{
  "type": "URL",
  "indicator": "https://pay.squarecafecleveland.net",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://pay.squarecafecleveland.net",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4055882811,
      "indicator": "https://pay.squarecafecleveland.net",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 10,
      "pulses": [
        {
          "id": "684a93360163e8802e213158",
          "name": "ELF:Mirai AMAZON-02 - Autonomous System  65.0.0.0/14",
          "description": "ELF:Mirai-BHZ\\ [Trj]\t\n65.0.0.0/14\nAutonomous System Number\n16509\nAutonomous System Label\nAMAZON-02\nRelated to \u2022 103.252.236.26 | \n\u2022 sr2.reliedhosting.com | \n.\u2022 http://planitair.com/ |\n\u2022 bgptools-wildcard-confirmed.acemalibu.com | \n\u2022 https://www.anyxxxtube.net/search-porn/tsara-brashears/ | \t\t\t\n\u2022 static.ads-twitter.com\t\n\u2022 https://twitter.com/PORNO_SEXYBABES\t\n\u2022 analytics.twitter.com\n\u2022 appleupdate.org\n\u2022 apps.apple.com\n\u2022 pin.it |\n\u2022 https://pin.it/ |\n\u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  Critical issue. Cyber weaponry [Unclear] Stealth contractual US cyber defense entity, endless DGA\u2019s. India IP block.\nAdversary named by bupyeongop:\n\ubd80\ud3c9\uc624\ud53c \ucd9c\uc7a5\ub9c8\uc0ac\uc9c0\uc548\ub0b4.COM \ubd80\ud3c9OP (massage service?)\n*DoS with many OTX features",
          "modified": "2025-07-12T07:04:05.635000",
          "created": "2025-06-12T08:43:34.719000",
          "tags": [
            "thumbprint",
            "apnic",
            "apnic whois",
            "database",
            "please",
            "arin whois",
            "north america",
            "caribbean",
            "africa",
            "internet",
            "iana",
            "address range",
            "cidr",
            "network name",
            "allocation type",
            "whois server",
            "algorithm",
            "v3 serial",
            "number",
            "cbe oglobalsign",
            "r6 alphassl",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "key identifier",
            "link",
            "search",
            "united",
            "a domains",
            "ip address",
            "creation date",
            "record value",
            "date",
            "showing",
            "india unknown",
            "status",
            "passive dns",
            "ipv4 add",
            "pulse submit",
            "url analysis",
            "urls",
            "files",
            "location india",
            "india asn",
            "as133296 web",
            "dns resolutions"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "APNIC",
              "display_name": "APNIC",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 28,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 27,
            "domain": 2499,
            "hostname": 2651,
            "URL": 10986,
            "CIDR": 2,
            "FileHash-SHA256": 3596,
            "email": 1,
            "FileHash-MD5": 23,
            "CVE": 7
          },
          "indicator_count": 19792,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "281 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468500f573317422968c7c",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:52.404000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468501eb091ae414509121",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:53.417000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468505ee31db44fe063e82",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:57.123000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846850783baea1a6beb7e71",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. I won\u2019t be surprised if OTX cannot pull the threat. My account isn\u2019t allowing me full permissions. \n\n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:53:59.933000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "68468511340fb7ba8eeb7aae",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:54:09.116000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846860a0c5ff214f345717c",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:58:17.902000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6846860ee9b4faefae8d4cf9",
          "name": "Crowdsourced research | IP 192.229.221.95",
          "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
          "modified": "2025-07-09T05:00:24.293000",
          "created": "2025-06-09T06:58:22.091000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 284,
            "FileHash-SHA1": 285,
            "FileHash-SHA256": 3666,
            "domain": 511,
            "hostname": 845,
            "URL": 3282,
            "CVE": 2,
            "email": 1
          },
          "indicator_count": 8876,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 138,
          "modified_text": "284 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "682dd4e25a347684b2dfeabe",
          "name": "Apple Radar? Manipulated iOS products access , manipulate , control technology in periphery",
          "description": "Apple product(s)  using radar? access nearby tech, (Apple products, other brands, televisions, MP3 players). Target reports other devices have been erased, refreshed, truncated,. .https://ssdauthority.com/does-sandisk-ixpand-work-on-windows/ |\nssdauthority.com |\nradarsubmissions.apple.com |\nsecure.www.apple.com\nThis will take further, in depth investigation. I can\u2019t explain what seems fantastical and  be. considered sane. Many files resolved already.",
          "modified": "2025-06-20T12:05:58.229000",
          "created": "2025-05-21T13:28:01.980000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 637,
            "CVE": 1,
            "FileHash-MD5": 26,
            "FileHash-SHA1": 25,
            "FileHash-SHA256": 1296,
            "domain": 170,
            "hostname": 369
          },
          "indicator_count": 2524,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "303 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "67f5555b6ce863d998e83e26",
          "name": "macOS Threat Infrastructure Leveraging Remote Agents via remotewd.com and rtmsprod.net",
          "description": "This pulse identifies an actively observed macOS-focused remote access infrastructure abusing trusted native Apple agents (ARDAgent.app, SSMenuAgent.app) and communicating with a distributed network of C2-like endpoints under domains such as remotewd.com, idsremoteurlconnectionagent.app, and rtmsprod.net.\n\nThe infrastructure is composed of dynamically generated subdomains \u2014 many in the form of device-<UUID>.remotewd.com \u2014 indicative of automated deployment, system tracking, or per-host remote access configurations.\n\nAdditional indicators include HTTP/S URLs pointing directly to embedded binary paths within macOS agents, suggesting possible delivery vectors, staging, or persistence techniques.\n\nThis campaign shows signs of structured, programmatic targeting and is highly likely to be pre-operational infrastructure for wide-scale surveillance or access operations. All listed indicators should be considered high-risk. If observed in your environment, initiate a full forensic and IR process immediately.",
          "modified": "2025-05-11T19:03:59.885000",
          "created": "2025-04-08T16:56:59.641000",
          "tags": [
            "generated from",
            "do not",
            "edit uri",
            "urls",
            "edit",
            "rewriteengine",
            "rewritecond",
            "rewriterule",
            "r301",
            "xml2encalias",
            "beralloct",
            "berbvarrayadd",
            "berbvarrayfree",
            "berbvdup",
            "berbvecadd",
            "berbvecfree",
            "berbvfree",
            "berdump",
            "berdup",
            "berdupbv",
            "laerrordomain",
            "laerrornoncekey",
            "lamechanismtree",
            "lacontext",
            "ladomainstate",
            "laenvironment",
            "lanotification",
            "laprivatekey",
            "lapublickey",
            "laright",
            "apple swift",
            "o librarylevel",
            "combine import",
            "foundation",
            "swift import",
            "mcpeerid",
            "mcsession",
            "property",
            "copyright",
            "protocol",
            "class",
            "bonjour",
            "ascii lowercase",
            "abc company",
            "section",
            "bonjour txt",
            "note",
            "ui element",
            "utf8 encoding",
            "nscopying",
            "nsdictionary",
            "nsstring",
            "mcextern",
            "attribute",
            "mcextern extern",
            "mcexternweak",
            "nsenum",
            "nsinteger",
            "mcerrorcode",
            "mcerrorunknown",
            "mcerrortimedout",
            "peer",
            "example",
            "bonjour apis",
            "stop",
            "tags",
            "session",
            "nsprogress",
            "nserror",
            "nsurl",
            "nsarray",
            "create",
            "nsuinteger",
            "notifies",
            "mcsession api",
            "interface",
            "dbictrace",
            "dbivporth",
            "dbictracelevel",
            "dbdtffoo",
            "dbihseterrchar",
            "dbicstate",
            "dbictraceflags",
            "provides macros",
            "dbi release",
            "only",
            "sqlsuccess",
            "odbc",
            "sqlok",
            "tim bunce",
            "england",
            "sql cli",
            "sql datatype",
            "sqlguid",
            "sqlwlongvarchar",
            "main",
            "beware",
            "sv sth",
            "sv dbh",
            "impsth",
            "impdbh",
            "sv keysv",
            "sv params",
            "sv attr",
            "sv attribs",
            "sv drh",
            "void",
            "fri jul",
            "mixed",
            "dbixsrevision",
            "plsvundef",
            "license",
            "spagain",
            "perlioprintf",
            "dbiclogpio",
            "putback",
            "ireland",
            "gnu general",
            "super",
            "magic",
            "dbicflags",
            "dbis",
            "svrv",
            "null",
            "imp2com",
            "dbicactivekids",
            "dbicfiadestroy",
            "sv h",
            "dbicdbistate",
            "code",
            "copy",
            "refer",
            "trace",
            "error",
            "unknown",
            "hookopcheckh",
            "startexternc",
            "hookopcheckcb",
            "userdata",
            "endexternc",
            "isinternalbuild",
            "kickmcxdforuid",
            "loadappkit",
            "ardconfig",
            "authenticator",
            "dsauthenticator",
            "dsnode",
            "dsrecord",
            "group",
            "hostconfig",
            "apfsvolumelock",
            "apfsvolumerole",
            "aoskgetosinfo",
            "aoskgetuserinfo",
            "aosaddappleid",
            "aosdisablepcs",
            "aosenablepcs",
            "aoslog",
            "aoslogforce",
            "aosrelaycookie",
            "didfailcallback",
            "kaosaccountkey",
            "kapcsbundle",
            "kapcspath",
            "kjsonextension",
            "apcsbucketid",
            "apcsreports",
            "apconfiguration",
            "apversiondata",
            "apversionhelper",
            "systemvolumesvm",
            "name size",
            "identifier",
            "gb disk0s3",
            "devdisk3",
            "apfs container",
            "scheme",
            "physical store",
            "macintosh hd",
            "apfs snapshot",
            "preboot",
            "refs address",
            "size wired",
            "name",
            "version",
            "uuid",
            "linked against",
            "renderer",
            "helper",
            "chrome helper",
            "contains",
            "cloud ui",
            "macintosh",
            "khtml",
            "gecko",
            "ui helper",
            "plugin",
            "service",
            "good",
            "battery power",
            "apfs encryption",
            "jumpcloud go",
            "chrome web",
            "store",
            "privacy badger",
            "flowcrypt",
            "encrypt gmail",
            "simple",
            "google",
            "b2b phone",
            "number",
            "apollo",
            "future",
            "exccrash",
            "sigkill",
            "code signature",
            "invalid",
            "sigabrt",
            "protonvpn",
            "excguard",
            "excbreakpoint",
            "sigtrap",
            "excbadaccess",
            "appl",
            "english",
            "adobe crash",
            "adobe",
            "acrobat dcadobe",
            "processor",
            "uninstaller",
            "assistant",
            "install",
            "cloud",
            "dock",
            "calendar",
            "music",
            "terminal",
            "tips",
            "installer",
            "updater",
            "proton",
            "tools",
            "stub",
            "python",
            "clock",
            "powershell",
            "team",
            "rave scout",
            "cookies",
            "public folder",
            "key cert",
            "sign",
            "crl sign",
            "root ca",
            "authority",
            "public primary",
            "global root",
            "verisign",
            "academic",
            "premium",
            "adaptive",
            "interactive",
            "background",
            "standard",
            "launchd sandbox",
            "s mdworker",
            "agent",
            "command line",
            "progress",
            "yubico",
            "macos13action",
            "disableoverride",
            "disableairdrop",
            "denyactivation",
            "enable",
            "loginwindowtext",
            "jumpcloud",
            "autoupdate",
            "loggingoption",
            "enablefirewall",
            "arm64e",
            "apple m2",
            "mac142",
            "kjqqtw7pqt",
            "daemon",
            "server",
            "open directory",
            "user",
            "account",
            "kerberos admin",
            "kerberos change",
            "device daemon",
            "network",
            "desktop",
            "screensaver",
            "bridge",
            "aesxtsarm",
            "aesecbarm",
            "sha512vngarmhw",
            "sha384vngarmhw",
            "sha256vngarm",
            "sha1vngarm",
            "darwin kernel",
            "wed mar",
            "wkarraycreate",
            "wkbooleancreate",
            "wkcontextcreate",
            "wkdatacreate",
            "wkdatagettypeid",
            "wkdoublecreate",
            "wkframecopyurl",
            "wkgettypeid",
            "wkimagecreate",
            "wkpagecandelete",
            "webview",
            "notice",
            "this software",
            "including",
            "but not",
            "limited to",
            "redistribution",
            "is provided",
            "by apple",
            "direct",
            "damage",
            "apiavailable",
            "webkit",
            "nsswiftname",
            "document",
            "a block",
            "as is",
            "hasinclude",
            "wkdownload",
            "abstract",
            "wkerrorcode",
            "wkerrorunknown",
            "discussion",
            "bool",
            "whether",
            "wkcontentworld",
            "wkwebview",
            "javascript",
            "nsunavailable",
            "vaargs",
            "nsswiftasync",
            "wkswiftasync",
            "wkcookiepolicy",
            "wkswiftuiactor",
            "nshttpcookie",
            "targetosiphone",
            "wknavigation",
            "decides",
            "boolean value",
            "apideprecated",
            "methodkind",
            "wkerrordomain",
            "wkscriptmessage",
            "promise",
            "fulfill",
            "const",
            "url scheme",
            "mark",
            "wkuserscript",
            "targetosvision",
            "param",
            "wkframeinfo",
            "targetosios",
            "pass",
            "window",
            "mime type",
            "link",
            "nsimage",
            "returns",
            "nsset",
            "checks",
            "matches",
            "a boolean",
            "defaults",
            "wkwebextension",
            "cgsize",
            "uiimage",
            "apis",
            "nsdate",
            "wkcontentmode",
            "wkextern",
            "possible",
            "cgfloat",
            "media",
            "cgrect",
            "apiunavailable",
            "framework",
            "nsswiftuiactor",
            "targetoswatch",
            "confirms",
            "apple upgrade",
            "nsstring user",
            "nsobject",
            "provider",
            "apple",
            "password",
            "uicontrol",
            "nscontrol",
            "asuseragerange",
            "check",
            "opaque user",
            "apple id",
            "initiate",
            "asauthorization",
            "operation",
            "state",
            "nserrorenum",
            "nsdata",
            "relying party",
            "asapiavailable",
            "perform",
            "realm",
            "http response",
            "authorization",
            "http",
            "oauth",
            "saml",
            "a byte",
            "nsdata userid",
            "relying",
            "a string",
            "nsdata readdata",
            "bool didwrite",
            "a cose",
            "nsdata first",
            "nsdata second",
            "nsstring name",
            "bool appid",
            "targetosxr",
            "nsstring appid",
            "bluetooth",
            "mdm profile",
            "nsurl url",
            "returns yes",
            "a state",
            "a json",
            "web token",
            "private seckeys",
            "enables",
            "keychain",
            "asswiftsendable",
            "cose algorithm",
            "ecdsa",
            "sha256",
            "cose curve",
            "p256",
            "nullable",
            "bool success",
            "remove",
            "call",
            "complete",
            "initializes",
            "time code",
            "extensions",
            "asextern extern",
            "asextern",
            "nsswiftsendable",
            "prepare",
            "list",
            "nsextension",
            "attempt",
            "nsstring label",
            "creates",
            "nsstring code",
            "a key",
            "webauthn",
            "nssecurecoding",
            "input",
            "output",
            "initialize",
            "nsinteger rank",
            "json",
            "inputs",
            "hash",
            "nsstring origin",
            "settings app",
            "extension",
            "https urls",
            "safari",
            "cancel",
            "nsuuid uuid",
            "r uftpexu",
            "nsmutabledata",
            "vnsdate",
            "mprcjy",
            "postfix",
            "domain",
            "canonical",
            "tables",
            "ldap",
            "post",
            "replace user",
            "address",
            "wietse venema",
            "bugs",
            "mail",
            "aliases",
            "postfix version",
            "restrict",
            "sample",
            "person",
            "basic system",
            "general",
            "reject empty",
            "postfix smtp",
            "ipv6 host",
            "reject",
            "reply",
            "access",
            "prior",
            "hold",
            "info",
            "mail delivery",
            "charset",
            "system",
            "report",
            "postfix dsn",
            "mail returned",
            "this",
            "generic",
            "smtp",
            "isp mail",
            "mime",
            "headerchecks",
            "readme files",
            "filters while",
            "posix",
            "empty",
            "body",
            "write",
            "date",
            "smtp server",
            "specify",
            "mx host",
            "unix password",
            "user unknown",
            "pathbin",
            "postfix queue",
            "unix",
            "cyrus",
            "path",
            "uucp",
            "shell",
            "local",
            "program",
            "agreement",
            "contributor",
            "recipient",
            "contribution",
            "the program",
            "corporation",
            "contributors",
            "product x",
            "as expressly",
            "arch",
            "arch x8664",
            "pipe wall",
            "wimplicit",
            "ranlib",
            "warn",
            "switch",
            "start",
            "systype",
            "outlook",
            "postfix master",
            "begin",
            "server admin",
            "mail backend",
            "modern smtp",
            "iana",
            "many",
            "postfix pipe",
            "recent cyrus",
            "amos gouaux",
            "old example",
            "or even",
            "lutz jaenicke",
            "technology",
            "cottbus",
            "germany",
            "openssl package",
            "openssl project",
            "europe",
            "remember that",
            "use of",
            "file",
            "update",
            "usrsbin",
            "file format",
            "no group",
            "daemondirectory",
            "deliver mail",
            "transport",
            "description",
            "result format",
            "virtual",
            "virtual alias",
            "redirect mail",
            "relocated",
            "matches user",
            "synopsis",
            "lastname",
            "firstname",
            "apple computer",
            "tcpip",
            "supported",
            "quantum",
            "facility",
            "level",
            "level info",
            "broadcast",
            "ignore",
            "rules",
            "sender",
            "automounter map",
            "use directory",
            "get home",
            "home autohome",
            "true",
            "t option",
            "mount",
            "force",
            "environment",
            "automountdenv",
            "promptcommand",
            "shellsessiondir",
            "histfile",
            "histfilesize",
            "myvar",
            "histtimeformat",
            "arrange",
            "bashrematch",
            "tell",
            "ps1h",
            "make bash",
            "s checkwinsize",
            "etcbashrc",
            "termprogram",
            "inpck",
            "nnnbaud",
            "berkeley",
            "parity",
            "pc entry",
            "pass8",
            "parenb istrip",
            "fixed speed",
            "entry",
            "clocal mode",
            "maxhistsize",
            "promptmode",
            "verbose end",
            "etcirbrcloaded",
            "default",
            "setup",
            "history file",
            "kernel",
            "readline",
            "jabber",
            "group database",
            "dovecot",
            "postfix scsd",
            "networkd",
            "searchpaths",
            "freebsd",
            "tmpdir",
            "fcodes",
            "prunepaths",
            "vartmp",
            "prunedirs",
            "filesystems",
            "nroff",
            "manpath",
            "uncomment",
            "manpager",
            "whatispager",
            "manlocale",
            "every",
            "manpath optman",
            "maybe",
            "troff",
            "status mailfrom",
            "returnpath via",
            "pidfile",
            "flags",
            "bcgjnuwz",
            "bin usrsbin",
            "sbin",
            "default pf",
            "care",
            "audio",
            "user database",
            "unix copy",
            "gate daemon",
            "bashno",
            "r etcbashrc",
            "rfc1323",
            "m1460",
            "macos x",
            "signature",
            "linux",
            "opera",
            "xp sp1",
            "windows sp1",
            "nmap syn",
            "m265",
            "synack",
            "mind",
            "macos",
            "warp",
            "ipv6",
            "internet",
            "icmp",
            "cisco",
            "monitoring",
            "argus",
            "chaos",
            "rsvp",
            "encapsulation",
            "aris",
            "isis",
            "netbootmount",
            "netbootshadow",
            "computername",
            "localonly",
            "localnetbootdir",
            "netboot",
            "define",
            "purpose",
            "networkonly",
            "waiting",
            "networkup",
            "term",
            "devnull",
            "common setup",
            "configure",
            "set command",
            "dns hostname",
            "dns query",
            "see also",
            "kame",
            "sunnet manager",
            "rpcsrc",
            "netlicense",
            "ftpd",
            "bindash binksh",
            "binsh bintcsh",
            "jumpcloud ldap",
            "smb2",
            "security",
            "workgroup",
            "standalone",
            "samba server",
            "enforce",
            "smb3",
            "example share",
            "improper use",
            "ctrlc",
            "none",
            "fax reception",
            "hardwired",
            "0007",
            "must",
            "visudo",
            "blocksize",
            "charset lang",
            "language lcall",
            "lines columns",
            "lscolors",
            "sshauthsock",
            "orion",
            "setup user",
            "home",
            "zdotdir",
            "delete",
            "beep",
            "vendor",
            "kf10",
            "kf11",
            "kf12",
            "kf13",
            "backspace",
            "insert",
            "resume",
            "termsessionid",
            "savehist",
            "sharehistory",
            "h do",
            "volume",
            "de l",
            "l uuid",
            "m tra",
            "n est",
            "suuid",
            "prfen",
            "fusion",
            "syst",
            "look",
            "executant",
            "alla",
            "over",
            "test",
            "overie",
            "zapis",
            "rapid",
            "disco usa",
            "de macos",
            "nie s",
            "i denne",
            "adgjmpsvx",
            "diskgthis disk",
            "01k8x j",
            "34disk",
            "levy kytt",
            "dict",
            "array",
            "plist",
            "apple root",
            "code signing",
            "inode64r",
            "xofkoxzh",
            "integer",
            "doctype",
            "brain",
            "abcd",
            "ogwo",
            "boaw",
            "cobwa",
            "uhawavauatsh",
            "ip bitmap",
            "foewdc",
            "could",
            "ip block",
            "funcs",
            "cogwo",
            "trash",
            "double",
            "hunt",
            "affa",
            "carr",
            "crypto",
            "docwbac",
            "q1b0",
            "q1 0",
            "h h5",
            "docwbag",
            "slice",
            "format",
            "zero",
            "alfa",
            "hera",
            "lelei",
            "hehe",
            "hisp",
            "fail",
            "katy",
            "zakk",
            "eodwcbgao",
            "hhk8di",
            "alma",
            "topo",
            "open",
            "huhk",
            "piper",
            "hehx",
            "eh ui",
            "h20hph",
            "hif h",
            "hmhhihqhyla hq",
            "r11b0",
            "target",
            "uus10u",
            "hifh",
            "loghookfailed",
            "loghook",
            "hell",
            "q1b 0",
            "f duh",
            "aqw1",
            "1160"
          ],
          "references": [
            "index.html.en",
            "bind.html",
            "caching.html",
            "BUILDING",
            "configuring.html",
            "content-negotiation.html",
            "custom-error.html",
            "convenience.map",
            "LDAP.tbd",
            "lber.h",
            "ldap.h",
            "LocalAuthentication.tbd",
            "arm64e-apple-macos.swiftinterface",
            "x86_64-apple-ios-macabi.swiftinterface",
            "arm64e-apple-ios-macabi.swiftinterface",
            "x86_64-apple-macos.swiftinterface",
            "MultipeerConnectivity.tbd",
            "module.modulemap",
            "MCNearbyServiceAdvertiser.h",
            "MCPeerID.h",
            "MCError.h",
            "MCNearbyServiceBrowser.h",
            "MCAdvertiserAssistant.h",
            "MultipeerConnectivity.apinotes",
            "MultipeerConnectivity.h",
            "MCSession.h",
            "MCBrowserViewController.h",
            "dbivport.h",
            "dbi_sql.h",
            "dbd_xsh.h",
            "dbixs_rev.h",
            "Driver_xst.h",
            "DBIXS.h",
            "hook_op_check.h",
            "Admin.tbd",
            "AirPlayReceiver.tbd",
            "apfs_boot_mount.tbd",
            "AOSKit.tbd",
            "APConfigurationSystem.tbd",
            "AppleFirmwareUpdate.tbd",
            "launchdaemons.txt",
            "preboot_archive_errors.log",
            "mounts.txt",
            "launchagents.txt",
            "disk_structure.txt",
            "user_launchagents.txt",
            "security_status.txt",
            "kexts.txt",
            "process_list.txt",
            "battery.csv",
            "diskEncryption.csv",
            "chromeExtensions.csv",
            "crashes.csv",
            "interfaceAddrs.csv",
            "kernel.csv",
            "interfaceDetails.csv",
            "etcHosts.csv",
            "applications.csv",
            "mounts.csv",
            "sharedFolders.csv",
            "certificates.csv",
            "sharingPreferences.csv",
            "launchD.csv",
            "usbDevices.csv",
            "managedPolicies.csv",
            "systemInfo.csv",
            "users.csv",
            "sipConfig.csv",
            "systemControls.csv",
            "canonical",
            "aliases",
            "custom_header_checks",
            "access",
            "bounce.cf.default",
            "generic",
            "header_checks",
            "main.cf.default",
            "LICENSE",
            "makedefs.out",
            "main.cf",
            "master.cf.default",
            "main.cf.proto",
            "master.cf.proto",
            "master.cf",
            "TLS_LICENSE",
            "postfix-files",
            "transport",
            "virtual",
            "relocated",
            "afpovertcp.cfg",
            "asl.conf",
            "auto_home",
            "auto_master",
            "autofs.conf",
            "bashrc_Apple_Terminal",
            "com.apple.screensharing.agent.launchd",
            "bashrc",
            "command_args.json",
            "csh.cshrc",
            "csh.login",
            "find.codes",
            "csh.logout",
            "ftpusers",
            "gettytab",
            "irbrc",
            "kern_loader.conf",
            "group",
            "locate.rc",
            "man.conf",
            "mail.rc",
            "manpaths",
            "networks",
            "nfs.conf",
            "newsyslog.conf",
            "ntp_opendirectory.conf",
            "ntp.conf",
            "notify.conf",
            "paths",
            "pf.conf",
            "passwd",
            "profile",
            "pf.os",
            "protocols",
            "rc.netboot",
            "rc.common",
            "rmtab",
            "resolv.conf",
            "rtadvd.conf",
            "rpc",
            "shells",
            "smb.conf",
            "sudo_lecture",
            "ttys",
            "syslog.conf",
            "xtab",
            "sudoers",
            "zprofile",
            "zshrc",
            "zshrc_Apple_Terminal",
            "CodeResources",
            "version.plist",
            "Info.plist"
          ],
          "public": 1,
          "adversary": "DragonForce Malaysia Hacker Group",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lastname",
              "display_name": "Lastname",
              "target": null
            },
            {
              "id": "Firstname",
              "display_name": "Firstname",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1040",
              "name": "Network Sniffing",
              "display_name": "T1040 - Network Sniffing"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1056",
              "name": "Input Capture",
              "display_name": "T1056 - Input Capture"
            },
            {
              "id": "T1090",
              "name": "Proxy",
              "display_name": "T1090 - Proxy"
            },
            {
              "id": "T1547",
              "name": "Boot or Logon Autostart Execution",
              "display_name": "T1547 - Boot or Logon Autostart Execution"
            },
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            },
            {
              "id": "T1574",
              "name": "Hijack Execution Flow",
              "display_name": "T1574 - Hijack Execution Flow"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 66,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "ilyailya",
            "id": "298851",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 4449,
            "domain": 3847,
            "URL": 14263,
            "FileHash-SHA256": 2356,
            "FileHash-MD5": 223,
            "FileHash-SHA1": 523,
            "email": 223,
            "CVE": 40,
            "CIDR": 12,
            "SSLCertFingerprint": 302
          },
          "indicator_count": 26238,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 35,
          "modified_text": "343 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "zshrc",
        "x86_64-apple-ios-macabi.swiftinterface",
        "newsyslog.conf",
        "configuring.html",
        "AOSKit.tbd",
        "com.apple.screensharing.agent.launchd",
        "chromeExtensions.csv",
        "transport",
        "csh.logout",
        "manpaths",
        "AirPlayReceiver.tbd",
        "group",
        "etcHosts.csv",
        "arm64e-apple-ios-macabi.swiftinterface",
        "Admin.tbd",
        "shells",
        "caching.html",
        "launchdaemons.txt",
        "launchD.csv",
        "autofs.conf",
        "interfaceDetails.csv",
        "networks",
        "MultipeerConnectivity.h",
        "bounce.cf.default",
        "aliases",
        "pf.conf",
        "main.cf",
        "makedefs.out",
        "DBIXS.h",
        "ntp_opendirectory.conf",
        "MultipeerConnectivity.tbd",
        "pf.os",
        "master.cf",
        "dbixs_rev.h",
        "MCAdvertiserAssistant.h",
        "ldap.h",
        "profile",
        "disk_structure.txt",
        "TLS_LICENSE",
        "notify.conf",
        "security_status.txt",
        "hook_op_check.h",
        "ftpusers",
        "version.plist",
        "bind.html",
        "zprofile",
        "dbivport.h",
        "custom_header_checks",
        "BUILDING",
        "AppleFirmwareUpdate.tbd",
        "find.codes",
        "irbrc",
        "content-negotiation.html",
        "convenience.map",
        "protocols",
        "smb.conf",
        "zshrc_Apple_Terminal",
        "MCPeerID.h",
        "sudoers",
        "resolv.conf",
        "LocalAuthentication.tbd",
        "rtadvd.conf",
        "launchagents.txt",
        "rpc",
        "afpovertcp.cfg",
        "rmtab",
        "MCNearbyServiceAdvertiser.h",
        "main.cf.proto",
        "main.cf.default",
        "master.cf.proto",
        "users.csv",
        "kexts.txt",
        "MCSession.h",
        "header_checks",
        "dbd_xsh.h",
        "mounts.csv",
        "rc.netboot",
        "syslog.conf",
        "sipConfig.csv",
        "passwd",
        "arm64e-apple-macos.swiftinterface",
        "sharedFolders.csv",
        "certificates.csv",
        "systemControls.csv",
        "ntp.conf",
        "apfs_boot_mount.tbd",
        "relocated",
        "bashrc",
        "interfaceAddrs.csv",
        "user_launchagents.txt",
        "auto_home",
        "sudo_lecture",
        "kernel.csv",
        "sharingPreferences.csv",
        "systemInfo.csv",
        "preboot_archive_errors.log",
        "MultipeerConnectivity.apinotes",
        "x86_64-apple-macos.swiftinterface",
        "asl.conf",
        "mail.rc",
        "LDAP.tbd",
        "xtab",
        "process_list.txt",
        "master.cf.default",
        "MCError.h",
        "Driver_xst.h",
        "CodeResources",
        "diskEncryption.csv",
        "APConfigurationSystem.tbd",
        "kern_loader.conf",
        "nfs.conf",
        "battery.csv",
        "usbDevices.csv",
        "virtual",
        "generic",
        "gettytab",
        "index.html.en",
        "postfix-files",
        "csh.cshrc",
        "managedPolicies.csv",
        "paths",
        "custom-error.html",
        "man.conf",
        "MCBrowserViewController.h",
        "mounts.txt",
        "auto_master",
        "bashrc_Apple_Terminal",
        "crashes.csv",
        "applications.csv",
        "locate.rc",
        "canonical",
        "module.modulemap",
        "rc.common",
        "ttys",
        "LICENSE",
        "command_args.json",
        "csh.login",
        "access",
        "Info.plist",
        "MCNearbyServiceBrowser.h",
        "lber.h",
        "dbi_sql.h"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "DragonForce Malaysia Hacker Group"
          ],
          "malware_families": [
            "Apnic",
            "Lastname",
            "Firstname"
          ],
          "industries": [],
          "unique_indicators": 52376
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/squarecafecleveland.net",
    "whois": "http://whois.domaintools.com/squarecafecleveland.net",
    "domain": "squarecafecleveland.net",
    "hostname": "pay.squarecafecleveland.net"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 10,
  "pulses": [
    {
      "id": "684a93360163e8802e213158",
      "name": "ELF:Mirai AMAZON-02 - Autonomous System  65.0.0.0/14",
      "description": "ELF:Mirai-BHZ\\ [Trj]\t\n65.0.0.0/14\nAutonomous System Number\n16509\nAutonomous System Label\nAMAZON-02\nRelated to \u2022 103.252.236.26 | \n\u2022 sr2.reliedhosting.com | \n.\u2022 http://planitair.com/ |\n\u2022 bgptools-wildcard-confirmed.acemalibu.com | \n\u2022 https://www.anyxxxtube.net/search-porn/tsara-brashears/ | \t\t\t\n\u2022 static.ads-twitter.com\t\n\u2022 https://twitter.com/PORNO_SEXYBABES\t\n\u2022 analytics.twitter.com\n\u2022 appleupdate.org\n\u2022 apps.apple.com\n\u2022 pin.it |\n\u2022 https://pin.it/ |\n\u2022 https://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian  Critical issue. Cyber weaponry [Unclear] Stealth contractual US cyber defense entity, endless DGA\u2019s. India IP block.\nAdversary named by bupyeongop:\n\ubd80\ud3c9\uc624\ud53c \ucd9c\uc7a5\ub9c8\uc0ac\uc9c0\uc548\ub0b4.COM \ubd80\ud3c9OP (massage service?)\n*DoS with many OTX features",
      "modified": "2025-07-12T07:04:05.635000",
      "created": "2025-06-12T08:43:34.719000",
      "tags": [
        "thumbprint",
        "apnic",
        "apnic whois",
        "database",
        "please",
        "arin whois",
        "north america",
        "caribbean",
        "africa",
        "internet",
        "iana",
        "address range",
        "cidr",
        "network name",
        "allocation type",
        "whois server",
        "algorithm",
        "v3 serial",
        "number",
        "cbe oglobalsign",
        "r6 alphassl",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "key identifier",
        "link",
        "search",
        "united",
        "a domains",
        "ip address",
        "creation date",
        "record value",
        "date",
        "showing",
        "india unknown",
        "status",
        "passive dns",
        "ipv4 add",
        "pulse submit",
        "url analysis",
        "urls",
        "files",
        "location india",
        "india asn",
        "as133296 web",
        "dns resolutions"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "APNIC",
          "display_name": "APNIC",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 28,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA1": 27,
        "domain": 2499,
        "hostname": 2651,
        "URL": 10986,
        "CIDR": 2,
        "FileHash-SHA256": 3596,
        "email": 1,
        "FileHash-MD5": 23,
        "CVE": 7
      },
      "indicator_count": 19792,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "281 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68468500f573317422968c7c",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:53:52.404000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68468501eb091ae414509121",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:53:53.417000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68468505ee31db44fe063e82",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:53:57.123000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6846850783baea1a6beb7e71",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. I won\u2019t be surprised if OTX cannot pull the threat. My account isn\u2019t allowing me full permissions. \n\n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:53:59.933000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "68468511340fb7ba8eeb7aae",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:54:09.116000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6846860a0c5ff214f345717c",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:58:17.902000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6846860ee9b4faefae8d4cf9",
      "name": "Crowdsourced research | IP 192.229.221.95",
      "description": "Crowdsourced research. \t\nLegitimately contracted for all forms of surveillance & other unspeakable jobs against  crime victims.\nThis is as dangerous as it gets. The targets are sometimes individuals with absolutely no means of escape, I am speaking for crime victims, investigative journalists, insiders, informants, etc. This is outrageous. The highest level of threat as this is a global operation, primarily in the US with endless resources. No exaggerations. The warfare could , has and has been attempted to result in loss of life. There is quite a bit of information available regarding this merciless, meritless attacks. OTX  isn\u2019t allowing full permissions. \n| 1003.v.vgt.pl |\nhttps://www.pornhub.com/gifs/search?search=tsara+lynn+brashears+lesbian | \nfoundry2-lbl.dvr.dn2.n-helix.com | \n192.229.221.95 | \ndns0.org | cdnfastly.net",
      "modified": "2025-07-09T05:00:24.293000",
      "created": "2025-06-09T06:58:22.091000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 284,
        "FileHash-SHA1": 285,
        "FileHash-SHA256": 3666,
        "domain": 511,
        "hostname": 845,
        "URL": 3282,
        "CVE": 2,
        "email": 1
      },
      "indicator_count": 8876,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 138,
      "modified_text": "284 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "682dd4e25a347684b2dfeabe",
      "name": "Apple Radar? Manipulated iOS products access , manipulate , control technology in periphery",
      "description": "Apple product(s)  using radar? access nearby tech, (Apple products, other brands, televisions, MP3 players). Target reports other devices have been erased, refreshed, truncated,. .https://ssdauthority.com/does-sandisk-ixpand-work-on-windows/ |\nssdauthority.com |\nradarsubmissions.apple.com |\nsecure.www.apple.com\nThis will take further, in depth investigation. I can\u2019t explain what seems fantastical and  be. considered sane. Many files resolved already.",
      "modified": "2025-06-20T12:05:58.229000",
      "created": "2025-05-21T13:28:01.980000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 637,
        "CVE": 1,
        "FileHash-MD5": 26,
        "FileHash-SHA1": 25,
        "FileHash-SHA256": 1296,
        "domain": 170,
        "hostname": 369
      },
      "indicator_count": 2524,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "303 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "67f5555b6ce863d998e83e26",
      "name": "macOS Threat Infrastructure Leveraging Remote Agents via remotewd.com and rtmsprod.net",
      "description": "This pulse identifies an actively observed macOS-focused remote access infrastructure abusing trusted native Apple agents (ARDAgent.app, SSMenuAgent.app) and communicating with a distributed network of C2-like endpoints under domains such as remotewd.com, idsremoteurlconnectionagent.app, and rtmsprod.net.\n\nThe infrastructure is composed of dynamically generated subdomains \u2014 many in the form of device-<UUID>.remotewd.com \u2014 indicative of automated deployment, system tracking, or per-host remote access configurations.\n\nAdditional indicators include HTTP/S URLs pointing directly to embedded binary paths within macOS agents, suggesting possible delivery vectors, staging, or persistence techniques.\n\nThis campaign shows signs of structured, programmatic targeting and is highly likely to be pre-operational infrastructure for wide-scale surveillance or access operations. All listed indicators should be considered high-risk. If observed in your environment, initiate a full forensic and IR process immediately.",
      "modified": "2025-05-11T19:03:59.885000",
      "created": "2025-04-08T16:56:59.641000",
      "tags": [
        "generated from",
        "do not",
        "edit uri",
        "urls",
        "edit",
        "rewriteengine",
        "rewritecond",
        "rewriterule",
        "r301",
        "xml2encalias",
        "beralloct",
        "berbvarrayadd",
        "berbvarrayfree",
        "berbvdup",
        "berbvecadd",
        "berbvecfree",
        "berbvfree",
        "berdump",
        "berdup",
        "berdupbv",
        "laerrordomain",
        "laerrornoncekey",
        "lamechanismtree",
        "lacontext",
        "ladomainstate",
        "laenvironment",
        "lanotification",
        "laprivatekey",
        "lapublickey",
        "laright",
        "apple swift",
        "o librarylevel",
        "combine import",
        "foundation",
        "swift import",
        "mcpeerid",
        "mcsession",
        "property",
        "copyright",
        "protocol",
        "class",
        "bonjour",
        "ascii lowercase",
        "abc company",
        "section",
        "bonjour txt",
        "note",
        "ui element",
        "utf8 encoding",
        "nscopying",
        "nsdictionary",
        "nsstring",
        "mcextern",
        "attribute",
        "mcextern extern",
        "mcexternweak",
        "nsenum",
        "nsinteger",
        "mcerrorcode",
        "mcerrorunknown",
        "mcerrortimedout",
        "peer",
        "example",
        "bonjour apis",
        "stop",
        "tags",
        "session",
        "nsprogress",
        "nserror",
        "nsurl",
        "nsarray",
        "create",
        "nsuinteger",
        "notifies",
        "mcsession api",
        "interface",
        "dbictrace",
        "dbivporth",
        "dbictracelevel",
        "dbdtffoo",
        "dbihseterrchar",
        "dbicstate",
        "dbictraceflags",
        "provides macros",
        "dbi release",
        "only",
        "sqlsuccess",
        "odbc",
        "sqlok",
        "tim bunce",
        "england",
        "sql cli",
        "sql datatype",
        "sqlguid",
        "sqlwlongvarchar",
        "main",
        "beware",
        "sv sth",
        "sv dbh",
        "impsth",
        "impdbh",
        "sv keysv",
        "sv params",
        "sv attr",
        "sv attribs",
        "sv drh",
        "void",
        "fri jul",
        "mixed",
        "dbixsrevision",
        "plsvundef",
        "license",
        "spagain",
        "perlioprintf",
        "dbiclogpio",
        "putback",
        "ireland",
        "gnu general",
        "super",
        "magic",
        "dbicflags",
        "dbis",
        "svrv",
        "null",
        "imp2com",
        "dbicactivekids",
        "dbicfiadestroy",
        "sv h",
        "dbicdbistate",
        "code",
        "copy",
        "refer",
        "trace",
        "error",
        "unknown",
        "hookopcheckh",
        "startexternc",
        "hookopcheckcb",
        "userdata",
        "endexternc",
        "isinternalbuild",
        "kickmcxdforuid",
        "loadappkit",
        "ardconfig",
        "authenticator",
        "dsauthenticator",
        "dsnode",
        "dsrecord",
        "group",
        "hostconfig",
        "apfsvolumelock",
        "apfsvolumerole",
        "aoskgetosinfo",
        "aoskgetuserinfo",
        "aosaddappleid",
        "aosdisablepcs",
        "aosenablepcs",
        "aoslog",
        "aoslogforce",
        "aosrelaycookie",
        "didfailcallback",
        "kaosaccountkey",
        "kapcsbundle",
        "kapcspath",
        "kjsonextension",
        "apcsbucketid",
        "apcsreports",
        "apconfiguration",
        "apversiondata",
        "apversionhelper",
        "systemvolumesvm",
        "name size",
        "identifier",
        "gb disk0s3",
        "devdisk3",
        "apfs container",
        "scheme",
        "physical store",
        "macintosh hd",
        "apfs snapshot",
        "preboot",
        "refs address",
        "size wired",
        "name",
        "version",
        "uuid",
        "linked against",
        "renderer",
        "helper",
        "chrome helper",
        "contains",
        "cloud ui",
        "macintosh",
        "khtml",
        "gecko",
        "ui helper",
        "plugin",
        "service",
        "good",
        "battery power",
        "apfs encryption",
        "jumpcloud go",
        "chrome web",
        "store",
        "privacy badger",
        "flowcrypt",
        "encrypt gmail",
        "simple",
        "google",
        "b2b phone",
        "number",
        "apollo",
        "future",
        "exccrash",
        "sigkill",
        "code signature",
        "invalid",
        "sigabrt",
        "protonvpn",
        "excguard",
        "excbreakpoint",
        "sigtrap",
        "excbadaccess",
        "appl",
        "english",
        "adobe crash",
        "adobe",
        "acrobat dcadobe",
        "processor",
        "uninstaller",
        "assistant",
        "install",
        "cloud",
        "dock",
        "calendar",
        "music",
        "terminal",
        "tips",
        "installer",
        "updater",
        "proton",
        "tools",
        "stub",
        "python",
        "clock",
        "powershell",
        "team",
        "rave scout",
        "cookies",
        "public folder",
        "key cert",
        "sign",
        "crl sign",
        "root ca",
        "authority",
        "public primary",
        "global root",
        "verisign",
        "academic",
        "premium",
        "adaptive",
        "interactive",
        "background",
        "standard",
        "launchd sandbox",
        "s mdworker",
        "agent",
        "command line",
        "progress",
        "yubico",
        "macos13action",
        "disableoverride",
        "disableairdrop",
        "denyactivation",
        "enable",
        "loginwindowtext",
        "jumpcloud",
        "autoupdate",
        "loggingoption",
        "enablefirewall",
        "arm64e",
        "apple m2",
        "mac142",
        "kjqqtw7pqt",
        "daemon",
        "server",
        "open directory",
        "user",
        "account",
        "kerberos admin",
        "kerberos change",
        "device daemon",
        "network",
        "desktop",
        "screensaver",
        "bridge",
        "aesxtsarm",
        "aesecbarm",
        "sha512vngarmhw",
        "sha384vngarmhw",
        "sha256vngarm",
        "sha1vngarm",
        "darwin kernel",
        "wed mar",
        "wkarraycreate",
        "wkbooleancreate",
        "wkcontextcreate",
        "wkdatacreate",
        "wkdatagettypeid",
        "wkdoublecreate",
        "wkframecopyurl",
        "wkgettypeid",
        "wkimagecreate",
        "wkpagecandelete",
        "webview",
        "notice",
        "this software",
        "including",
        "but not",
        "limited to",
        "redistribution",
        "is provided",
        "by apple",
        "direct",
        "damage",
        "apiavailable",
        "webkit",
        "nsswiftname",
        "document",
        "a block",
        "as is",
        "hasinclude",
        "wkdownload",
        "abstract",
        "wkerrorcode",
        "wkerrorunknown",
        "discussion",
        "bool",
        "whether",
        "wkcontentworld",
        "wkwebview",
        "javascript",
        "nsunavailable",
        "vaargs",
        "nsswiftasync",
        "wkswiftasync",
        "wkcookiepolicy",
        "wkswiftuiactor",
        "nshttpcookie",
        "targetosiphone",
        "wknavigation",
        "decides",
        "boolean value",
        "apideprecated",
        "methodkind",
        "wkerrordomain",
        "wkscriptmessage",
        "promise",
        "fulfill",
        "const",
        "url scheme",
        "mark",
        "wkuserscript",
        "targetosvision",
        "param",
        "wkframeinfo",
        "targetosios",
        "pass",
        "window",
        "mime type",
        "link",
        "nsimage",
        "returns",
        "nsset",
        "checks",
        "matches",
        "a boolean",
        "defaults",
        "wkwebextension",
        "cgsize",
        "uiimage",
        "apis",
        "nsdate",
        "wkcontentmode",
        "wkextern",
        "possible",
        "cgfloat",
        "media",
        "cgrect",
        "apiunavailable",
        "framework",
        "nsswiftuiactor",
        "targetoswatch",
        "confirms",
        "apple upgrade",
        "nsstring user",
        "nsobject",
        "provider",
        "apple",
        "password",
        "uicontrol",
        "nscontrol",
        "asuseragerange",
        "check",
        "opaque user",
        "apple id",
        "initiate",
        "asauthorization",
        "operation",
        "state",
        "nserrorenum",
        "nsdata",
        "relying party",
        "asapiavailable",
        "perform",
        "realm",
        "http response",
        "authorization",
        "http",
        "oauth",
        "saml",
        "a byte",
        "nsdata userid",
        "relying",
        "a string",
        "nsdata readdata",
        "bool didwrite",
        "a cose",
        "nsdata first",
        "nsdata second",
        "nsstring name",
        "bool appid",
        "targetosxr",
        "nsstring appid",
        "bluetooth",
        "mdm profile",
        "nsurl url",
        "returns yes",
        "a state",
        "a json",
        "web token",
        "private seckeys",
        "enables",
        "keychain",
        "asswiftsendable",
        "cose algorithm",
        "ecdsa",
        "sha256",
        "cose curve",
        "p256",
        "nullable",
        "bool success",
        "remove",
        "call",
        "complete",
        "initializes",
        "time code",
        "extensions",
        "asextern extern",
        "asextern",
        "nsswiftsendable",
        "prepare",
        "list",
        "nsextension",
        "attempt",
        "nsstring label",
        "creates",
        "nsstring code",
        "a key",
        "webauthn",
        "nssecurecoding",
        "input",
        "output",
        "initialize",
        "nsinteger rank",
        "json",
        "inputs",
        "hash",
        "nsstring origin",
        "settings app",
        "extension",
        "https urls",
        "safari",
        "cancel",
        "nsuuid uuid",
        "r uftpexu",
        "nsmutabledata",
        "vnsdate",
        "mprcjy",
        "postfix",
        "domain",
        "canonical",
        "tables",
        "ldap",
        "post",
        "replace user",
        "address",
        "wietse venema",
        "bugs",
        "mail",
        "aliases",
        "postfix version",
        "restrict",
        "sample",
        "person",
        "basic system",
        "general",
        "reject empty",
        "postfix smtp",
        "ipv6 host",
        "reject",
        "reply",
        "access",
        "prior",
        "hold",
        "info",
        "mail delivery",
        "charset",
        "system",
        "report",
        "postfix dsn",
        "mail returned",
        "this",
        "generic",
        "smtp",
        "isp mail",
        "mime",
        "headerchecks",
        "readme files",
        "filters while",
        "posix",
        "empty",
        "body",
        "write",
        "date",
        "smtp server",
        "specify",
        "mx host",
        "unix password",
        "user unknown",
        "pathbin",
        "postfix queue",
        "unix",
        "cyrus",
        "path",
        "uucp",
        "shell",
        "local",
        "program",
        "agreement",
        "contributor",
        "recipient",
        "contribution",
        "the program",
        "corporation",
        "contributors",
        "product x",
        "as expressly",
        "arch",
        "arch x8664",
        "pipe wall",
        "wimplicit",
        "ranlib",
        "warn",
        "switch",
        "start",
        "systype",
        "outlook",
        "postfix master",
        "begin",
        "server admin",
        "mail backend",
        "modern smtp",
        "iana",
        "many",
        "postfix pipe",
        "recent cyrus",
        "amos gouaux",
        "old example",
        "or even",
        "lutz jaenicke",
        "technology",
        "cottbus",
        "germany",
        "openssl package",
        "openssl project",
        "europe",
        "remember that",
        "use of",
        "file",
        "update",
        "usrsbin",
        "file format",
        "no group",
        "daemondirectory",
        "deliver mail",
        "transport",
        "description",
        "result format",
        "virtual",
        "virtual alias",
        "redirect mail",
        "relocated",
        "matches user",
        "synopsis",
        "lastname",
        "firstname",
        "apple computer",
        "tcpip",
        "supported",
        "quantum",
        "facility",
        "level",
        "level info",
        "broadcast",
        "ignore",
        "rules",
        "sender",
        "automounter map",
        "use directory",
        "get home",
        "home autohome",
        "true",
        "t option",
        "mount",
        "force",
        "environment",
        "automountdenv",
        "promptcommand",
        "shellsessiondir",
        "histfile",
        "histfilesize",
        "myvar",
        "histtimeformat",
        "arrange",
        "bashrematch",
        "tell",
        "ps1h",
        "make bash",
        "s checkwinsize",
        "etcbashrc",
        "termprogram",
        "inpck",
        "nnnbaud",
        "berkeley",
        "parity",
        "pc entry",
        "pass8",
        "parenb istrip",
        "fixed speed",
        "entry",
        "clocal mode",
        "maxhistsize",
        "promptmode",
        "verbose end",
        "etcirbrcloaded",
        "default",
        "setup",
        "history file",
        "kernel",
        "readline",
        "jabber",
        "group database",
        "dovecot",
        "postfix scsd",
        "networkd",
        "searchpaths",
        "freebsd",
        "tmpdir",
        "fcodes",
        "prunepaths",
        "vartmp",
        "prunedirs",
        "filesystems",
        "nroff",
        "manpath",
        "uncomment",
        "manpager",
        "whatispager",
        "manlocale",
        "every",
        "manpath optman",
        "maybe",
        "troff",
        "status mailfrom",
        "returnpath via",
        "pidfile",
        "flags",
        "bcgjnuwz",
        "bin usrsbin",
        "sbin",
        "default pf",
        "care",
        "audio",
        "user database",
        "unix copy",
        "gate daemon",
        "bashno",
        "r etcbashrc",
        "rfc1323",
        "m1460",
        "macos x",
        "signature",
        "linux",
        "opera",
        "xp sp1",
        "windows sp1",
        "nmap syn",
        "m265",
        "synack",
        "mind",
        "macos",
        "warp",
        "ipv6",
        "internet",
        "icmp",
        "cisco",
        "monitoring",
        "argus",
        "chaos",
        "rsvp",
        "encapsulation",
        "aris",
        "isis",
        "netbootmount",
        "netbootshadow",
        "computername",
        "localonly",
        "localnetbootdir",
        "netboot",
        "define",
        "purpose",
        "networkonly",
        "waiting",
        "networkup",
        "term",
        "devnull",
        "common setup",
        "configure",
        "set command",
        "dns hostname",
        "dns query",
        "see also",
        "kame",
        "sunnet manager",
        "rpcsrc",
        "netlicense",
        "ftpd",
        "bindash binksh",
        "binsh bintcsh",
        "jumpcloud ldap",
        "smb2",
        "security",
        "workgroup",
        "standalone",
        "samba server",
        "enforce",
        "smb3",
        "example share",
        "improper use",
        "ctrlc",
        "none",
        "fax reception",
        "hardwired",
        "0007",
        "must",
        "visudo",
        "blocksize",
        "charset lang",
        "language lcall",
        "lines columns",
        "lscolors",
        "sshauthsock",
        "orion",
        "setup user",
        "home",
        "zdotdir",
        "delete",
        "beep",
        "vendor",
        "kf10",
        "kf11",
        "kf12",
        "kf13",
        "backspace",
        "insert",
        "resume",
        "termsessionid",
        "savehist",
        "sharehistory",
        "h do",
        "volume",
        "de l",
        "l uuid",
        "m tra",
        "n est",
        "suuid",
        "prfen",
        "fusion",
        "syst",
        "look",
        "executant",
        "alla",
        "over",
        "test",
        "overie",
        "zapis",
        "rapid",
        "disco usa",
        "de macos",
        "nie s",
        "i denne",
        "adgjmpsvx",
        "diskgthis disk",
        "01k8x j",
        "34disk",
        "levy kytt",
        "dict",
        "array",
        "plist",
        "apple root",
        "code signing",
        "inode64r",
        "xofkoxzh",
        "integer",
        "doctype",
        "brain",
        "abcd",
        "ogwo",
        "boaw",
        "cobwa",
        "uhawavauatsh",
        "ip bitmap",
        "foewdc",
        "could",
        "ip block",
        "funcs",
        "cogwo",
        "trash",
        "double",
        "hunt",
        "affa",
        "carr",
        "crypto",
        "docwbac",
        "q1b0",
        "q1 0",
        "h h5",
        "docwbag",
        "slice",
        "format",
        "zero",
        "alfa",
        "hera",
        "lelei",
        "hehe",
        "hisp",
        "fail",
        "katy",
        "zakk",
        "eodwcbgao",
        "hhk8di",
        "alma",
        "topo",
        "open",
        "huhk",
        "piper",
        "hehx",
        "eh ui",
        "h20hph",
        "hif h",
        "hmhhihqhyla hq",
        "r11b0",
        "target",
        "uus10u",
        "hifh",
        "loghookfailed",
        "loghook",
        "hell",
        "q1b 0",
        "f duh",
        "aqw1",
        "1160"
      ],
      "references": [
        "index.html.en",
        "bind.html",
        "caching.html",
        "BUILDING",
        "configuring.html",
        "content-negotiation.html",
        "custom-error.html",
        "convenience.map",
        "LDAP.tbd",
        "lber.h",
        "ldap.h",
        "LocalAuthentication.tbd",
        "arm64e-apple-macos.swiftinterface",
        "x86_64-apple-ios-macabi.swiftinterface",
        "arm64e-apple-ios-macabi.swiftinterface",
        "x86_64-apple-macos.swiftinterface",
        "MultipeerConnectivity.tbd",
        "module.modulemap",
        "MCNearbyServiceAdvertiser.h",
        "MCPeerID.h",
        "MCError.h",
        "MCNearbyServiceBrowser.h",
        "MCAdvertiserAssistant.h",
        "MultipeerConnectivity.apinotes",
        "MultipeerConnectivity.h",
        "MCSession.h",
        "MCBrowserViewController.h",
        "dbivport.h",
        "dbi_sql.h",
        "dbd_xsh.h",
        "dbixs_rev.h",
        "Driver_xst.h",
        "DBIXS.h",
        "hook_op_check.h",
        "Admin.tbd",
        "AirPlayReceiver.tbd",
        "apfs_boot_mount.tbd",
        "AOSKit.tbd",
        "APConfigurationSystem.tbd",
        "AppleFirmwareUpdate.tbd",
        "launchdaemons.txt",
        "preboot_archive_errors.log",
        "mounts.txt",
        "launchagents.txt",
        "disk_structure.txt",
        "user_launchagents.txt",
        "security_status.txt",
        "kexts.txt",
        "process_list.txt",
        "battery.csv",
        "diskEncryption.csv",
        "chromeExtensions.csv",
        "crashes.csv",
        "interfaceAddrs.csv",
        "kernel.csv",
        "interfaceDetails.csv",
        "etcHosts.csv",
        "applications.csv",
        "mounts.csv",
        "sharedFolders.csv",
        "certificates.csv",
        "sharingPreferences.csv",
        "launchD.csv",
        "usbDevices.csv",
        "managedPolicies.csv",
        "systemInfo.csv",
        "users.csv",
        "sipConfig.csv",
        "systemControls.csv",
        "canonical",
        "aliases",
        "custom_header_checks",
        "access",
        "bounce.cf.default",
        "generic",
        "header_checks",
        "main.cf.default",
        "LICENSE",
        "makedefs.out",
        "main.cf",
        "master.cf.default",
        "main.cf.proto",
        "master.cf.proto",
        "master.cf",
        "TLS_LICENSE",
        "postfix-files",
        "transport",
        "virtual",
        "relocated",
        "afpovertcp.cfg",
        "asl.conf",
        "auto_home",
        "auto_master",
        "autofs.conf",
        "bashrc_Apple_Terminal",
        "com.apple.screensharing.agent.launchd",
        "bashrc",
        "command_args.json",
        "csh.cshrc",
        "csh.login",
        "find.codes",
        "csh.logout",
        "ftpusers",
        "gettytab",
        "irbrc",
        "kern_loader.conf",
        "group",
        "locate.rc",
        "man.conf",
        "mail.rc",
        "manpaths",
        "networks",
        "nfs.conf",
        "newsyslog.conf",
        "ntp_opendirectory.conf",
        "ntp.conf",
        "notify.conf",
        "paths",
        "pf.conf",
        "passwd",
        "profile",
        "pf.os",
        "protocols",
        "rc.netboot",
        "rc.common",
        "rmtab",
        "resolv.conf",
        "rtadvd.conf",
        "rpc",
        "shells",
        "smb.conf",
        "sudo_lecture",
        "ttys",
        "syslog.conf",
        "xtab",
        "sudoers",
        "zprofile",
        "zshrc",
        "zshrc_Apple_Terminal",
        "CodeResources",
        "version.plist",
        "Info.plist"
      ],
      "public": 1,
      "adversary": "DragonForce Malaysia Hacker Group",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lastname",
          "display_name": "Lastname",
          "target": null
        },
        {
          "id": "Firstname",
          "display_name": "Firstname",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1040",
          "name": "Network Sniffing",
          "display_name": "T1040 - Network Sniffing"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1056",
          "name": "Input Capture",
          "display_name": "T1056 - Input Capture"
        },
        {
          "id": "T1090",
          "name": "Proxy",
          "display_name": "T1090 - Proxy"
        },
        {
          "id": "T1547",
          "name": "Boot or Logon Autostart Execution",
          "display_name": "T1547 - Boot or Logon Autostart Execution"
        },
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        },
        {
          "id": "T1574",
          "name": "Hijack Execution Flow",
          "display_name": "T1574 - Hijack Execution Flow"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 66,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "ilyailya",
        "id": "298851",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 4449,
        "domain": 3847,
        "URL": 14263,
        "FileHash-SHA256": 2356,
        "FileHash-MD5": 223,
        "FileHash-SHA1": 523,
        "email": 223,
        "CVE": 40,
        "CIDR": 12,
        "SSLCertFingerprint": 302
      },
      "indicator_count": 26238,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 35,
      "modified_text": "343 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://pay.squarecafecleveland.net",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://pay.squarecafecleveland.net",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776658627.4343011
}