?ver=1.10.1",
        "https://static.zdassets.com/ekr/snippet.js?key=e7dd7ff5-a219-47a1-b096-069f750c234f",
        "obama.org.pdf",
        "https://dnstwist.it/#7c697f80-c2c3-43a2-85c0-05ed178bb050",
        "https://www.metronetinc.com/wp-content/themes/MetroNet/js/jquery.flexslider-min.js?ver=5.8.4",
        "https://www.googleadservices.com/pagead/conversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&value=0&label=6dFBCIm13s4BENqltrQC&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&",
        "https://a2.adform.net/Serving/TrackPoint/?pm=508052&ADFPageName=Metronet%7CHomepage&ADFdivider=%7C&ord=735079476141&Set1=en-US%7Cen-US%7C390x844%7C32&ADFtpmode=2&loc=https%3A%2F%2Fwww.metronetinc.com%2F",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
        "https://www.metronetinc.com/wp-includes/js/jquery/ui/core.min.js?ver=1.12.1",
        "https://a2.adform.net/serving/scripts/trackpoint/async/",
        "https://www.virustotal.com/graph/embed/gbd9dc992da5f49728d22429d5552c000303449923a744f018453892e1abeca74?theme=dark",
        "https://img03.en25.com/i/elqCfg.min.js",
        "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/jquery-ui.min.js?ver=1.2",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&hn=www.googleadservic",
        "https://11057407.fls.doubleclick.net/activityi;src=11057407;type=count0;cat=sitev0;ord=1;num=5426507653008;gtm=2wg4i1;auiddc=1460077727.1650429649;~oref=https%3A%2F%2Fwww.metronetinc.com%2F",
        "https://stats.wp.com/e-202216.js",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
        "xfe-URL-bat.bing.com-stix2-2.1-export 2.json",
        "https://www.googletagmanager.com/gtm.js?id=GTM-W3GQ4F",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/summary",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://www.googletagmanager.com/gtag/js?id=G-3XJ902FY6Q&l=dataLayer&cx=c",
        "https://www.hybrid-analysis.com/sample/cc2438f2ce5688ebea0b6fc1d556d44e0384ba1651dee3c30fc5ed4c595a40b6/6819791dee8ee1fe7b07b5d4",
        "https://www.metronetinc.com/wp-content/plugins/pixel-caffeine/build/frontend.js?ver=2.3.3",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/66b3cdc90a0b888d183249be",
        "xfe-URL-metronetinc.com-stix2-2.1-export.json",
        "https://connect.facebook.net/signals/config/2196524664009793?v=2.9.57&r=stable",
        "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/lt-ajax-mn-channelguide.js?ver=1.1",
        "https://bat.bing.com/p/action/140000459.js",
        "https://www.google-analytics.com/analytics.js",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/graph",
        "https://www.metronetinc.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://www.metronetinc.com/wp-content/plugins/atomic-blocks/dist/assets/js/dismiss.js?ver=1625889728",
        "https://bs.serving-sys.com/Serving/ActivityServer.bs?cn=as&ActivityID=1073779012&rnd=922949.8781851793",
        "https://www.filescan.io/uploads/68197948d95f3e34e9615af0/reports/7b5b7977-b6ee-49c0-af35-1ee866e64e4e/ioc",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/iocs",
        "https://img03.en25.com/i/livevalidation_standalone.compressed.js",
        "https://www.metronetinc.com/wp-content/themes/MetroNet/js/flexslider-init.js?ver=5.8.4",
        "https://secure-ds.serving-sys.com/SemiCachedScripts/ebAttribution.js"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Reduceright"
          ],
          "industries": [
            "Energy",
            "Education",
            "Healthcare",
            "Government",
            "Telecommunications",
            "Technology"
          ],
          "unique_indicators": 32293
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/bing.com",
    "whois": "http://whois.domaintools.com/bing.com",
    "domain": "bing.com",
    "hostname": "bat.bing.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 8,
  "pulses": [
    {
      "id": "66ae5afda5bae047f7433aaa",
      "name": "hxxps://nait[.]ca - 05.05.25",
      "description": "Detected (08.05.24 via DNS Twist) TLD Compromise: TLD -> Addition, bitsquatting, dictionary, homoglyph, omission, replacement, tld-swap, transposition, vowel-swap problems\nAdded Malcore IOCs: https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
      "modified": "2025-06-05T02:05:37.765000",
      "created": "2024-08-03T16:29:49.667000",
      "tags": [
        "entity",
        "please",
        "javascript",
        "UAlberta"
      ],
      "references": [
        "https://www.virustotal.com/graph/embed/gbd9dc992da5f49728d22429d5552c000303449923a744f018453892e1abeca74?theme=dark",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/iocs",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/summary",
        "https://www.virustotal.com/gui/collection/20bf6b326e46f6ae2b4794efdc3b1ce1a979b89f98fd2fc95d06361aa2efc4e4/graph",
        "https://dnstwist.it/#7c697f80-c2c3-43a2-85c0-05ed178bb050",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/66b3cdc90a0b888d183249be",
        "https://app.malcore.io/share/652553f6aec33d70a1dbbd25/67ab26651916f9ecabe7f213",
        "https://www.filescan.io/uploads/68197948d95f3e34e9615af0/reports/7b5b7977-b6ee-49c0-af35-1ee866e64e4e/ioc",
        "https://www.hybrid-analysis.com/sample/cc2438f2ce5688ebea0b6fc1d556d44e0384ba1651dee3c30fc5ed4c595a40b6/6819791dee8ee1fe7b07b5d4",
        "https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "Canada"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [
        "Education",
        "Technology",
        "Government",
        "Telecommunications",
        "Energy",
        "Healthcare"
      ],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Disable_Duck",
        "id": "244325",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_244325/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 54,
        "FileHash-SHA1": 53,
        "FileHash-SHA256": 549,
        "domain": 970,
        "hostname": 891,
        "URL": 735,
        "SSLCertFingerprint": 474,
        "email": 10
      },
      "indicator_count": 3736,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 129,
      "modified_text": "318 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65612df1531ea0c35d79b1f4",
      "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
      "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
      "modified": "2023-12-24T22:02:36.942000",
      "created": "2023-11-24T23:12:49.909000",
      "tags": [
        "adgroupid",
        "x350",
        "lwii",
        "ejan",
        "kfrontier",
        "qkvt0tvj ejan",
        "eja ota",
        "njii",
        "mqkvt0tvj ejan",
        "eqkoatlvqia",
        "unknown",
        "expiration",
        "no expiration",
        "url https",
        "url http",
        "iocs",
        "vj101",
        "slc1",
        "scan endpoints",
        "all octoseek",
        "create new",
        "uw1600",
        "uh1200",
        "next",
        "pulse use",
        "searchbox0",
        "kwwikipedia",
        "bit64",
        "oswindows",
        "cardstandard",
        "pack",
        "kw1download",
        "qchlemail no",
        "bit32bit",
        "ver9",
        "from",
        "mpass",
        "num0",
        "dig0",
        "kbetu1",
        "maxads0",
        "kld1040",
        "opnslfp1",
        "downloader",
        "pdf report",
        "clickid",
        "price",
        "campaignid",
        "domain",
        "text",
        "hostname",
        "aufffdufffd",
        "hostname xn",
        "pcap",
        "filehashsha256",
        "stix",
        "filehashmd5",
        "filehashsha1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 16,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 805,
        "URL": 9065,
        "hostname": 3080,
        "FileHash-MD5": 1373,
        "domain": 1190,
        "FileHash-SHA256": 3468,
        "email": 6,
        "CIDR": 4,
        "CVE": 12
      },
      "indicator_count": 19003,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 223,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65612df2a7b287c614a94f94",
      "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
      "description": "Source: http://dev.findatoyota.com/\ntracking, vehicle tracking, mobile phone tracking, active threat , warbot, target tracking, tracking targeted associates, network, cyber stalking, boomrmq string, malvertizing\n\n\nResource: https://www.hybrid-analysis.com/sample/ea8a341cbd3666af7bfce260d86b465844314d86faba75c80eab3ce4d3bc3b45",
      "modified": "2023-12-24T22:02:36.942000",
      "created": "2023-11-24T23:12:50.158000",
      "tags": [
        "adgroupid",
        "x350",
        "lwii",
        "ejan",
        "kfrontier",
        "qkvt0tvj ejan",
        "eja ota",
        "njii",
        "mqkvt0tvj ejan",
        "eqkoatlvqia",
        "unknown",
        "expiration",
        "no expiration",
        "url https",
        "url http",
        "iocs",
        "vj101",
        "slc1",
        "scan endpoints",
        "all octoseek",
        "create new",
        "uw1600",
        "uh1200",
        "next",
        "pulse use",
        "searchbox0",
        "kwwikipedia",
        "bit64",
        "oswindows",
        "cardstandard",
        "pack",
        "kw1download",
        "qchlemail no",
        "bit32bit",
        "ver9",
        "from",
        "mpass",
        "num0",
        "dig0",
        "kbetu1",
        "maxads0",
        "kld1040",
        "opnslfp1",
        "downloader",
        "pdf report",
        "clickid",
        "price",
        "campaignid",
        "domain",
        "text",
        "hostname",
        "aufffdufffd",
        "hostname xn",
        "pcap",
        "filehashsha256",
        "stix",
        "filehashmd5",
        "filehashsha1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 805,
        "URL": 9065,
        "hostname": 3080,
        "FileHash-MD5": 1373,
        "domain": 1190,
        "FileHash-SHA256": 3468,
        "email": 6,
        "CIDR": 4,
        "CVE": 12
      },
      "indicator_count": 19003,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 222,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "656e19dfeee6ead11dc6354e",
      "name": "BlackNET RAT | CIArmyTracking: http://dev.findatoyota.com/",
      "description": "",
      "modified": "2023-12-24T22:02:36.942000",
      "created": "2023-12-04T18:26:39.448000",
      "tags": [
        "adgroupid",
        "x350",
        "lwii",
        "ejan",
        "kfrontier",
        "qkvt0tvj ejan",
        "eja ota",
        "njii",
        "mqkvt0tvj ejan",
        "eqkoatlvqia",
        "unknown",
        "expiration",
        "no expiration",
        "url https",
        "url http",
        "iocs",
        "vj101",
        "slc1",
        "scan endpoints",
        "all octoseek",
        "create new",
        "uw1600",
        "uh1200",
        "next",
        "pulse use",
        "searchbox0",
        "kwwikipedia",
        "bit64",
        "oswindows",
        "cardstandard",
        "pack",
        "kw1download",
        "qchlemail no",
        "bit32bit",
        "ver9",
        "from",
        "mpass",
        "num0",
        "dig0",
        "kbetu1",
        "maxads0",
        "kld1040",
        "opnslfp1",
        "downloader",
        "pdf report",
        "clickid",
        "price",
        "campaignid",
        "domain",
        "text",
        "hostname",
        "aufffdufffd",
        "hostname xn",
        "pcap",
        "filehashsha256",
        "stix",
        "filehashmd5",
        "filehashsha1"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "65612df2a7b287c614a94f94",
      "export_count": 17,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 805,
        "URL": 9065,
        "hostname": 3080,
        "FileHash-MD5": 1373,
        "domain": 1190,
        "FileHash-SHA256": 3468,
        "email": 6,
        "CIDR": 4,
        "CVE": 12
      },
      "indicator_count": 19003,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 230,
      "modified_text": "846 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708c27074200c710e3b35c",
      "name": "Malware hosting - metronetinc.com",
      "description": "",
      "modified": "2023-12-06T14:58:47.235000",
      "created": "2023-12-06T14:58:47.235000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 447,
        "hostname": 1241,
        "domain": 536,
        "URL": 3731
      },
      "indicator_count": 5955,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707fe93d9d2c85eb7d457f",
      "name": "Obama.org 03.02.22",
      "description": "",
      "modified": "2023-12-06T14:06:33.765000",
      "created": "2023-12-06T14:06:33.765000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 551,
        "FileHash-SHA256": 2008,
        "domain": 187,
        "URL": 888,
        "CIDR": 21,
        "FileHash-MD5": 63,
        "FileHash-SHA1": 1
      },
      "indicator_count": 3719,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 110,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "625f93fe2c0237a71e262354",
      "name": "Malware hosting - metronetinc.com",
      "description": "If(65535) by the end of the year, if (65534) a.sigBytes is a single word, then if, as expected, b.com(d)",
      "modified": "2022-05-20T00:01:19.453000",
      "created": "2022-04-20T05:02:54.354000",
      "tags": [
        "ebattid",
        "click",
        "getclicktarget",
        "date",
        "contexttrack",
        "view",
        "installtrigger",
        "processlink",
        "typeof blog",
        "msie",
        "image",
        "function",
        "asyncfunction",
        "proxy",
        "typeof t",
        "symbol",
        "typeof n",
        "typeerror",
        "typeof window",
        "array",
        "foundation",
        "mit license",
        "http",
        "typeof define",
        "ui disable",
        "selection",
        "ui focusable",
        "this",
        "typeof module",
        "handles",
        "notice block",
        "dataid",
        "block",
        "desc",
        "ofyncl",
        "sorry",
        "cloc",
        "null",
        "object",
        "makes",
        "close",
        "code",
        "find",
        "typeof e",
        "nullt",
        "bottom",
        "left",
        "html",
        "right",
        "width",
        "next",
        "february",
        "april",
        "june",
        "august",
        "back",
        "bounce",
        "atom",
        "cookie",
        "must",
        "number",
        "livevalidation",
        "copyright",
        "alec hill",
        "modified",
        "oracle",
        "format",
        "email",
        "error",
        "closure library",
        "zindex1",
        "msgesture",
        "mspointerdown",
        "fnumber",
        "woothemes",
        "tyler smith",
        "regexp",
        "class",
        "attr",
        "pseudo",
        "child",
        "udc66udc67",
        "ud83d",
        "ufe0f",
        "ud83e",
        "udc68udc69",
        "udfcbudfcc",
        "u2640u2642",
        "source",
        "ud83dudc6cud83c",
        "script",
        "boolean",
        "reduceright",
        "x3ex3cscriptx3e",
        "x3ex3ciframex3e",
        "string",
        "custom",
        "trackevent",
        "path",
        "derek",
        "void",
        "iterator",
        "facebook pixel",
        "pixel code",
        "facebook",
        "service",
        "phonenumber",
        "meta",
        "optin",
        "elqsitevisited",
        "qnew date",
        "rnew date",
        "dlkey",
        "dllookup",
        "httponly",
        "pfunction",
        "contenttype",
        "zfunction",
        "bfunction",
        "mvoid",
        "ofunction",
        "g3xj902fy6q",
        "r300",
        "uint8array",
        "typeof d",
        "caca",
        "array int8array",
        "caregexp",
        "legacy",
        "customevent",
        "09af",
        "ver0",
        "tag0",
        "extdata0",
        "ua ch",
        "window",
        "math",
        "redfq",
        "base64",
        "azaz09s",
        "jeff mott",
        "https",
        "kenji urushima",
        "explorer"
      ],
      "references": [
        "xfe-URL-metronetinc.com-stix2-2.1-export.json",
        "https://a2.adform.net/Serving/TrackPoint/?pm=508052&ADFPageName=Metronet%7CHomepage&ADFdivider=%7C&ord=735079476141&Set1=en-US%7Cen-US%7C390x844%7C32&ADFtpmode=2&loc=https%3A%2F%2Fwww.metronetinc.com%2F",
        "https://a2.adform.net/serving/scripts/trackpoint/async/",
        "https://www.googleadservices.com/pagead/conversion_async.js",
        "https://www.googletagmanager.com/gtag/js?id=G-3XJ902FY6Q&l=dataLayer&cx=c",
        "https://www.google-analytics.com/analytics.js",
        "https://img03.en25.com/i/elqCfg.min.js",
        "https://connect.facebook.net/signals/config/2196524664009793?v=2.9.57&r=stable",
        "https://connect.facebook.net/signals/plugins/identity.js?v=2.9.57",
        "https://www.googletagmanager.com/gtm.js?id=GTM-W3GQ4F",
        "https://static.zdassets.com/ekr/snippet.js?key=e7dd7ff5-a219-47a1-b096-069f750c234f",
        "https://www.metronetinc.com/wp-includes/js/wp-emoji-release.min.js?ver=5.8.4",
        "https://www.metronetinc.com/wp-includes/js/jquery/jquery.min.js?ver=3.6.0",
        "https://www.metronetinc.com/wp-content/themes/MetroNet/js/jquery.flexslider-min.js?ver=5.8.4",
        "https://www.metronetinc.com/wp-content/themes/MetroNet/js/flexslider-init.js?ver=5.8.4",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/982771034/?random=1650430003990&cv=9&fst=1650430003990&num=1&label=Remarketing%20-%20All%20Pages&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C",
        "https://googleads.g.doubleclick.net/pagead/viewthroughconversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&hn=www.googleadservic",
        "https://www.googleadservices.com/pagead/conversion/646812378/?random=1650430003991&cv=9&fst=1650430003991&num=1&value=0&label=6dFBCIm13s4BENqltrQC&bg=ffffff&guid=ON&resp=GooglemKTybQhCsO&eid=376635471&u_h=844&u_w=390&u_ah=844&u_aw=390&u_cd=32&u_his=3&u_tz=-240&u_java=false&u_nplug=0&u_nmime=0&gtm=2wg4i1&sendb=1&ig=1&frm=0&url=https%3A%2F%2Fwww.metronetinc.com%2F&tiba=MetroNet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%20%E2%80%93%20100%25%20Fiber%20Optic%20Internet%2C%20Streaming%20TV%2C%20and%20Phone&",
        "https://bat.bing.com/p/action/140000459.js",
        "https://img03.en25.com/i/livevalidation_standalone.compressed.js",
        "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/jquery-ui.min.js?ver=1.2",
        "https://www.metronetinc.com/wp-content/plugins/lt-ajax-mn-channelguide/lt-ajax-mn-channelguide.js?ver=1.1",
        "https://www.metronetinc.com/wp-content/plugins/atomic-blocks/dist/assets/js/dismiss.js?ver=1625889728",
        "https://www.metronetinc.com/wp-includes/js/hoverIntent.min.js?ver=1.10.1",
        "https://www.metronetinc.com/wp-includes/js/jquery/ui/core.min.js?ver=1.12.1",
        "https://www.metronetinc.com/wp-content/plugins/pixel-caffeine/build/frontend.js?ver=2.3.3",
        "https://stats.wp.com/e-202216.js",
        "https://bs.serving-sys.com/Serving/ActivityServer.bs?cn=as&ActivityID=1073779012&rnd=922949.8781851793",
        "https://secure-ds.serving-sys.com/SemiCachedScripts/ebAttribution.js",
        "https://11057407.fls.doubleclick.net/activityi;src=11057407;type=count0;cat=sitev0;ord=1;num=5426507653008;gtm=2wg4i1;auiddc=1460077727.1650429649;~oref=https%3A%2F%2Fwww.metronetinc.com%2F",
        "xfe-URL-bat.bing.com-stix2-2.1-export 2.json"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "Tunisia",
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "ReduceRight",
          "display_name": "ReduceRight",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 447,
        "hostname": 1241,
        "URL": 3731,
        "domain": 536
      },
      "indicator_count": 5955,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 69,
      "modified_text": "1430 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6220467ddfb338c3914fe025",
      "name": "Obama.org 03.02.22",
      "description": "",
      "modified": "2022-04-01T00:01:54.852000",
      "created": "2022-03-03T04:39:25.385000",
      "tags": [],
      "references": [
        "obama.org.pdf"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Kailula4",
        "id": "131997",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 889,
        "hostname": 551,
        "domain": 187,
        "FileHash-SHA256": 2008,
        "CIDR": 21,
        "FileHash-MD5": 63,
        "FileHash-SHA1": 1
      },
      "indicator_count": 3720,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 406,
      "modified_text": "1479 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://bat.bing.com/bat.js",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://bat.bing.com/bat.js",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776622123.130479
}