{
  "type": "URL",
  "indicator": "https://qa2nsw71.auth.civicalg.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://qa2nsw71.auth.civicalg.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3526880681,
      "indicator": "https://qa2nsw71.auth.civicalg.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 50,
      "pulses": [
        {
          "id": "655076c123a5ab86eb0c8a34",
          "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
          "description": "",
          "modified": "2023-12-12T06:03:08.751000",
          "created": "2023-11-12T06:54:57.966000",
          "tags": [
            "unknown",
            "as8075",
            "united",
            "nxdomain",
            "a nxdomain",
            "asnone country",
            "search",
            "domain",
            "creation date",
            "scan endpoints",
            "date",
            "new zealand",
            "ns nxdomain",
            "aaaa nxdomain",
            "asnone united",
            "cname",
            "asnone",
            "soa nxdomain",
            "australia",
            "status hostname",
            "domains show",
            "domain related",
            "entrie",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "whois whois",
            "referrer",
            "communicating",
            "siblings",
            "moth callback",
            "threat roundup",
            "june",
            "record type",
            "ttl value",
            "server",
            "privacy billing",
            "redacted for",
            "privacy admin",
            "postal code",
            "email",
            "admin email",
            "stateprovince",
            "city",
            "code",
            "pty ltd",
            "registrar abuse",
            "wholesale pty",
            "tpp wholesale",
            "registrar url",
            "execution",
            "contacted",
            "malware",
            "IPv4 13.75.251.189 scanning_host",
            "scanning_host",
            "phishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 23,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3487,
            "domain": 1111,
            "email": 7,
            "hostname": 1368,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 102,
            "FileHash-SHA256": 663
          },
          "indicator_count": 6840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "859 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "655076c8f26b8ab3f641f4ae",
          "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
          "description": "",
          "modified": "2023-12-12T06:03:08.751000",
          "created": "2023-11-12T06:55:04.517000",
          "tags": [
            "unknown",
            "as8075",
            "united",
            "nxdomain",
            "a nxdomain",
            "asnone country",
            "search",
            "domain",
            "creation date",
            "scan endpoints",
            "date",
            "new zealand",
            "ns nxdomain",
            "aaaa nxdomain",
            "asnone united",
            "cname",
            "asnone",
            "soa nxdomain",
            "australia",
            "status hostname",
            "domains show",
            "domain related",
            "entrie",
            "ssl certificate",
            "whois record",
            "historical ssl",
            "resolutions",
            "whois whois",
            "referrer",
            "communicating",
            "siblings",
            "moth callback",
            "threat roundup",
            "june",
            "record type",
            "ttl value",
            "server",
            "privacy billing",
            "redacted for",
            "privacy admin",
            "postal code",
            "email",
            "admin email",
            "stateprovince",
            "city",
            "code",
            "pty ltd",
            "registrar abuse",
            "wholesale pty",
            "tpp wholesale",
            "registrar url",
            "execution",
            "contacted",
            "malware",
            "IPv4 13.75.251.189 scanning_host",
            "scanning_host",
            "phishing"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [
            {
              "id": "Malware",
              "display_name": "Malware",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 22,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 3487,
            "domain": 1111,
            "email": 7,
            "hostname": 1368,
            "FileHash-MD5": 102,
            "FileHash-SHA1": 102,
            "FileHash-SHA256": 663
          },
          "indicator_count": 6840,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "859 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654fb2b6a75db688b4f4c20b",
          "name": "CVE-2017-8977",
          "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
          "modified": "2023-12-11T16:02:20.224000",
          "created": "2023-11-11T16:58:30.849000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "domain",
            "unknown",
            "whois whois",
            "june",
            "whois record",
            "communicating",
            "threat roundup",
            "referrer",
            "ssl certificate",
            "roundup",
            "january",
            "february",
            "team",
            "back",
            "redacted for",
            "whois lookup",
            "privacy",
            "privacy create",
            "domain name",
            "expiry date",
            "name server",
            "name",
            "query time"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "hostname": 272,
            "FileHash-MD5": 88,
            "FileHash-SHA1": 86,
            "FileHash-SHA256": 357,
            "CVE": 2,
            "URL": 466
          },
          "indicator_count": 1553,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "860 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654fb2b84e8c4e6666ee499a",
          "name": "CVE-2017-8977",
          "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
          "modified": "2023-12-11T16:02:20.224000",
          "created": "2023-11-11T16:58:32.830000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "domain",
            "unknown",
            "whois whois",
            "june",
            "whois record",
            "communicating",
            "threat roundup",
            "referrer",
            "ssl certificate",
            "roundup",
            "january",
            "february",
            "team",
            "back",
            "redacted for",
            "whois lookup",
            "privacy",
            "privacy create",
            "domain name",
            "expiry date",
            "name server",
            "name",
            "query time"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "hostname": 272,
            "FileHash-MD5": 88,
            "FileHash-SHA1": 86,
            "FileHash-SHA256": 357,
            "CVE": 2,
            "URL": 466
          },
          "indicator_count": 1553,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "860 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654fb318927c6690fc3016f8",
          "name": "monitoring.akhavan.pro | CVE-2017-8977",
          "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
          "modified": "2023-12-11T16:02:20.224000",
          "created": "2023-11-11T17:00:08.940000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "domain",
            "unknown",
            "whois whois",
            "june",
            "whois record",
            "communicating",
            "threat roundup",
            "referrer",
            "ssl certificate",
            "roundup",
            "january",
            "february",
            "team",
            "back",
            "redacted for",
            "whois lookup",
            "privacy",
            "privacy create",
            "domain name",
            "expiry date",
            "name server",
            "name",
            "query time"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "hostname": 272,
            "FileHash-MD5": 88,
            "FileHash-SHA1": 86,
            "FileHash-SHA256": 357,
            "CVE": 2,
            "URL": 466
          },
          "indicator_count": 1553,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "860 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654fb31ae5ae3e9996272c47",
          "name": "monitoring.akhavan.pro | CVE-2017-8977",
          "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
          "modified": "2023-12-11T16:02:20.224000",
          "created": "2023-11-11T17:00:10.219000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "domain",
            "unknown",
            "whois whois",
            "june",
            "whois record",
            "communicating",
            "threat roundup",
            "referrer",
            "ssl certificate",
            "roundup",
            "january",
            "february",
            "team",
            "back",
            "redacted for",
            "whois lookup",
            "privacy",
            "privacy create",
            "domain name",
            "expiry date",
            "name server",
            "name",
            "query time"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 20,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "hostname": 272,
            "FileHash-MD5": 88,
            "FileHash-SHA1": 86,
            "FileHash-SHA256": 357,
            "CVE": 2,
            "URL": 466
          },
          "indicator_count": 1553,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "860 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654fb31b2aabb38078045b84",
          "name": "monitoring.akhavan.pro | CVE-2017-8977",
          "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
          "modified": "2023-12-11T16:02:20.224000",
          "created": "2023-11-11T17:00:11.044000",
          "tags": [
            "scan endpoints",
            "all search",
            "otx octoseek",
            "pulse submit",
            "url analysis",
            "passive dns",
            "urls",
            "files",
            "domain",
            "unknown",
            "whois whois",
            "june",
            "whois record",
            "communicating",
            "threat roundup",
            "referrer",
            "ssl certificate",
            "roundup",
            "january",
            "february",
            "team",
            "back",
            "redacted for",
            "whois lookup",
            "privacy",
            "privacy create",
            "domain name",
            "expiry date",
            "name server",
            "name",
            "query time"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 282,
            "hostname": 272,
            "FileHash-MD5": 88,
            "FileHash-SHA1": 86,
            "FileHash-SHA256": 357,
            "CVE": 2,
            "URL": 466
          },
          "indicator_count": 1553,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "860 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a958f96f9b29641ea020",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:03:20.219000",
          "created": "2023-12-06T17:03:20.219000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a927b24b94cdd5d344d1",
          "name": "Fitbit app link IoC's",
          "description": "",
          "modified": "2023-12-06T17:02:31.854000",
          "created": "2023-12-06T17:02:31.854000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 17,
            "FileHash-SHA256": 3730,
            "hostname": 1052,
            "domain": 446,
            "URL": 2806,
            "FileHash-MD5": 173,
            "FileHash-SHA1": 168,
            "email": 1
          },
          "indicator_count": 8393,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a921559dd331e2b31e4c",
          "name": "Brontok",
          "description": "",
          "modified": "2023-12-06T17:02:25.638000",
          "created": "2023-12-06T17:02:25.638000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 21,
            "hostname": 432,
            "domain": 161,
            "FileHash-SHA256": 714,
            "URL": 750,
            "FileHash-MD5": 1400,
            "FileHash-SHA1": 706,
            "Mutex": 1,
            "FilePath": 1,
            "URI": 1
          },
          "indicator_count": 4187,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a91b1702fdce6c496a1e",
          "name": "note.html                                                                    [Pulse by OctoSeek]",
          "description": "",
          "modified": "2023-12-06T17:02:19.096000",
          "created": "2023-12-06T17:02:19.096000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a8d167202b93ee502ff8",
          "name": "Apple iTunes| Malicious site | Anonyization | Siphoning | Trojan Downloader",
          "description": "",
          "modified": "2023-12-06T17:01:05.291000",
          "created": "2023-12-06T17:01:05.291000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 12,
            "URL": 3839,
            "hostname": 1331,
            "FileHash-SHA256": 2976,
            "domain": 757,
            "FileHash-MD5": 250,
            "FileHash-SHA1": 80
          },
          "indicator_count": 9245,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a8bf416a1c314819ea53",
          "name": "Remote Access Related |  APK attack targets independent artists",
          "description": "",
          "modified": "2023-12-06T17:00:47.888000",
          "created": "2023-12-06T17:00:47.888000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 5,
            "FileHash-SHA256": 2385,
            "hostname": 1054,
            "domain": 713,
            "URL": 3595,
            "FileHash-MD5": 1104,
            "FileHash-SHA1": 585,
            "FilePath": 1
          },
          "indicator_count": 9442,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a79534c615a8f10f3380",
          "name": "Qakbot | Info Stealer | Sourced:  Part-RU",
          "description": "",
          "modified": "2023-12-06T16:55:49.669000",
          "created": "2023-12-06T16:55:49.669000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2383,
            "hostname": 1027,
            "domain": 418,
            "URL": 2673,
            "FileHash-MD5": 99,
            "FileHash-SHA1": 98
          },
          "indicator_count": 6698,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a69b0f11713d9e4d0153",
          "name": "note.html",
          "description": "",
          "modified": "2023-12-06T16:51:39.617000",
          "created": "2023-12-06T16:51:39.617000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a647bca43f24b4a05a97",
          "name": "note.html",
          "description": "",
          "modified": "2023-12-06T16:50:15.239000",
          "created": "2023-12-06T16:50:15.239000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 909,
            "CVE": 2,
            "FileHash-SHA256": 1422,
            "domain": 481,
            "URL": 2694,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 29
          },
          "indicator_count": 5568,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a59d46cd05b8ffc71d84",
          "name": "Racoon Stealer \u2022 Cobalt Strike",
          "description": "",
          "modified": "2023-12-06T16:47:25.409000",
          "created": "2023-12-06T16:47:25.409000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 509,
            "FileHash-MD5": 377,
            "FileHash-SHA1": 205,
            "FileHash-SHA256": 357,
            "URL": 1762,
            "domain": 595
          },
          "indicator_count": 3805,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a598f3d4e8c2cffd4f73",
          "name": "SMS SPY  \u2022 Remote Access",
          "description": "",
          "modified": "2023-12-06T16:47:19.410000",
          "created": "2023-12-06T16:47:19.410000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1043,
            "hostname": 684,
            "domain": 639,
            "FileHash-MD5": 382,
            "FileHash-SHA1": 212,
            "URL": 2215
          },
          "indicator_count": 5175,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a58fadce1f44dcda2a1b",
          "name": "Malware Site",
          "description": "",
          "modified": "2023-12-06T16:47:11.663000",
          "created": "2023-12-06T16:47:11.663000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "hostname": 348,
            "URL": 724,
            "domain": 38,
            "FileHash-SHA256": 181,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 7
          },
          "indicator_count": 1310,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a567a62bb520508659a4",
          "name": "HoneyPot",
          "description": "",
          "modified": "2023-12-06T16:46:31.096000",
          "created": "2023-12-06T16:46:31.096000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1753,
            "hostname": 1193,
            "URL": 4223,
            "domain": 591,
            "FileHash-SHA1": 81,
            "FileHash-MD5": 81
          },
          "indicator_count": 7922,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a56285d6eb74c2b87a48",
          "name": "RacoonStealer",
          "description": "",
          "modified": "2023-12-06T16:46:26.043000",
          "created": "2023-12-06T16:46:26.043000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 20,
            "FileHash-SHA1": 18,
            "FileHash-SHA256": 708,
            "hostname": 396,
            "URL": 1264,
            "domain": 197
          },
          "indicator_count": 2603,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a55c9ecc3c75c949f951",
          "name": "Command and Control: PublicDomainRegistry.com",
          "description": "",
          "modified": "2023-12-06T16:46:20.192000",
          "created": "2023-12-06T16:46:20.192000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 20,
            "FileHash-SHA1": 18,
            "FileHash-SHA256": 708,
            "hostname": 396,
            "URL": 1264,
            "domain": 197
          },
          "indicator_count": 2603,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4bc7487548e66d6f004",
          "name": "Virus:DOS/Goma",
          "description": "",
          "modified": "2023-12-06T16:43:40.375000",
          "created": "2023-12-06T16:43:40.375000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4b4259cafcf79907b2f",
          "name": "APPLE ALERT: nr-data.net - Private Apple and iOS Data Collection and Distribution",
          "description": "",
          "modified": "2023-12-06T16:43:32.408000",
          "created": "2023-12-06T16:43:32.408000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4ac54885a7e866cedca",
          "name": "Elevated Exposure",
          "description": "",
          "modified": "2023-12-06T16:43:24.027000",
          "created": "2023-12-06T16:43:24.027000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4a3ac21d7733c8e1040",
          "name": "Malvertising",
          "description": "",
          "modified": "2023-12-06T16:43:15.632000",
          "created": "2023-12-06T16:43:15.632000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a49b0b6595444a3fdd9a",
          "name": "passkey.tracker.net",
          "description": "",
          "modified": "2023-12-06T16:43:07.031000",
          "created": "2023-12-06T16:43:07.031000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a49207f81d6791c30194",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "",
          "modified": "2023-12-06T16:42:58.146000",
          "created": "2023-12-06T16:42:58.146000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4876f8d1d174f717e7b",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "",
          "modified": "2023-12-06T16:42:47.591000",
          "created": "2023-12-06T16:42:47.591000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a47e33876ed78e19e1da",
          "name": "Cyber Espionage w/B(.) Link / Infringement (Tracking)",
          "description": "",
          "modified": "2023-12-06T16:42:38.479000",
          "created": "2023-12-06T16:42:38.479000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 1,
            "FileHash-SHA256": 2931,
            "hostname": 1798,
            "FileHash-MD5": 23,
            "FileHash-SHA1": 17,
            "URL": 5593,
            "domain": 1095
          },
          "indicator_count": 11458,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a458c9934c2c2387556a",
          "name": "",
          "description": "",
          "modified": "2023-12-06T16:42:00.798000",
          "created": "2023-12-06T16:42:00.798000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a45205d13649df0844ba",
          "name": "iOS Hacktool Actively exploited",
          "description": "",
          "modified": "2023-12-06T16:41:54.157000",
          "created": "2023-12-06T16:41:54.157000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a44bb1c37c78fb86e09d",
          "name": "Undefined Name",
          "description": "",
          "modified": "2023-12-06T16:41:47.803000",
          "created": "2023-12-06T16:41:47.803000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a441d4e3eae9a6de91dd",
          "name": "Apple iOS - COBALT STRIKE",
          "description": "",
          "modified": "2023-12-06T16:41:37.067000",
          "created": "2023-12-06T16:41:37.067000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 112,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a43affc51769be1188f9",
          "name": "Apple exploit targets private citizen. Actively exploited.",
          "description": "",
          "modified": "2023-12-06T16:41:30.939000",
          "created": "2023-12-06T16:41:30.939000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a434c72e0d41666e0b43",
          "name": "Targetes iOS Apple Exploit \u2022 Where is Citizens Lab? Apple? This has roots.",
          "description": "",
          "modified": "2023-12-06T16:41:24.547000",
          "created": "2023-12-06T16:41:24.547000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a42c670fdf66b4af46df",
          "name": "Crimson Apple",
          "description": "",
          "modified": "2023-12-06T16:41:16.304000",
          "created": "2023-12-06T16:41:16.304000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4250011524abcdf1be0",
          "name": "Apple Tracking \u2022 Remote Access",
          "description": "",
          "modified": "2023-12-06T16:41:09.398000",
          "created": "2023-12-06T16:41:09.398000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a41e852f6b1b04648d44",
          "name": "Apple iOS Remote Access",
          "description": "",
          "modified": "2023-12-06T16:41:02.718000",
          "created": "2023-12-06T16:41:02.718000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a4161da64500aa609121",
          "name": "Major Apple Exploit",
          "description": "",
          "modified": "2023-12-06T16:40:54.425000",
          "created": "2023-12-06T16:40:54.425000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a40e62ca90307d3ed7a3",
          "name": "Major Apple Exploit",
          "description": "",
          "modified": "2023-12-06T16:40:46.173000",
          "created": "2023-12-06T16:40:46.173000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 2468,
            "CVE": 2,
            "domain": 1247,
            "hostname": 1215,
            "FileHash-MD5": 31,
            "FileHash-SHA1": 36,
            "URL": 5265,
            "email": 6
          },
          "indicator_count": 10270,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "864 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657092f1a0501f9d3a40f090",
          "name": "Whenweallvote.org - and the hacks it connects to.",
          "description": "",
          "modified": "2023-12-06T15:27:45.787000",
          "created": "2023-12-06T15:27:45.787000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 2,
            "FileHash-SHA256": 316,
            "hostname": 519,
            "URL": 2232,
            "domain": 333
          },
          "indicator_count": 3402,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657091a4533a832480459e15",
          "name": "dos.myflorida.com:elections",
          "description": "",
          "modified": "2023-12-06T15:22:12.430000",
          "created": "2023-12-06T15:22:12.430000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 809,
            "hostname": 160,
            "domain": 105,
            "URL": 434,
            "CIDR": 1,
            "FileHash-MD5": 9,
            "FileHash-SHA1": 1
          },
          "indicator_count": 1519,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570919b6b36a151ea6d7cbe",
          "name": "Hillary.ua",
          "description": "",
          "modified": "2023-12-06T15:22:03.664000",
          "created": "2023-12-06T15:22:03.664000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 470,
            "FileHash-SHA256": 1292,
            "domain": 207,
            "URL": 1298,
            "CIDR": 19,
            "FileHash-MD5": 195,
            "FileHash-SHA1": 1
          },
          "indicator_count": 3482,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709192c17b2699806057e0",
          "name": "DonaldJTrump.com and all of its subdomains - ewe",
          "description": "",
          "modified": "2023-12-06T15:21:54.268000",
          "created": "2023-12-06T15:21:54.268000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 209,
            "hostname": 663,
            "URL": 1847,
            "domain": 207,
            "CVE": 1,
            "email": 1,
            "FileHash-MD5": 3,
            "FileHash-SHA1": 6
          },
          "indicator_count": 2937,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570918ad73d46901ccddc5d",
          "name": "www.donaldjtrump.com 2022",
          "description": "",
          "modified": "2023-12-06T15:21:46.477000",
          "created": "2023-12-06T15:21:46.477000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 561,
            "FileHash-SHA256": 1509,
            "domain": 220,
            "URL": 1586,
            "CIDR": 18,
            "FileHash-MD5": 35,
            "FileHash-SHA1": 2
          },
          "indicator_count": 3931,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65709186b4721854f288709d",
          "name": "DCDemocraticparty.org",
          "description": "",
          "modified": "2023-12-06T15:21:42.506000",
          "created": "2023-12-06T15:21:42.506000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 1403,
            "URL": 992,
            "hostname": 382,
            "domain": 221,
            "CIDR": 9,
            "FileHash-MD5": 87,
            "FileHash-SHA1": 15
          },
          "indicator_count": 3109,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "657090f1cc164d76aeb361ce",
          "name": "www.iceland.co.uk - Oh dear looks like dom takeover",
          "description": "",
          "modified": "2023-12-06T15:19:13.349000",
          "created": "2023-12-06T15:19:13.349000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 285,
            "FileHash-SHA256": 934,
            "domain": 89,
            "URL": 716,
            "FileHash-MD5": 41,
            "email": 1
          },
          "indicator_count": 2066,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65463631b46319b3aa1d071f",
          "name": "Qausar RAT - aig.com |",
          "description": "Compilation of research identifilocates aig.com Defense Division of Workers Compensation. \nMalicious & invasive tactics remain. Target seem to have been removed from, revenge porn campaign targeted name no longer auto populates, registrant seems poised for campaign.\nTactics include phishing, tracking, geotracking, device location, monitoring, side loading apps and remote access. \n\nQausar Rat identified:\nAlso known by the names CinaRAT or Yggdrasil, Quasar RAT is a C#-based remote administration tool capable of gathering system information, a list of running applications, files, keystrokes, screenshots, and executing arbitrary shell commands.",
          "modified": "2023-12-04T11:01:36.202000",
          "created": "2023-11-04T12:16:49.600000",
          "tags": [
            "general full",
            "url https",
            "reverse dns",
            "security tls",
            "protocol h2",
            "name value",
            "resource",
            "united",
            "asn16509",
            "amazon02",
            "main",
            "facebook",
            "http",
            "request chain",
            "november",
            "de page",
            "url history",
            "javascript",
            "meta",
            "page url",
            "redirected",
            "http redirect",
            "value",
            "mime type",
            "variables",
            "contexthub",
            "visitor object",
            "cq function",
            "sanitize object",
            "elqq",
            "domainpath name",
            "link",
            "property",
            "workers",
            "compensation",
            "login myaig",
            "liability",
            "contact",
            "a claim",
            "commercial auto",
            "login aig",
            "form",
            "cyber",
            "find",
            "team",
            "defense",
            "crime",
            "ransom",
            "energy",
            "cargo",
            "life",
            "media",
            "enterprise",
            "american international",
            "frankfurt",
            "germany",
            "october",
            "domains",
            "asn20940",
            "cisco",
            "umbrella rank",
            "domain",
            "de summary",
            "ssl certificate",
            "whois record",
            "whois whois",
            "malware",
            "network mooooda",
            "and china",
            "filter https",
            "dsp1",
            "keepaliveyes",
            "p11642963562",
            "quasar",
            "metro",
            "android",
            "djvu",
            "win32 exe",
            "win32 dll",
            "ms excel",
            "dao360",
            "spreadsheet",
            "files",
            "detections type",
            "name",
            "phishing",
            "tulach exploits",
            "falcon sandbox",
            "pattern match",
            "file",
            "script",
            "indicator",
            "et tor",
            "known tor",
            "relayrouter",
            "exit",
            "node traffic",
            "misc attack",
            "date",
            "unknown",
            "body",
            "error",
            "span",
            "class",
            "generator",
            "critical",
            "refresh",
            "open",
            "hybrid",
            "general",
            "local",
            "click",
            "strings",
            "tools",
            "look",
            "verify",
            "restart",
            "suricata"
          ],
          "references": [
            "aig.com",
            "https://urlscan.io",
            "https://www.slatergordon.com.au/blog/revenge-porn-laws",
            "https://thehackernews.com/2023/10/quasar-rat-leverages-dll-side-loading.html?m=1",
            "https://hybrid-analysis.com/sample/6f4fb33ffb44474e86928549ef3f1a51d0f3e9e8c8d7a08b71b2b59b5921d311",
            "remoteaccess.aig.com",
            "https://remote.goeaston.net",
            "window.location.search",
            "location.search",
            "https://s3.rexdl.com/android/game/Desktop-Dungeons-v11-Mod-www.Rexdl.com.apk",
            "ghb-unoadsrv-com.geodns.me.1.1.11cec3ef.roksit.net",
            "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
            "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/"
          ],
          "public": 1,
          "adversary": "American International",
          "targeted_countries": [
            "United States of America",
            "Canada"
          ],
          "malware_families": [
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Ransomware",
              "display_name": "Ransomware",
              "target": null
            },
            {
              "id": "American International",
              "display_name": "American International",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1497",
              "name": "Virtualization/Sandbox Evasion",
              "display_name": "T1497 - Virtualization/Sandbox Evasion"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            }
          ],
          "industries": [
            "Reinsurance",
            "Travel"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 21,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA1": 117,
            "FileHash-SHA256": 1962,
            "domain": 575,
            "hostname": 1623,
            "FileHash-MD5": 123,
            "URL": 3670,
            "CVE": 2
          },
          "indicator_count": 8072,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "867 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654136b5eb9bdd21070ff9d7",
          "name": "Cyber Espionage",
          "description": "Cyber warfare. Extravagant attack that includes, phishing, monitoring, spyware, tracking, remote vehicle tracking, API calls after identification of anything computerized; car, phone, mobile phone, mail, ups, television. Apple private data services nr-data.net. This may be a Honeypot. Interesting. Attacker alleging to be a  government contractor actively attacks and porn smears alleged SA victim assaulted by someone with his last name. Coincidence or Honeypot?\nTarget still at risk.\nTarget again is Tsara Brashears. \nSevere privacy invasion.\nShhhh....Active Silencing",
          "modified": "2023-11-30T07:01:37.424000",
          "created": "2023-10-31T17:17:41.263000",
          "tags": [
            "contacted",
            "resolutions",
            "origin1",
            "ip address",
            "list",
            "communicating",
            "cyber threat",
            "united",
            "phishing",
            "phishing site",
            "covid19",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "detection list",
            "installcore",
            "nymaim",
            "suppobox",
            "malicious",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "malware",
            "malware site",
            "malicious site",
            "heur",
            "exploit",
            "alexa",
            "riskware",
            "team",
            "blacklist https",
            "blacklist",
            "facebook",
            "engineering",
            "iframe",
            "downloader",
            "unsafe",
            "artemis",
            "trojanx",
            "agent",
            "unruy",
            "win64",
            "fakealert",
            "fusioncore",
            "redirector",
            "killav",
            "trojan",
            "lokibot",
            "emotet",
            "redline stealer",
            "cobalt strike",
            "citadel",
            "vawtrak",
            "qakbot",
            "qbot",
            "bankerx",
            "dropper",
            "nimda",
            "formbook",
            "swrort",
            "adwind",
            "crack",
            "generic",
            "wacatac",
            "opencandy",
            "nircmd",
            "downldr",
            "filetour",
            "cleaner",
            "conduit",
            "tiggre",
            "presenoker",
            "zpevdo",
            "webcompanion",
            "seraph",
            "tofsee",
            "xrat",
            "xtrat",
            "patcher",
            "adload",
            "stealer",
            "vidar",
            "raccoon",
            "bank",
            "urls",
            "generic malware",
            "noname057",
            "reimer",
            "agency",
            "charles",
            "http response",
            "final url",
            "serving ip",
            "address",
            "status code",
            "body length",
            "kb body",
            "name verdict",
            "date",
            "root ca",
            "markmonitor",
            "name server",
            "windir",
            "unknown",
            "swisscom root",
            "post root",
            "trust",
            "hybrid",
            "general",
            "click",
            "strings",
            "class",
            "generator",
            "critical",
            "error",
            "defence",
            "fraud",
            "logistics",
            "ipv4",
            "scan endpoints",
            "all search",
            "otx octoseek",
            "report spam",
            "author",
            "cyber warfare",
            "created",
            "months ago",
            "modified",
            "next",
            "url https",
            "url http",
            "all octoseek",
            "month ago",
            "utmsourcemailer",
            "ck id",
            "t1140",
            "filehashsha256",
            "tsara brashears",
            "adult content",
            "pornography",
            "malvertizing",
            "privacy invasion",
            "privilege escalation",
            "packed",
            "aig.com",
            "aig.rastreator.mx",
            "apple",
            "ios",
            "tracking",
            "monitoring",
            "nr-data.net",
            "asp.net"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1068",
              "name": "Exploitation for Privilege Escalation",
              "display_name": "T1068 - Exploitation for Privilege Escalation"
            },
            {
              "id": "TA0004",
              "name": "Privilege Escalation",
              "display_name": "TA0004 - Privilege Escalation"
            }
          ],
          "industries": [
            "Defense",
            "Government"
          ],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 70,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 166,
            "FileHash-SHA1": 125,
            "FileHash-SHA256": 5806,
            "URL": 16475,
            "domain": 3302,
            "hostname": 5135,
            "CVE": 16,
            "email": 8
          },
          "indicator_count": 31033,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 223,
          "modified_text": "871 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://s3.rexdl.com/android/game/Desktop-Dungeons-v11-Mod-www.Rexdl.com.apk",
        "http://m.pornsexer.xxx.3.1.adiosfil.roksit.net/",
        "https://urlscan.io",
        "window.location.search",
        "https://thehackernews.com/2023/10/quasar-rat-leverages-dll-side-loading.html?m=1",
        "ghb-unoadsrv-com.geodns.me.1.1.11cec3ef.roksit.net",
        "https://www.slatergordon.com.au/blog/revenge-porn-laws",
        "m.pornsexer.xxx.3.1.adiosfil.roksit.net",
        "https://hybrid-analysis.com/sample/6f4fb33ffb44474e86928549ef3f1a51d0f3e9e8c8d7a08b71b2b59b5921d311",
        "location.search",
        "remoteaccess.aig.com",
        "https://remote.goeaston.net",
        "aig.com"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [
            "American International"
          ],
          "malware_families": [
            "Quasar rat",
            "Ransomware",
            "Malware",
            "American international"
          ],
          "industries": [
            "Travel",
            "Government",
            "Defense",
            "Reinsurance"
          ],
          "unique_indicators": 129304
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/civicalg.com",
    "whois": "http://whois.domaintools.com/civicalg.com",
    "domain": "civicalg.com",
    "hostname": "qa2nsw71.auth.civicalg.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 50,
  "pulses": [
    {
      "id": "655076c123a5ab86eb0c8a34",
      "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
      "description": "",
      "modified": "2023-12-12T06:03:08.751000",
      "created": "2023-11-12T06:54:57.966000",
      "tags": [
        "unknown",
        "as8075",
        "united",
        "nxdomain",
        "a nxdomain",
        "asnone country",
        "search",
        "domain",
        "creation date",
        "scan endpoints",
        "date",
        "new zealand",
        "ns nxdomain",
        "aaaa nxdomain",
        "asnone united",
        "cname",
        "asnone",
        "soa nxdomain",
        "australia",
        "status hostname",
        "domains show",
        "domain related",
        "entrie",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "whois whois",
        "referrer",
        "communicating",
        "siblings",
        "moth callback",
        "threat roundup",
        "june",
        "record type",
        "ttl value",
        "server",
        "privacy billing",
        "redacted for",
        "privacy admin",
        "postal code",
        "email",
        "admin email",
        "stateprovince",
        "city",
        "code",
        "pty ltd",
        "registrar abuse",
        "wholesale pty",
        "tpp wholesale",
        "registrar url",
        "execution",
        "contacted",
        "malware",
        "IPv4 13.75.251.189 scanning_host",
        "scanning_host",
        "phishing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 23,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3487,
        "domain": 1111,
        "email": 7,
        "hostname": 1368,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 102,
        "FileHash-SHA256": 663
      },
      "indicator_count": 6840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "859 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "655076c8f26b8ab3f641f4ae",
      "name": "Luna Moth/Silent Ransom Group Callback Phishing Extortion Campaign",
      "description": "",
      "modified": "2023-12-12T06:03:08.751000",
      "created": "2023-11-12T06:55:04.517000",
      "tags": [
        "unknown",
        "as8075",
        "united",
        "nxdomain",
        "a nxdomain",
        "asnone country",
        "search",
        "domain",
        "creation date",
        "scan endpoints",
        "date",
        "new zealand",
        "ns nxdomain",
        "aaaa nxdomain",
        "asnone united",
        "cname",
        "asnone",
        "soa nxdomain",
        "australia",
        "status hostname",
        "domains show",
        "domain related",
        "entrie",
        "ssl certificate",
        "whois record",
        "historical ssl",
        "resolutions",
        "whois whois",
        "referrer",
        "communicating",
        "siblings",
        "moth callback",
        "threat roundup",
        "june",
        "record type",
        "ttl value",
        "server",
        "privacy billing",
        "redacted for",
        "privacy admin",
        "postal code",
        "email",
        "admin email",
        "stateprovince",
        "city",
        "code",
        "pty ltd",
        "registrar abuse",
        "wholesale pty",
        "tpp wholesale",
        "registrar url",
        "execution",
        "contacted",
        "malware",
        "IPv4 13.75.251.189 scanning_host",
        "scanning_host",
        "phishing"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [
        {
          "id": "Malware",
          "display_name": "Malware",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 22,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 3487,
        "domain": 1111,
        "email": 7,
        "hostname": 1368,
        "FileHash-MD5": 102,
        "FileHash-SHA1": 102,
        "FileHash-SHA256": 663
      },
      "indicator_count": 6840,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "859 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654fb2b6a75db688b4f4c20b",
      "name": "CVE-2017-8977",
      "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
      "modified": "2023-12-11T16:02:20.224000",
      "created": "2023-11-11T16:58:30.849000",
      "tags": [
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "domain",
        "unknown",
        "whois whois",
        "june",
        "whois record",
        "communicating",
        "threat roundup",
        "referrer",
        "ssl certificate",
        "roundup",
        "january",
        "february",
        "team",
        "back",
        "redacted for",
        "whois lookup",
        "privacy",
        "privacy create",
        "domain name",
        "expiry date",
        "name server",
        "name",
        "query time"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "hostname": 272,
        "FileHash-MD5": 88,
        "FileHash-SHA1": 86,
        "FileHash-SHA256": 357,
        "CVE": 2,
        "URL": 466
      },
      "indicator_count": 1553,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "860 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654fb2b84e8c4e6666ee499a",
      "name": "CVE-2017-8977",
      "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
      "modified": "2023-12-11T16:02:20.224000",
      "created": "2023-11-11T16:58:32.830000",
      "tags": [
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "domain",
        "unknown",
        "whois whois",
        "june",
        "whois record",
        "communicating",
        "threat roundup",
        "referrer",
        "ssl certificate",
        "roundup",
        "january",
        "february",
        "team",
        "back",
        "redacted for",
        "whois lookup",
        "privacy",
        "privacy create",
        "domain name",
        "expiry date",
        "name server",
        "name",
        "query time"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "hostname": 272,
        "FileHash-MD5": 88,
        "FileHash-SHA1": 86,
        "FileHash-SHA256": 357,
        "CVE": 2,
        "URL": 466
      },
      "indicator_count": 1553,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "860 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654fb318927c6690fc3016f8",
      "name": "monitoring.akhavan.pro | CVE-2017-8977",
      "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
      "modified": "2023-12-11T16:02:20.224000",
      "created": "2023-11-11T17:00:08.940000",
      "tags": [
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "domain",
        "unknown",
        "whois whois",
        "june",
        "whois record",
        "communicating",
        "threat roundup",
        "referrer",
        "ssl certificate",
        "roundup",
        "january",
        "february",
        "team",
        "back",
        "redacted for",
        "whois lookup",
        "privacy",
        "privacy create",
        "domain name",
        "expiry date",
        "name server",
        "name",
        "query time"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "hostname": 272,
        "FileHash-MD5": 88,
        "FileHash-SHA1": 86,
        "FileHash-SHA256": 357,
        "CVE": 2,
        "URL": 466
      },
      "indicator_count": 1553,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "860 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654fb31ae5ae3e9996272c47",
      "name": "monitoring.akhavan.pro | CVE-2017-8977",
      "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
      "modified": "2023-12-11T16:02:20.224000",
      "created": "2023-11-11T17:00:10.219000",
      "tags": [
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "domain",
        "unknown",
        "whois whois",
        "june",
        "whois record",
        "communicating",
        "threat roundup",
        "referrer",
        "ssl certificate",
        "roundup",
        "january",
        "february",
        "team",
        "back",
        "redacted for",
        "whois lookup",
        "privacy",
        "privacy create",
        "domain name",
        "expiry date",
        "name server",
        "name",
        "query time"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 20,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "hostname": 272,
        "FileHash-MD5": 88,
        "FileHash-SHA1": 86,
        "FileHash-SHA256": 357,
        "CVE": 2,
        "URL": 466
      },
      "indicator_count": 1553,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 218,
      "modified_text": "860 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654fb31b2aabb38078045b84",
      "name": "monitoring.akhavan.pro | CVE-2017-8977",
      "description": "IPv4 159.89.124.132             (scanning_host)\t\t\tDomain akhavan.pro\nHostname monitoring.akhavan.pro\nCVE-2017-8977        CVE-2023-4966",
      "modified": "2023-12-11T16:02:20.224000",
      "created": "2023-11-11T17:00:11.044000",
      "tags": [
        "scan endpoints",
        "all search",
        "otx octoseek",
        "pulse submit",
        "url analysis",
        "passive dns",
        "urls",
        "files",
        "domain",
        "unknown",
        "whois whois",
        "june",
        "whois record",
        "communicating",
        "threat roundup",
        "referrer",
        "ssl certificate",
        "roundup",
        "january",
        "february",
        "team",
        "back",
        "redacted for",
        "whois lookup",
        "privacy",
        "privacy create",
        "domain name",
        "expiry date",
        "name server",
        "name",
        "query time"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 19,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 282,
        "hostname": 272,
        "FileHash-MD5": 88,
        "FileHash-SHA1": 86,
        "FileHash-SHA256": 357,
        "CVE": 2,
        "URL": 466
      },
      "indicator_count": 1553,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "860 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a958f96f9b29641ea020",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:03:20.219000",
      "created": "2023-12-06T17:03:20.219000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a927b24b94cdd5d344d1",
      "name": "Fitbit app link IoC's",
      "description": "",
      "modified": "2023-12-06T17:02:31.854000",
      "created": "2023-12-06T17:02:31.854000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 17,
        "FileHash-SHA256": 3730,
        "hostname": 1052,
        "domain": 446,
        "URL": 2806,
        "FileHash-MD5": 173,
        "FileHash-SHA1": 168,
        "email": 1
      },
      "indicator_count": 8393,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6570a921559dd331e2b31e4c",
      "name": "Brontok",
      "description": "",
      "modified": "2023-12-06T17:02:25.638000",
      "created": "2023-12-06T17:02:25.638000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 21,
        "hostname": 432,
        "domain": 161,
        "FileHash-SHA256": 714,
        "URL": 750,
        "FileHash-MD5": 1400,
        "FileHash-SHA1": 706,
        "Mutex": 1,
        "FilePath": 1,
        "URI": 1
      },
      "indicator_count": 4187,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 111,
      "modified_text": "864 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://qa2nsw71.auth.civicalg.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://qa2nsw71.auth.civicalg.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776616156.165779
}