{
  "type": "URL",
  "indicator": "https://promo.srvzone.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://promo.srvzone.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4075957380,
      "indicator": "https://promo.srvzone.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "684bb4770ea123b0c1a2334f",
          "name": "Screen Capture - American Imaging Centers",
          "description": "",
          "modified": "2025-07-13T04:04:28.476000",
          "created": "2025-06-13T05:17:43.001000",
          "tags": [
            "czech republic",
            "server",
            "date",
            "flag",
            "contacted hosts",
            "ip address",
            "process details",
            "cdn77 datacamp",
            "limited",
            "frankfurt",
            "main",
            "germany",
            "http",
            "april",
            "google safe",
            "browsing",
            "current dns",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "pattern match",
            "mitre att",
            "ck id",
            "show technique",
            "null",
            "span",
            "error",
            "body",
            "june",
            "hybrid",
            "general",
            "local",
            "path",
            "encrypt",
            "click",
            "strings",
            "refresh",
            "tools",
            "learn",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "ck techniques",
            "verified",
            "ecdsa",
            "europeberlin",
            "aes256gcm",
            "linux x8664",
            "date fri",
            "contentlength",
            "connection",
            "general full",
            "url https",
            "protocol h2",
            "security tls",
            "asn60068",
            "ssl certificate",
            "execution att",
            "czechia",
            "passive dns",
            "present oct",
            "ipv4 add",
            "pulse pulses",
            "urls",
            "files",
            "reverse dns",
            "czechia asn",
            "as9080 ipex",
            "html document",
            "ascii text",
            "crlf line",
            "language",
            "iremotepanel",
            "screenshot",
            "screen capture"
          ],
          "references": [
            "MicCerLisCA2011_2011-03-29.crt0nF",
            "master_audio1_128_20250528_b_01636.aac 1688088685.png",
            "IRemotePanel",
            "&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror AMD-FORCED-I2C-81x64-1.2.0.60-drp.zip"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1204",
              "name": "User Execution",
              "display_name": "T1204 - User Execution"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 25,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 55,
            "hostname": 103,
            "URL": 373,
            "FileHash-MD5": 51,
            "FileHash-SHA1": 33,
            "FileHash-SHA256": 79,
            "SSLCertFingerprint": 2,
            "CIDR": 1
          },
          "indicator_count": 697,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "280 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "684b932fcbcc577471a28c8a",
          "name": "Imaging Center Malware, Virus other manipulations",
          "description": "IMO Serious!  Virus, Trojans, potential cams? PHI , PII access. Super concerning potential manipulation , imaging, reports., records, billing\nis manipulated.\nMore research necessary.\nTrue potential for manipulation \nof x-ray , ct scan dosing.\nExcessive Adult content:\ncdn1-thumbs.pornhost.com | \ncdn28.eporncam.com | \t\ncdn35.thotporn.tv | \ncdnst7.pornburst.xxx | \nmcdns.vrporn.com |\nURL\nhttps://c845a1577e.mjedge.net/contents/videos_screenshots/3979000/3979719/preview.jpg&tbnid=rLNgRtn9SIlcgM&vet=10CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH..i&imgrefurl=https:/it.vikiporn.com/videos/3979719/horror-porn-the-dark-side-of-the-woods/&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror porn&ved=0CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH |\nhttps://cdn1-thumbs.pornhost.com/0/2/0235809321/001_150_112.jpg | \n\u2022 Den:Variant.Application.Bundler.Ludus.1\n\u2022 PUABundler:Win32/YandexBundled\n\u2022 Adware.Win32.DownWare.cl\n\u2022 pua:Win32/Catalina\n\u2022W32.AIDetectMalware\n* Why is my OTX account blocked from features",
          "modified": "2025-07-13T02:05:19.612000",
          "created": "2025-06-13T02:55:42.562000",
          "tags": [
            "united",
            "asn16509",
            "amazon02",
            "frankfurt",
            "main",
            "germany",
            "asn60068",
            "cdn77 datacamp",
            "limited",
            "browsing",
            "reverse dns",
            "protocol h2",
            "security tls",
            "general full",
            "url https",
            "resource",
            "hash",
            "software",
            "dalles",
            "june",
            "de indicators",
            "domains",
            "hashes",
            "verified",
            "ecdsa",
            "linux x8664",
            "khtml",
            "gecko",
            "aes256gcm",
            "veryhigh",
            "patch",
            "accept",
            "encrypt",
            "cookie",
            "sticky",
            "aaaa",
            "cname",
            "ttl value",
            "algorithm",
            "key identifier",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne5",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "record type",
            "thumbprint"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 836,
            "hostname": 1001,
            "domain": 193,
            "URL": 3007,
            "FileHash-MD5": 83,
            "FileHash-SHA1": 42,
            "CIDR": 5
          },
          "indicator_count": 5167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "280 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "master_audio1_128_20250528_b_01636.aac 1688088685.png",
        "MicCerLisCA2011_2011-03-29.crt0nF",
        "&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror AMD-FORCED-I2C-81x64-1.2.0.60-drp.zip",
        "IRemotePanel"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 5630
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/srvzone.com",
    "whois": "http://whois.domaintools.com/srvzone.com",
    "domain": "srvzone.com",
    "hostname": "promo.srvzone.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "684bb4770ea123b0c1a2334f",
      "name": "Screen Capture - American Imaging Centers",
      "description": "",
      "modified": "2025-07-13T04:04:28.476000",
      "created": "2025-06-13T05:17:43.001000",
      "tags": [
        "czech republic",
        "server",
        "date",
        "flag",
        "contacted hosts",
        "ip address",
        "process details",
        "cdn77 datacamp",
        "limited",
        "frankfurt",
        "main",
        "germany",
        "http",
        "april",
        "google safe",
        "browsing",
        "current dns",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "pattern match",
        "mitre att",
        "ck id",
        "show technique",
        "null",
        "span",
        "error",
        "body",
        "june",
        "hybrid",
        "general",
        "local",
        "path",
        "encrypt",
        "click",
        "strings",
        "refresh",
        "tools",
        "learn",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "ck techniques",
        "verified",
        "ecdsa",
        "europeberlin",
        "aes256gcm",
        "linux x8664",
        "date fri",
        "contentlength",
        "connection",
        "general full",
        "url https",
        "protocol h2",
        "security tls",
        "asn60068",
        "ssl certificate",
        "execution att",
        "czechia",
        "passive dns",
        "present oct",
        "ipv4 add",
        "pulse pulses",
        "urls",
        "files",
        "reverse dns",
        "czechia asn",
        "as9080 ipex",
        "html document",
        "ascii text",
        "crlf line",
        "language",
        "iremotepanel",
        "screenshot",
        "screen capture"
      ],
      "references": [
        "MicCerLisCA2011_2011-03-29.crt0nF",
        "master_audio1_128_20250528_b_01636.aac 1688088685.png",
        "IRemotePanel",
        "&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror AMD-FORCED-I2C-81x64-1.2.0.60-drp.zip"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1204",
          "name": "User Execution",
          "display_name": "T1204 - User Execution"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 25,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 55,
        "hostname": 103,
        "URL": 373,
        "FileHash-MD5": 51,
        "FileHash-SHA1": 33,
        "FileHash-SHA256": 79,
        "SSLCertFingerprint": 2,
        "CIDR": 1
      },
      "indicator_count": 697,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "280 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "684b932fcbcc577471a28c8a",
      "name": "Imaging Center Malware, Virus other manipulations",
      "description": "IMO Serious!  Virus, Trojans, potential cams? PHI , PII access. Super concerning potential manipulation , imaging, reports., records, billing\nis manipulated.\nMore research necessary.\nTrue potential for manipulation \nof x-ray , ct scan dosing.\nExcessive Adult content:\ncdn1-thumbs.pornhost.com | \ncdn28.eporncam.com | \t\ncdn35.thotporn.tv | \ncdnst7.pornburst.xxx | \nmcdns.vrporn.com |\nURL\nhttps://c845a1577e.mjedge.net/contents/videos_screenshots/3979000/3979719/preview.jpg&tbnid=rLNgRtn9SIlcgM&vet=10CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH..i&imgrefurl=https:/it.vikiporn.com/videos/3979719/horror-porn-the-dark-side-of-the-woods/&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror porn&ved=0CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH |\nhttps://cdn1-thumbs.pornhost.com/0/2/0235809321/001_150_112.jpg | \n\u2022 Den:Variant.Application.Bundler.Ludus.1\n\u2022 PUABundler:Win32/YandexBundled\n\u2022 Adware.Win32.DownWare.cl\n\u2022 pua:Win32/Catalina\n\u2022W32.AIDetectMalware\n* Why is my OTX account blocked from features",
      "modified": "2025-07-13T02:05:19.612000",
      "created": "2025-06-13T02:55:42.562000",
      "tags": [
        "united",
        "asn16509",
        "amazon02",
        "frankfurt",
        "main",
        "germany",
        "asn60068",
        "cdn77 datacamp",
        "limited",
        "browsing",
        "reverse dns",
        "protocol h2",
        "security tls",
        "general full",
        "url https",
        "resource",
        "hash",
        "software",
        "dalles",
        "june",
        "de indicators",
        "domains",
        "hashes",
        "verified",
        "ecdsa",
        "linux x8664",
        "khtml",
        "gecko",
        "aes256gcm",
        "veryhigh",
        "patch",
        "accept",
        "encrypt",
        "cookie",
        "sticky",
        "aaaa",
        "cname",
        "ttl value",
        "algorithm",
        "key identifier",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cne5",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "record type",
        "thumbprint"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 836,
        "hostname": 1001,
        "domain": 193,
        "URL": 3007,
        "FileHash-MD5": 83,
        "FileHash-SHA1": 42,
        "CIDR": 5
      },
      "indicator_count": 5167,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "280 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://promo.srvzone.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://promo.srvzone.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776634514.2076216
}