{
  "type": "URL",
  "indicator": "https://static.itiger.com",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://static.itiger.com",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3390856499,
      "indicator": "https://static.itiger.com",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 7,
      "pulses": [
        {
          "id": "654c8f263fa4666e1d6fc809",
          "name": "Fraud Metro T-Mobile | Malware.300983 | C2",
          "description": "Tas.mo previously had a Metro T-Mobile logo. \n(www-temp.metrobyt-mobile.com)\nFraud phone services.\nDGA\nTargets/controls\nsongculture.com\nhttp://www.songculture.com\t\nhttps://songculture.com/kedenc\nhttps://songculture.com/tsara-brashears-music\nhttps://songculture.com/tsara-lynn-brashears\nhttps://www.songculture.com\n\ncommand_and_control IP addresses:\n112.124.193.155   command_and_control\t\t\t\n58.216.109.26    command_and_control\t\t\t\n61.147.112.247    command_and_control\t\n112.124.193.155    command_and_control\t\t\t\n58.216.109.26      command_and_control\t\t\t\t\n61.147.112.247     command_and_control\t\nExploits:\t\t\n115.223.11.149     exploit_source\t\n124.236.96.175    exploit_source\t\t\t\t\n157.185.144.117   exploit_source\t\t\t\n210.245.121.219   exploit_source\t\t\t\n58.220.74.29        exploit_source\t\t\t\t\n59.48.165.148       exploit_source\t\t\t\n119.206.200.181   scanning_host\t\t\t\n119.207.67.23        scanning_host\t\t\t\n157.185.179.222     scanning_host",
          "modified": "2023-12-09T07:02:38.219000",
          "created": "2023-11-09T07:49:58.299000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "threat roundup",
            "communicating",
            "historical ssl",
            "referrer",
            "whois whois",
            "july",
            "august",
            "site",
            "cisco umbrella",
            "alexa top",
            "softcnapp",
            "malicious site",
            "site top",
            "million",
            "safe site",
            "malware site",
            "malware",
            "downldr",
            "presenoker",
            "artemis",
            "team",
            "iframe",
            "malware.300983",
            "gamehack",
            "noname057",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "maltiverse qrat",
            "engineering",
            "team malware",
            "team gen",
            "download",
            "malicious",
            "suppobox",
            "phishing",
            "blacklist http",
            "low risk",
            "domain",
            "malware found",
            "ip address",
            "apache cms",
            "unknown",
            "minimal low",
            "security risk",
            "medium high",
            "critical"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware.300983",
              "display_name": "Malware.300983",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 12,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 250,
            "FileHash-MD5": 335,
            "FileHash-SHA1": 200,
            "FileHash-SHA256": 1079,
            "URL": 3863,
            "hostname": 889,
            "CVE": 2
          },
          "indicator_count": 6618,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654d29cdaf1e1d19c6a1896b",
          "name": "Fraud Metro T-Mobile | Malware.300983 | C2",
          "description": "",
          "modified": "2023-12-09T07:02:38.219000",
          "created": "2023-11-09T18:49:49.105000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "threat roundup",
            "communicating",
            "historical ssl",
            "referrer",
            "whois whois",
            "july",
            "august",
            "site",
            "cisco umbrella",
            "alexa top",
            "softcnapp",
            "malicious site",
            "site top",
            "million",
            "safe site",
            "malware site",
            "malware",
            "downldr",
            "presenoker",
            "artemis",
            "team",
            "iframe",
            "malware.300983",
            "gamehack",
            "noname057",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "maltiverse qrat",
            "engineering",
            "team malware",
            "team gen",
            "download",
            "malicious",
            "suppobox",
            "phishing",
            "blacklist http",
            "low risk",
            "domain",
            "malware found",
            "ip address",
            "apache cms",
            "unknown",
            "minimal low",
            "security risk",
            "medium high",
            "critical"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware.300983",
              "display_name": "Malware.300983",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": "654c8f263fa4666e1d6fc809",
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scoreblue",
            "id": "254100",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 250,
            "FileHash-MD5": 335,
            "FileHash-SHA1": 200,
            "FileHash-SHA256": 1079,
            "URL": 3863,
            "hostname": 889,
            "CVE": 2
          },
          "indicator_count": 6618,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 225,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "654c87f9b3623737e66706dc",
          "name": "CNC | tas.mo",
          "description": "Tas.mo previously had a Metro T-Mobile logo. \n(www-temp.metrobyt-mobile.com)\nFraud phone services. DGA?\nTargeting/controlling \nsongculture.com\nhttp://www.songculture.com\t\nhttps://songculture.com/kedenc\nhttps://songculture.com/tsara-brashears-music\nhttps://songculture.com/tsara-lynn-brashears\nhttps://www.songculture.com\ncommand_and_control IP addresses:\n112.124.193.155   command_and_control\t\t\t\n58.216.109.26    command_and_control\t\t\t\nI61.147.112.247    command_and_control\t\n112.124.193.155    command_and_control\t\t\t\n58.216.109.26      command_and_control\t\t\t\t\n61.147.112.247     command_and_control\t\nExploits:\t\t\n115.223.11.149     exploit_source\t\t\t\n124.236.96.175    exploit_source\t\t\t\t\n157.185.144.117   exploit_source\t\t\t\n210.245.121.219   exploit_source\t\t\t\n58.220.74.29        exploit_source\t\t\t\t\n59.48.165.148       exploit_source\t\t\t\n119.206.200.181   scanning_host\t\t\t\n119.207.67.23        scanning_host\t\t\t\n157.185.179.222     scanning_host",
          "modified": "2023-12-09T05:05:07.918000",
          "created": "2023-11-09T07:19:21.583000",
          "tags": [
            "ssl certificate",
            "whois record",
            "contacted",
            "threat roundup",
            "communicating",
            "historical ssl",
            "referrer",
            "whois whois",
            "july",
            "august",
            "site",
            "cisco umbrella",
            "alexa top",
            "softcnapp",
            "malicious site",
            "site top",
            "million",
            "safe site",
            "malware site",
            "malware",
            "downldr",
            "presenoker",
            "artemis",
            "team",
            "iframe",
            "malware.300983",
            "gamehack",
            "noname057",
            "threat report",
            "ip summary",
            "url summary",
            "summary",
            "sample",
            "samples",
            "detection list",
            "blacklist",
            "united",
            "cyber threat",
            "maltiverse qrat",
            "engineering",
            "team malware",
            "team gen",
            "download",
            "malicious",
            "suppobox",
            "phishing",
            "blacklist http"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Malware.300983",
              "display_name": "Malware.300983",
              "target": null
            },
            {
              "id": "GameHack",
              "display_name": "GameHack",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 249,
            "FileHash-MD5": 335,
            "FileHash-SHA1": 200,
            "FileHash-SHA256": 1079,
            "URL": 3860,
            "hostname": 889,
            "CVE": 2
          },
          "indicator_count": 6614,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "862 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708fb744b759b0ba42d5f6",
          "name": "houston.... I think we have a problem  - i dunno know where hell begins or ends anymore",
          "description": "",
          "modified": "2023-12-06T15:13:59.984000",
          "created": "2023-12-06T15:13:59.984000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 3027,
            "hostname": 1561,
            "URL": 7817,
            "domain": 638,
            "email": 1
          },
          "indicator_count": 13044,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707e5b7df6f60133e8fb50",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2023-12-06T13:59:55.129000",
          "created": "2023-12-06T13:59:55.129000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 3,
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "hostname": 3584,
            "URL": 13548,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "email": 19,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62b70cd2f4eea868db4aed29",
          "name": "houston.... I think we have a problem  - i dunno know where hell begins or ends anymore",
          "description": "should we create a new cc ? maybe RuKrCn",
          "modified": "2022-07-25T00:04:42.145000",
          "created": "2022-06-25T13:25:38.439000",
          "tags": [],
          "references": [
            "https://www.virustotal.com/graph/embed/g197a8ab9e32b4ad287432f2c66b98cd12d25427f4acd4696a93447988db3f5c7"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "dorkingbeauty1",
            "id": "80137",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 7817,
            "FileHash-SHA256": 3027,
            "hostname": 1561,
            "domain": 638,
            "email": 1
          },
          "indicator_count": 13044,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 396,
          "modified_text": "1364 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "620c3b1f8af7ea0dcf2c1218",
          "name": "Jeeng / Powerbox",
          "description": "",
          "modified": "2022-06-12T22:01:23.105000",
          "created": "2022-02-15T23:45:35.234000",
          "tags": [
            "Jeeng",
            "tim pool",
            "timcast"
          ],
          "references": [
            "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America"
          ],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 10,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "scnrscnr",
            "id": "126475",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 9072,
            "domain": 2500,
            "URL": 13548,
            "hostname": 3584,
            "FileHash-MD5": 197,
            "FileHash-SHA1": 162,
            "CVE": 3,
            "CIDR": 20,
            "SSLCertFingerprint": 2,
            "email": 19,
            "BitcoinAddress": 1
          },
          "indicator_count": 29108,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 97,
          "modified_text": "1407 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap",
        "https://www.virustotal.com/graph/embed/g197a8ab9e32b4ad287432f2c66b98cd12d25427f4acd4696a93447988db3f5c7"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Gamehack",
            "Malware.300983"
          ],
          "industries": [],
          "unique_indicators": 49199
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/itiger.com",
    "whois": "http://whois.domaintools.com/itiger.com",
    "domain": "itiger.com",
    "hostname": "static.itiger.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 7,
  "pulses": [
    {
      "id": "654c8f263fa4666e1d6fc809",
      "name": "Fraud Metro T-Mobile | Malware.300983 | C2",
      "description": "Tas.mo previously had a Metro T-Mobile logo. \n(www-temp.metrobyt-mobile.com)\nFraud phone services.\nDGA\nTargets/controls\nsongculture.com\nhttp://www.songculture.com\t\nhttps://songculture.com/kedenc\nhttps://songculture.com/tsara-brashears-music\nhttps://songculture.com/tsara-lynn-brashears\nhttps://www.songculture.com\n\ncommand_and_control IP addresses:\n112.124.193.155   command_and_control\t\t\t\n58.216.109.26    command_and_control\t\t\t\n61.147.112.247    command_and_control\t\n112.124.193.155    command_and_control\t\t\t\n58.216.109.26      command_and_control\t\t\t\t\n61.147.112.247     command_and_control\t\nExploits:\t\t\n115.223.11.149     exploit_source\t\n124.236.96.175    exploit_source\t\t\t\t\n157.185.144.117   exploit_source\t\t\t\n210.245.121.219   exploit_source\t\t\t\n58.220.74.29        exploit_source\t\t\t\t\n59.48.165.148       exploit_source\t\t\t\n119.206.200.181   scanning_host\t\t\t\n119.207.67.23        scanning_host\t\t\t\n157.185.179.222     scanning_host",
      "modified": "2023-12-09T07:02:38.219000",
      "created": "2023-11-09T07:49:58.299000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "threat roundup",
        "communicating",
        "historical ssl",
        "referrer",
        "whois whois",
        "july",
        "august",
        "site",
        "cisco umbrella",
        "alexa top",
        "softcnapp",
        "malicious site",
        "site top",
        "million",
        "safe site",
        "malware site",
        "malware",
        "downldr",
        "presenoker",
        "artemis",
        "team",
        "iframe",
        "malware.300983",
        "gamehack",
        "noname057",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "united",
        "cyber threat",
        "maltiverse qrat",
        "engineering",
        "team malware",
        "team gen",
        "download",
        "malicious",
        "suppobox",
        "phishing",
        "blacklist http",
        "low risk",
        "domain",
        "malware found",
        "ip address",
        "apache cms",
        "unknown",
        "minimal low",
        "security risk",
        "medium high",
        "critical"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware.300983",
          "display_name": "Malware.300983",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 12,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 250,
        "FileHash-MD5": 335,
        "FileHash-SHA1": 200,
        "FileHash-SHA256": 1079,
        "URL": 3863,
        "hostname": 889,
        "CVE": 2
      },
      "indicator_count": 6618,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654d29cdaf1e1d19c6a1896b",
      "name": "Fraud Metro T-Mobile | Malware.300983 | C2",
      "description": "",
      "modified": "2023-12-09T07:02:38.219000",
      "created": "2023-11-09T18:49:49.105000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "threat roundup",
        "communicating",
        "historical ssl",
        "referrer",
        "whois whois",
        "july",
        "august",
        "site",
        "cisco umbrella",
        "alexa top",
        "softcnapp",
        "malicious site",
        "site top",
        "million",
        "safe site",
        "malware site",
        "malware",
        "downldr",
        "presenoker",
        "artemis",
        "team",
        "iframe",
        "malware.300983",
        "gamehack",
        "noname057",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "united",
        "cyber threat",
        "maltiverse qrat",
        "engineering",
        "team malware",
        "team gen",
        "download",
        "malicious",
        "suppobox",
        "phishing",
        "blacklist http",
        "low risk",
        "domain",
        "malware found",
        "ip address",
        "apache cms",
        "unknown",
        "minimal low",
        "security risk",
        "medium high",
        "critical"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware.300983",
          "display_name": "Malware.300983",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": "654c8f263fa4666e1d6fc809",
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scoreblue",
        "id": "254100",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_254100/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 250,
        "FileHash-MD5": 335,
        "FileHash-SHA1": 200,
        "FileHash-SHA256": 1079,
        "URL": 3863,
        "hostname": 889,
        "CVE": 2
      },
      "indicator_count": 6618,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 225,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "654c87f9b3623737e66706dc",
      "name": "CNC | tas.mo",
      "description": "Tas.mo previously had a Metro T-Mobile logo. \n(www-temp.metrobyt-mobile.com)\nFraud phone services. DGA?\nTargeting/controlling \nsongculture.com\nhttp://www.songculture.com\t\nhttps://songculture.com/kedenc\nhttps://songculture.com/tsara-brashears-music\nhttps://songculture.com/tsara-lynn-brashears\nhttps://www.songculture.com\ncommand_and_control IP addresses:\n112.124.193.155   command_and_control\t\t\t\n58.216.109.26    command_and_control\t\t\t\nI61.147.112.247    command_and_control\t\n112.124.193.155    command_and_control\t\t\t\n58.216.109.26      command_and_control\t\t\t\t\n61.147.112.247     command_and_control\t\nExploits:\t\t\n115.223.11.149     exploit_source\t\t\t\n124.236.96.175    exploit_source\t\t\t\t\n157.185.144.117   exploit_source\t\t\t\n210.245.121.219   exploit_source\t\t\t\n58.220.74.29        exploit_source\t\t\t\t\n59.48.165.148       exploit_source\t\t\t\n119.206.200.181   scanning_host\t\t\t\n119.207.67.23        scanning_host\t\t\t\n157.185.179.222     scanning_host",
      "modified": "2023-12-09T05:05:07.918000",
      "created": "2023-11-09T07:19:21.583000",
      "tags": [
        "ssl certificate",
        "whois record",
        "contacted",
        "threat roundup",
        "communicating",
        "historical ssl",
        "referrer",
        "whois whois",
        "july",
        "august",
        "site",
        "cisco umbrella",
        "alexa top",
        "softcnapp",
        "malicious site",
        "site top",
        "million",
        "safe site",
        "malware site",
        "malware",
        "downldr",
        "presenoker",
        "artemis",
        "team",
        "iframe",
        "malware.300983",
        "gamehack",
        "noname057",
        "threat report",
        "ip summary",
        "url summary",
        "summary",
        "sample",
        "samples",
        "detection list",
        "blacklist",
        "united",
        "cyber threat",
        "maltiverse qrat",
        "engineering",
        "team malware",
        "team gen",
        "download",
        "malicious",
        "suppobox",
        "phishing",
        "blacklist http"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Malware.300983",
          "display_name": "Malware.300983",
          "target": null
        },
        {
          "id": "GameHack",
          "display_name": "GameHack",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "OctoSeek",
        "id": "243548",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 249,
        "FileHash-MD5": 335,
        "FileHash-SHA1": 200,
        "FileHash-SHA256": 1079,
        "URL": 3860,
        "hostname": 889,
        "CVE": 2
      },
      "indicator_count": 6614,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 219,
      "modified_text": "862 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708fb744b759b0ba42d5f6",
      "name": "houston.... I think we have a problem  - i dunno know where hell begins or ends anymore",
      "description": "",
      "modified": "2023-12-06T15:13:59.984000",
      "created": "2023-12-06T15:13:59.984000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 3027,
        "hostname": 1561,
        "URL": 7817,
        "domain": 638,
        "email": 1
      },
      "indicator_count": 13044,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707e5b7df6f60133e8fb50",
      "name": "Jeeng / Powerbox",
      "description": "",
      "modified": "2023-12-06T13:59:55.129000",
      "created": "2023-12-06T13:59:55.129000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "CVE": 3,
        "FileHash-SHA256": 9072,
        "domain": 2500,
        "hostname": 3584,
        "URL": 13548,
        "FileHash-MD5": 197,
        "FileHash-SHA1": 162,
        "email": 19,
        "CIDR": 20,
        "SSLCertFingerprint": 2,
        "BitcoinAddress": 1
      },
      "indicator_count": 29108,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "62b70cd2f4eea868db4aed29",
      "name": "houston.... I think we have a problem  - i dunno know where hell begins or ends anymore",
      "description": "should we create a new cc ? maybe RuKrCn",
      "modified": "2022-07-25T00:04:42.145000",
      "created": "2022-06-25T13:25:38.439000",
      "tags": [],
      "references": [
        "https://www.virustotal.com/graph/embed/g197a8ab9e32b4ad287432f2c66b98cd12d25427f4acd4696a93447988db3f5c7"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "dorkingbeauty1",
        "id": "80137",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 7817,
        "FileHash-SHA256": 3027,
        "hostname": 1561,
        "domain": 638,
        "email": 1
      },
      "indicator_count": 13044,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 396,
      "modified_text": "1364 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "620c3b1f8af7ea0dcf2c1218",
      "name": "Jeeng / Powerbox",
      "description": "",
      "modified": "2022-06-12T22:01:23.105000",
      "created": "2022-02-15T23:45:35.234000",
      "tags": [
        "Jeeng",
        "tim pool",
        "timcast"
      ],
      "references": [
        "cf20ed53-cb6d-4dfd-a4e8-794fbe163efc.pcap"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America"
      ],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 10,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "scnrscnr",
        "id": "126475",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_126475/resized/80/avatar_67ca5b7bae.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 9072,
        "domain": 2500,
        "URL": 13548,
        "hostname": 3584,
        "FileHash-MD5": 197,
        "FileHash-SHA1": 162,
        "CVE": 3,
        "CIDR": 20,
        "SSLCertFingerprint": 2,
        "email": 19,
        "BitcoinAddress": 1
      },
      "indicator_count": 29108,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 97,
      "modified_text": "1407 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://static.itiger.com",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://static.itiger.com",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776639151.8385382
}