{
  "type": "URL",
  "indicator": "https://this.props.top",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://this.props.top",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 3162387362,
      "indicator": "https://this.props.top",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 11,
      "pulses": [
        {
          "id": "67a7f06a5d0f22ad92684646",
          "name": "WebForm.com.gov.pl/CEIDG/ScriptResource.axd",
          "description": "The following is the full text of the WebForm.com.gov.pl/CEIDG/ScriptResource.axd, following the following:.au, for the first time.",
          "modified": "2025-05-14T21:27:17.040000",
          "created": "2025-02-09T00:01:46.054000",
          "tags": [
            "null",
            "nie mona",
            "array",
            "input",
            "nonmsdombrowser",
            "object",
            "html",
            "component",
            "body",
            "horizontal",
            "date",
            "calendar",
            "february",
            "april",
            "june",
            "august",
            "iframe",
            "form",
            "friday",
            "explorer",
            "target",
            "error",
            "legend",
            "this",
            "type",
            "regexp",
            "elem",
            "index",
            "function",
            "handle",
            "check",
            "safari",
            "expando",
            "android",
            "false",
            "hooks",
            "copy",
            "prop",
            "class",
            "mark",
            "window",
            "code",
            "capture",
            "accept",
            "seed",
            "override",
            "hook",
            "look",
            "loop",
            "install",
            "pass",
            "enough",
            "bind",
            "core",
            "local",
            "verify",
            "done",
            "find",
            "internal",
            "inject",
            "possible",
            "hold",
            "middle",
            "guard",
            "fall",
            "stop",
            "panic",
            "back",
            "restrict",
            "speed",
            "turn",
            "grab",
            "getclass",
            "jquery",
            "bubble",
            "anchor",
            "shift"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1134",
              "name": "Access Token Manipulation",
              "display_name": "T1134 - Access Token Manipulation"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 13,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1143,
            "domain": 155,
            "hostname": 523,
            "FileHash-SHA256": 151
          },
          "indicator_count": 1972,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 122,
          "modified_text": "339 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "66246ff49ed29ea9bb2bf122",
          "name": "S\u0105d Rejonowy w Jeleniej Gorze  POLAND",
          "description": "Przechowywania lub dost\u0119pu do plik\u00f3w cookies w Twojej przegl\u0105darce\nhttps://www.virustotal.com/gui/domain/jelenia-gora.sr.gov.pl/relations",
          "modified": "2025-05-14T21:18:36.989000",
          "created": "2024-04-21T01:46:28.554000",
          "tags": [
            "jeleniej grze",
            "aktualnoci",
            "informacje",
            "jednostka",
            "rejonowy",
            "konkurs",
            "najczciej",
            "sd rejonowy",
            "przejd",
            "czytaj",
            "click",
            "sdzia jarosaw",
            "wydziau",
            "sdzia grzegorz",
            "katarzyna",
            "rudnicka dane",
            "kontaktowe sd",
            "jelenia gra",
            "mickiewicza",
            "zawarto",
            "html",
            "nazwa meta",
            "robotw",
            "telefon",
            "brak",
            "skala",
            "ua zgodna",
            "head body",
            "zasb",
            "cname",
            "kod odpowiedzi",
            "kodowanie treci",
            "wygasa",
            "gmt serwer",
            "pragma",
            "kontrola pamici",
            "podrcznej",
            "data",
            "gmt kontrola",
            "dostpuzezwl na",
            "czytaj wicej",
            "sd okrgowy",
            "jednostki",
            "okrgowy",
            "ogoszenia",
            "sha256",
            "vhash",
            "ssdeep",
            "https odcisk",
            "palca jarma",
            "https dane",
            "v3 numer",
            "odcisk palca",
            "tworzy katalog",
            "tworzy pliki",
            "typ pliku",
            "json",
            "ascii",
            "windows",
            "sqlite",
            "foxpro fpt",
            "links typ",
            "mapa",
            "152 x",
            "sqlite w",
            "sha1",
            "sha512",
            "file size",
            "b file",
            "testing",
            "komornik sdowy",
            "sdzie rejonowym",
            "tomasz rodacki",
            "obwieszczenie",
            "komornicze",
            "tumacza migam",
            "tumacz czynny",
            "zamknite",
            "wiadczenia",
            "schedule",
            "error",
            "javascript",
            "bakers hall",
            "ixaction",
            "script",
            "ixchatlauncher",
            "compatibility",
            "com dla",
            "t1055 pewno",
            "unikanie obrony",
            "t1036 maskarada",
            "t1082 pewno",
            "informacje o",
            "nazwa pliku",
            "dokument pdf",
            "rozmiar pliku",
            "zapowied",
            "type",
            "iii dbt",
            "utf8",
            "dziennik"
          ],
          "references": [
            "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
            "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
            "http://www.jelenia-gora.so.gov.pl/",
            "https://www.jelenia-gora.so.gov.pl/",
            "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
            "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
            "https://www.jelenia-gora.sr.gov.pl/spacer",
            "https://waf.intelix.pl/957476/Chat/Script/Compatibility"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "",
              "display_name": "",
              "target": null
            },
            {
              "id": "serwer",
              "display_name": "serwer",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1082",
              "name": "System Information Discovery",
              "display_name": "T1082 - System Information Discovery"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 24,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "email": 71,
            "domain": 7651,
            "hostname": 7680,
            "IPv4": 331,
            "FileHash-SHA256": 16168,
            "URL": 10399,
            "FileHash-MD5": 3639,
            "FileHash-SHA1": 3468,
            "CIDR": 4,
            "CVE": 89,
            "YARA": 521,
            "SSLCertFingerprint": 25,
            "JA3": 1,
            "IPv6": 5813
          },
          "indicator_count": 55860,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 141,
          "modified_text": "339 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "663d2869e0f3a42bbddc42ff",
          "name": "UPX executable packer.",
          "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
          "modified": "2024-10-14T00:01:17.069000",
          "created": "2024-05-09T19:47:53.786000",
          "tags": [
            "cioch adrian",
            "centrum usug",
            "sieciowych",
            "elf binary",
            "upx compression",
            "roth",
            "nextron",
            "info",
            "javascript",
            "html",
            "office open",
            "xml document",
            "network capture",
            "win32 exe",
            "xml pakietu",
            "pdf zestawy",
            "przechwytywanie",
            "office",
            "filehashsha1",
            "url https",
            "cve cve20201070",
            "cve cve20203153",
            "cve cve20201048",
            "cve cve20211732",
            "cve20201048 apr",
            "filehashmd5",
            "cve cve20010901",
            "cve cve20021841",
            "cve20153202 apr",
            "cve cve20160728",
            "cve cve20161807",
            "cve cve20175123",
            "cve20185407 apr",
            "cve cve20054605",
            "cve cve20060745",
            "cve cve20070452",
            "cve cve20070453",
            "cve cve20070454",
            "cve cve20071355",
            "cve cve20071358",
            "cve cve20071871",
            "cve20149614 apr",
            "cve cve20151503",
            "cve cve20152080",
            "cve cve20157377",
            "cve cve20170131",
            "cve20200796 may",
            "cve cve20113403"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 6861,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Arek-BTC",
            "id": "212764",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 5771,
            "domain": 3139,
            "URL": 14525,
            "FileHash-SHA1": 2610,
            "IPv4": 108,
            "CIDR": 40,
            "FileHash-SHA256": 10705,
            "FileHash-MD5": 3373,
            "YARA": 2,
            "CVE": 148,
            "Mutex": 7,
            "FilePath": 3,
            "SSLCertFingerprint": 3,
            "email": 23,
            "JA3": 1,
            "IPv6": 2
          },
          "indicator_count": 40460,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "552 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708cdd2f63f24552fa3e39",
          "name": "BLNWX.COM",
          "description": "",
          "modified": "2023-12-06T15:01:49.772000",
          "created": "2023-12-06T15:01:49.772000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 400,
            "URL": 1905,
            "domain": 494,
            "hostname": 707
          },
          "indicator_count": 3506,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65708c534aadf7adf4f27d77",
          "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
          "description": "",
          "modified": "2023-12-06T14:59:31.122000",
          "created": "2023-12-06T14:59:31.122000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 302,
            "domain": 634,
            "URL": 2988,
            "hostname": 1208
          },
          "indicator_count": 5132,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "65707f8475d8a8785dfc5a2f",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2023-12-06T14:04:52.250000",
          "created": "2023-12-06T14:04:52.250000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 2,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "hostname": 833,
            "domain": 441,
            "URL": 2375,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 109,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62750795ebc8c475f4a3033a",
          "name": "aquanx.com (PegTech botnet hosting)",
          "description": "var b[f, g.g, is a new addition to the list of characters that can be added to a singleElement, as well as a set of numbers, if they are new.",
          "modified": "2022-06-05T00:03:45.266000",
          "created": "2022-05-06T11:33:41.174000",
          "tags": [
            "function",
            "eu cookie",
            "version",
            "tamas schalk",
            "element",
            "lang",
            "datadelay",
            "dataexpire",
            "dataclass",
            "name",
            "date",
            "path",
            "null",
            "cookie",
            "regexp",
            "typeof e",
            "please",
            "typeof t",
            "pseudo",
            "child",
            "array",
            "error",
            "class",
            "void",
            "this",
            "extendedvps",
            "login register",
            "product group",
            "svssdlinux",
            "svssdwindows",
            "password",
            "client area",
            "aquanx english",
            "azerbaijani",
            "catal",
            "colocation\uff0ccustomized service\uff0cone-stop service\uff0caffordable cloud ",
            "aquanx",
            "metal cloud",
            "chat",
            "ddos migration",
            "network",
            "colocation",
            "cloud",
            "colocation bare",
            "cloud hosting",
            "private cloud",
            "bare",
            "service",
            "custom build",
            "https",
            "bootstrap",
            "bootstrap hover",
            "dropdown",
            "author",
            "cameron spear",
            "mattia larentis",
            "dropdown plugin",
            "http",
            "plugin",
            "copyright",
            "twitter",
            "conflict",
            "focus",
            "object",
            "click",
            "open",
            "next",
            "target",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "false",
            "type",
            "expando",
            "typeof selector",
            "sizzle",
            "elem",
            "match",
            "data",
            "seed",
            "vd",
            "number",
            "string",
            "ienew ca",
            "closure library",
            "quota",
            "aafunction",
            "dafunction"
          ],
          "references": [
            "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
            "https://aquanx.com/js/jquery-1.12.4.min.js",
            "https://aquanx.com/js/bootstrap.js",
            "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
            "https://aquanx.com/js/modernizr-custom.js",
            "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
            "https://aquanx.com/",
            "https://user.aquanx.com/clientarea.php",
            "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
            "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
            "xfe-URL-raksmart.com-stix2-2.1-export.json"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1106",
              "name": "Native API",
              "display_name": "T1106 - Native API"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 9,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 560,
            "URL": 1236,
            "domain": 184,
            "FileHash-SHA256": 79
          },
          "indicator_count": 2059,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1414 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "6271740be1d2d55007677274",
          "name": "Fiberhub.com and versaweb.com",
          "description": "The following is the full text of the code used to create Twitter's new web-based \"bootstrap\" - a guide to what to do if you want to use it in your browser.",
          "modified": "2022-06-02T00:03:59.540000",
          "created": "2022-05-03T18:27:23.636000",
          "tags": [
            "html5 shiv",
            "jdalton",
            "jonneal",
            "mitgpl2",
            "typeof c",
            "typeof module",
            "null",
            "plugin",
            "function",
            "copyright",
            "twitter",
            "bootstrap",
            "http",
            "conflict",
            "focus",
            "object",
            "error",
            "click",
            "open",
            "next",
            "target",
            "trigger",
            "config",
            "checkbox",
            "delta",
            "false",
            "scroll",
            "vd",
            "number",
            "string",
            "ienew ca",
            "date",
            "closure library",
            "quota",
            "aafunction",
            "dafunction",
            "fbcd",
            "328373057580084",
            "prop",
            "init",
            "autoconfig",
            "protocol",
            "adnxsdomain",
            "aoldomain",
            "adrolltpc",
            "regexp",
            "typeof b",
            "pseudo",
            "child",
            "array",
            "width",
            "sufeffxa0",
            "class",
            "accept",
            "please",
            "chat",
            "search",
            "language",
            "feel",
            "file",
            "call",
            "strongstart",
            "address",
            "again"
          ],
          "references": [
            "xfe-IP-76.164.203.68-stix2-2.1-export.json",
            "http://www.versaweb.com/js/bootstrap.js",
            "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
            "http://www.versaweb.com/css/1024.css",
            "https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js",
            "https://d.adroll.com/pixel/LZLVHVDGLRC6BEJRRIQDVW/HBKRUDDSQJCU7GD5KH3RWC?adroll_fpc=fd1d5ad32fd771b6d89af530ec6ca1cf-1651601137287&arrfrr=http%3A%2F%2Fwww.versaweb.com%2F&pv=14491019928.1296&cookie=&adroll_s_ref=&keyw=",
            "https://d.adroll.com/consent/check/LZLVHVDGLRC6BEJRRIQDVW?arrfrr=http%3A%2F%2Fwww.versaweb.com%2F&_s=1b87c8c5132a03372125d888e43b0a86&_b=2",
            "https://s.adroll.com/j/exp/LZLVHVDGLRC6BEJRRIQDVW/index.js",
            "xfe-URL-versaweb.com-stix2-2.1-export.json",
            "xfe-URL-fiberhub.com-stix2-2.1-export.json",
            "https://www.googletagmanager.com/gtag/js?id=UA-33008870-1",
            "https://www.fiberhub.com/js/bootstrap.js",
            "https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Vd",
              "display_name": "Vd",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 11,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 590,
            "URL": 1312,
            "domain": 376,
            "FileHash-SHA256": 203
          },
          "indicator_count": 2481,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1417 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "626acbf5b18bf4679059431e",
          "name": "BLNWX.COM",
          "description": "Users of the Internet Archive are being asked to login to the service to access the archive's archive, or PURL, and to view the Archive's collection of archived material.  \u00c2\u00a31.",
          "modified": "2022-05-28T00:03:46.141000",
          "created": "2022-04-28T17:16:37.507000",
          "tags": [
            "error",
            "modulenotfound",
            "knew promise",
            "parseint",
            "date",
            "fsettimeout",
            "typeof module",
            "null",
            "plugin",
            "function",
            "copyright",
            "twitter",
            "bootstrap",
            "http",
            "conflict",
            "focus",
            "object",
            "click",
            "open",
            "next",
            "target",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "false",
            "regexp",
            "pseudo",
            "child",
            "sufeffxa0",
            "class",
            "attr",
            "foundation",
            "close",
            "user login",
            "cancel",
            "close user",
            "complete",
            "come",
            "sign",
            "cancel toggle",
            "purl",
            "administration"
          ],
          "references": [
            "xfe-IP-193.149.176.62-stix2-2.1-export.json",
            "xfe-URL-Purl.com-stix2-2.1-export.json",
            "xfe-URL-Easydns.com-stix2-2.1-export.json",
            "xfe-URL-creativecommons.org-stix2-2.1-export.json",
            "https://purl.archive.org/",
            "https://purl.archive.org/static/jquery/jquery.js",
            "https://purl.archive.org/static/bootstrap/js/bootstrap.js",
            "https://purl.archive.org/static/app.js",
            "xfe-URL-modernizr.com-stix2-2.1-export.json",
            "https://modernizr.com/js/build.js"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 7,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 1905,
            "hostname": 707,
            "domain": 494,
            "FileHash-SHA256": 400
          },
          "indicator_count": 3506,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 69,
          "modified_text": "1422 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "62616627ee302d24b23523c3",
          "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
          "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
          "modified": "2022-05-21T00:03:44.725000",
          "created": "2022-04-21T14:11:51.629000",
          "tags": [
            "tbody",
            "span",
            "thead",
            "tfoot",
            "multiple",
            "type",
            "href",
            "input",
            "halflings",
            "gradienttype1",
            "twitter",
            "false",
            "fontface",
            "fatface",
            "woff2",
            "u0259",
            "u1e001eff",
            "u2020",
            "u20a020ab",
            "u20ad20cf",
            "u2113",
            "u2c602c7f",
            "typesubmit",
            "function",
            "typeof c",
            "formdata",
            "this",
            "typeof define",
            "null",
            "typeof f",
            "object",
            "boolean",
            "typeof module",
            "error",
            "reflect",
            "math",
            "regexp",
            "number",
            "array",
            "typeerror",
            "string",
            "symbol",
            "typeof e",
            "typeof t",
            "class",
            "attr",
            "pseudo",
            "child",
            "js foundation",
            "account",
            "open",
            "navitem",
            "text",
            "mainnav",
            "click",
            "blank",
            "copyright",
            "u0027",
            "value",
            "body",
            "firefox",
            "enum",
            "html",
            "msie",
            "applewebkit",
            "traceconsole",
            "form",
            "iframe",
            "legend",
            "nonmsdombrowser",
            "callbackindex",
            "callbackframeid",
            "eventtarget",
            "eventargument",
            "validation",
            "explorer",
            "target",
            "plugin",
            "bootstrap",
            "https",
            "conflict",
            "focus",
            "next",
            "trigger",
            "checkbox",
            "delta",
            "scroll",
            "sourceid",
            "date",
            "sessiontoken",
            "sessionexpires",
            "void",
            "rangeerror",
            "utf16",
            "illegal input",
            "global",
            "chrome",
            "opredge",
            "opera",
            "safari",
            "version",
            "sxa0",
            "browser",
            "typeof require",
            "dom node",
            "typeof d",
            "component",
            "typeof h",
            "bubble",
            "reduceright",
            "script",
            "typeof n",
            "jhnew ia",
            "gtm5sn6brv",
            "path",
            "host",
            "trackpageview",
            "gw8yd4p2eny",
            "select",
            "strong",
            "uint8array",
            "android",
            "verify",
            "stop",
            "enterprise",
            "widget",
            "window",
            "generator",
            "reload",
            "r300",
            "caca",
            "closure library",
            "xdfunction",
            "adfunction",
            "cdfunction",
            "ddfunction",
            "bded",
            "please",
            "typeemail",
            "email",
            "jarallaxinner",
            "webkit",
            "property",
            "transform",
            "trident",
            "edge",
            "ipodi",
            "ipadi",
            "androidi",
            "blackberryi",
            "windows phonei",
            "xfunction",
            "pfunction",
            "wfunction",
            "show navigation",
            "mjquery",
            "typeof",
            "defaulttype",
            "hidden",
            "show",
            "shown",
            "startr",
            "endr",
            "federico zivolo",
            "distributed",
            "mit license",
            "statict",
            "flip"
          ],
          "references": [
            "xfe-IP-78.142.35.163-stix2-2.1-export.json",
            "xfe-URL-Enom.com-stix2-2.1-export.json",
            "xfe-URL-4vendeta.com-stix2-2.1-export.json",
            "https://4vendeta.com/assets/js/jquery.min.js",
            "https://4vendeta.com/assets/js/popper.min.js",
            "https://4vendeta.com/assets/js/bootstrap.min.js",
            "https://4vendeta.com/assets/js/meanmenu.min.js",
            "https://4vendeta.com/assets/js/parallax.min.js",
            "https://4vendeta.com/assets/js/ajaxchimp.min.js",
            "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
            "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
            "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
            "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
            "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
            "https://cp.enom.com/js/jquery-3.5.1.min.js",
            "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
            "https://cp.enom.com/js/global-functions.js",
            "https://cp.enom.com/js/punycode.min.js",
            "https://cp.enom.com/js/jquery.disableonsubmit.min.js",
            "https://cp.enom.com/js/jquery.cookie.min.js",
            "https://cp.enom.com/js/cart.minicart.min.js",
            "https://cp.enom.com/js/openWin.min.js",
            "https://cp.enom.com/js/jquery.jgrowl.min.js",
            "https://cp.enom.com/scripts/Session.min.js",
            "https://cp.enom.com/responsive/_js/init.min.js",
            "https://cp.enom.com/responsive/_js/bootstrap.js",
            "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
            "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
            "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
            "https://cdn.optimizely.com/js/26241557.js",
            "https://cp.enom.com/verisign-seal.htm",
            "https://cp.enom.com/global/TopMenu.ascx.js",
            "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
            "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
            "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
            "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
            "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
            "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "ReduceRight",
              "display_name": "ReduceRight",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059",
              "name": "Command and Scripting Interpreter",
              "display_name": "T1059 - Command and Scripting Interpreter"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 3,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "adjadex1@gmail.com",
            "id": "187163",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 2989,
            "hostname": 1208,
            "domain": 634,
            "FileHash-SHA256": 302
          },
          "indicator_count": 5133,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "1429 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "621bc3aa050a6c5693595f25",
          "name": "Zetalytics API",
          "description": "",
          "modified": "2022-03-29T00:03:34.773000",
          "created": "2022-02-27T18:32:10.542000",
          "tags": [
            "google",
            "google llc",
            "detected",
            "expand overall",
            "http",
            "amazonaes",
            "openssl",
            "lookup go",
            "rescan add",
            "verdict report",
            "behaviour",
            "june",
            "apache",
            "search url",
            "search domain",
            "scan url",
            "url search",
            "domain scan",
            "url url",
            "us summary",
            "line",
            "google maps",
            "api warning",
            "redirects links",
            "similar dom",
            "content api",
            "domains",
            "Ransomware"
          ],
          "references": [
            "zetalytics .pdf"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Win.Virus.PolyRansom-5704625-0",
              "display_name": "Win.Virus.PolyRansom-5704625-0",
              "target": null
            },
            {
              "id": "Win32:Cryptor",
              "display_name": "Win32:Cryptor",
              "target": null
            },
            {
              "id": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "display_name": "TELPER:CERT:SoftwareBundler:Win32/Bunpredelt",
              "target": null
            },
            {
              "id": "Trojan:Win32/Danabot.G",
              "display_name": "Trojan:Win32/Danabot.G",
              "target": "/malware/Trojan:Win32/Danabot.G"
            },
            {
              "id": "Backdoor:Win32/Poison.E",
              "display_name": "Backdoor:Win32/Poison.E",
              "target": "/malware/Backdoor:Win32/Poison.E"
            },
            {
              "id": "ALF:PUA:Block:IObit.R!MTB",
              "display_name": "ALF:PUA:Block:IObit.R!MTB",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Kailula4",
            "id": "131997",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 754,
            "URL": 2375,
            "domain": 441,
            "hostname": 833,
            "CIDR": 5,
            "FileHash-MD5": 2,
            "email": 1
          },
          "indicator_count": 4411,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 406,
          "modified_text": "1482 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "http://www.versaweb.com/css/1024.css",
        "https://4vendeta.com/assets/js/parallax.min.js",
        "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
        "https://d.adroll.com/pixel/LZLVHVDGLRC6BEJRRIQDVW/HBKRUDDSQJCU7GD5KH3RWC?adroll_fpc=fd1d5ad32fd771b6d89af530ec6ca1cf-1651601137287&arrfrr=http%3A%2F%2Fwww.versaweb.com%2F&pv=14491019928.1296&cookie=&adroll_s_ref=&keyw=",
        "https://cp.enom.com/global/TopMenu.ascx.js",
        "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
        "https://cp.enom.com/verisign-seal.htm",
        "xfe-URL-creativecommons.org-stix2-2.1-export.json",
        "https://cp.enom.com/responsive/_js/bootstrap.js",
        "https://purl.archive.org/static/jquery/jquery.js",
        "https://modernizr.com/js/build.js",
        "zetalytics .pdf",
        "https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js",
        "https://user.aquanx.com/clientarea.php",
        "https://cp.enom.com/scripts/Session.min.js",
        "xfe-URL-4vendeta.com-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
        "xfe-URL-Easydns.com-stix2-2.1-export.json",
        "xfe-IP-78.142.35.163-stix2-2.1-export.json",
        "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
        "https://cp.enom.com/js/cart.minicart.min.js",
        "https://4vendeta.com/assets/js/ajaxchimp.min.js",
        "xfe-URL-versaweb.com-stix2-2.1-export.json",
        "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
        "https://cp.enom.com/js/jquery.disableonsubmit.min.js",
        "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0",
        "https://purl.archive.org/",
        "xfe-IP-193.149.176.62-stix2-2.1-export.json",
        "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
        "xfe-URL-raksmart.com-stix2-2.1-export.json",
        "https://cp.enom.com/responsive/_js/init.min.js",
        "https://4vendeta.com/assets/js/bootstrap.min.js",
        "https://www.jelenia-gora.so.gov.pl/",
        "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
        "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
        "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
        "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
        "https://www.jelenia-gora.sr.gov.pl/spacer",
        "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
        "https://cp.enom.com/js/openWin.min.js",
        "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
        "https://www.fiberhub.com/js/bootstrap.js",
        "xfe-IP-76.164.203.68-stix2-2.1-export.json",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
        "https://d.adroll.com/consent/check/LZLVHVDGLRC6BEJRRIQDVW?arrfrr=http%3A%2F%2Fwww.versaweb.com%2F&_s=1b87c8c5132a03372125d888e43b0a86&_b=2",
        "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
        "xfe-URL-fiberhub.com-stix2-2.1-export.json",
        "https://4vendeta.com/assets/js/jquery.min.js",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "xfe-URL-Enom.com-stix2-2.1-export.json",
        "https://4vendeta.com/assets/js/meanmenu.min.js",
        "http://www.jelenia-gora.so.gov.pl/",
        "https://aquanx.com/js/modernizr-custom.js",
        "https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js",
        "https://purl.archive.org/static/app.js",
        "https://s.adroll.com/j/exp/LZLVHVDGLRC6BEJRRIQDVW/index.js",
        "https://cdn.optimizely.com/js/26241557.js",
        "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
        "https://cp.enom.com/js/punycode.min.js",
        "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
        "https://cp.enom.com/js/jquery.jgrowl.min.js",
        "https://www.googletagmanager.com/gtag/js?id=UA-33008870-1",
        "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
        "xfe-URL-Purl.com-stix2-2.1-export.json",
        "https://cp.enom.com/js/global-functions.js",
        "https://cp.enom.com/js/jquery-3.5.1.min.js",
        "https://aquanx.com/js/bootstrap.js",
        "https://purl.archive.org/static/bootstrap/js/bootstrap.js",
        "https://cp.enom.com/js/jquery.cookie.min.js",
        "https://aquanx.com/js/jquery-1.12.4.min.js",
        "https://waf.intelix.pl/957476/Chat/Script/Compatibility",
        "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
        "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
        "https://aquanx.com/",
        "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
        "https://4vendeta.com/assets/js/popper.min.js",
        "http://www.versaweb.com/js/bootstrap.js",
        "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
        "xfe-URL-modernizr.com-stix2-2.1-export.json",
        "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
        "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "",
            "Reduceright",
            "Serwer",
            "Vd",
            "Trojan:win32/danabot.g",
            "Win.virus.polyransom-5704625-0",
            "Backdoor:win32/poison.e",
            "Alf:pua:block:iobit.r!mtb",
            "Telper:cert:softwarebundler:win32/bunpredelt",
            "Win32:cryptor"
          ],
          "industries": [],
          "unique_indicators": 87177
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/props.top",
    "whois": "http://whois.domaintools.com/props.top",
    "domain": "props.top",
    "hostname": "this.props.top"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 11,
  "pulses": [
    {
      "id": "67a7f06a5d0f22ad92684646",
      "name": "WebForm.com.gov.pl/CEIDG/ScriptResource.axd",
      "description": "The following is the full text of the WebForm.com.gov.pl/CEIDG/ScriptResource.axd, following the following:.au, for the first time.",
      "modified": "2025-05-14T21:27:17.040000",
      "created": "2025-02-09T00:01:46.054000",
      "tags": [
        "null",
        "nie mona",
        "array",
        "input",
        "nonmsdombrowser",
        "object",
        "html",
        "component",
        "body",
        "horizontal",
        "date",
        "calendar",
        "february",
        "april",
        "june",
        "august",
        "iframe",
        "form",
        "friday",
        "explorer",
        "target",
        "error",
        "legend",
        "this",
        "type",
        "regexp",
        "elem",
        "index",
        "function",
        "handle",
        "check",
        "safari",
        "expando",
        "android",
        "false",
        "hooks",
        "copy",
        "prop",
        "class",
        "mark",
        "window",
        "code",
        "capture",
        "accept",
        "seed",
        "override",
        "hook",
        "look",
        "loop",
        "install",
        "pass",
        "enough",
        "bind",
        "core",
        "local",
        "verify",
        "done",
        "find",
        "internal",
        "inject",
        "possible",
        "hold",
        "middle",
        "guard",
        "fall",
        "stop",
        "panic",
        "back",
        "restrict",
        "speed",
        "turn",
        "grab",
        "getclass",
        "jquery",
        "bubble",
        "anchor",
        "shift"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1134",
          "name": "Access Token Manipulation",
          "display_name": "T1134 - Access Token Manipulation"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 13,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1143,
        "domain": 155,
        "hostname": 523,
        "FileHash-SHA256": 151
      },
      "indicator_count": 1972,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 122,
      "modified_text": "339 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "66246ff49ed29ea9bb2bf122",
      "name": "S\u0105d Rejonowy w Jeleniej Gorze  POLAND",
      "description": "Przechowywania lub dost\u0119pu do plik\u00f3w cookies w Twojej przegl\u0105darce\nhttps://www.virustotal.com/gui/domain/jelenia-gora.sr.gov.pl/relations",
      "modified": "2025-05-14T21:18:36.989000",
      "created": "2024-04-21T01:46:28.554000",
      "tags": [
        "jeleniej grze",
        "aktualnoci",
        "informacje",
        "jednostka",
        "rejonowy",
        "konkurs",
        "najczciej",
        "sd rejonowy",
        "przejd",
        "czytaj",
        "click",
        "sdzia jarosaw",
        "wydziau",
        "sdzia grzegorz",
        "katarzyna",
        "rudnicka dane",
        "kontaktowe sd",
        "jelenia gra",
        "mickiewicza",
        "zawarto",
        "html",
        "nazwa meta",
        "robotw",
        "telefon",
        "brak",
        "skala",
        "ua zgodna",
        "head body",
        "zasb",
        "cname",
        "kod odpowiedzi",
        "kodowanie treci",
        "wygasa",
        "gmt serwer",
        "pragma",
        "kontrola pamici",
        "podrcznej",
        "data",
        "gmt kontrola",
        "dostpuzezwl na",
        "czytaj wicej",
        "sd okrgowy",
        "jednostki",
        "okrgowy",
        "ogoszenia",
        "sha256",
        "vhash",
        "ssdeep",
        "https odcisk",
        "palca jarma",
        "https dane",
        "v3 numer",
        "odcisk palca",
        "tworzy katalog",
        "tworzy pliki",
        "typ pliku",
        "json",
        "ascii",
        "windows",
        "sqlite",
        "foxpro fpt",
        "links typ",
        "mapa",
        "152 x",
        "sqlite w",
        "sha1",
        "sha512",
        "file size",
        "b file",
        "testing",
        "komornik sdowy",
        "sdzie rejonowym",
        "tomasz rodacki",
        "obwieszczenie",
        "komornicze",
        "tumacza migam",
        "tumacz czynny",
        "zamknite",
        "wiadczenia",
        "schedule",
        "error",
        "javascript",
        "bakers hall",
        "ixaction",
        "script",
        "ixchatlauncher",
        "compatibility",
        "com dla",
        "t1055 pewno",
        "unikanie obrony",
        "t1036 maskarada",
        "t1082 pewno",
        "informacje o",
        "nazwa pliku",
        "dokument pdf",
        "rozmiar pliku",
        "zapowied",
        "type",
        "iii dbt",
        "utf8",
        "dziennik"
      ],
      "references": [
        "S?d Rejonowy w Jeleniej G\u00f3rze.htm",
        "II Wydzia? Karny - S?d Rejonowy w Jeleniej G\u00f3rze 1.htm",
        "http://www.jelenia-gora.so.gov.pl/",
        "https://www.jelenia-gora.so.gov.pl/",
        "http://www.jelenia-gora.sr.gov.pl/ogloszenia-komornicze",
        "https://tlumacz.migam.org/sad_rejonowy_jelenia_gora",
        "https://www.jelenia-gora.sr.gov.pl/spacer",
        "https://waf.intelix.pl/957476/Chat/Script/Compatibility"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "",
          "display_name": "",
          "target": null
        },
        {
          "id": "serwer",
          "display_name": "serwer",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1082",
          "name": "System Information Discovery",
          "display_name": "T1082 - System Information Discovery"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 24,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "email": 71,
        "domain": 7651,
        "hostname": 7680,
        "IPv4": 331,
        "FileHash-SHA256": 16168,
        "URL": 10399,
        "FileHash-MD5": 3639,
        "FileHash-SHA1": 3468,
        "CIDR": 4,
        "CVE": 89,
        "YARA": 521,
        "SSLCertFingerprint": 25,
        "JA3": 1,
        "IPv6": 5813
      },
      "indicator_count": 55860,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 141,
      "modified_text": "339 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "663d2869e0f3a42bbddc42ff",
      "name": "UPX executable packer.",
      "description": "A new rule has been introduced  a \"suspicious\" ELF binary that is packed with the UPX executable packer.\nSuggested ATT&CK IDs: rule SUSP_ELF_LNX_UPX_Compressed_File { meta: description = \"Detects a suspicious ELF binary with UPX compression\" author = \"Florian Roth (Nextron Systems)\" reference = \"Internal Research\" date = \"2018-12-12\" score = 40 hash1 = \"038ff8b2fef16f8ee9d70e6c219c5f380afe1a21761791e8cbda21fa4d09fdb4\" id = \"078937de-59b3-538e-a5c3-57f4e6050212\" strings: $s1 = \"PROT_EXEC|PROT_WRITE failed.\" fullword ascii $s2 = \"$Id: UPX\" fullword ascii $s3 = \"$Info: This file is packed with the UPX executable packer\" ascii $fp1 = \"check your UCL installation !\"",
      "modified": "2024-10-14T00:01:17.069000",
      "created": "2024-05-09T19:47:53.786000",
      "tags": [
        "cioch adrian",
        "centrum usug",
        "sieciowych",
        "elf binary",
        "upx compression",
        "roth",
        "nextron",
        "info",
        "javascript",
        "html",
        "office open",
        "xml document",
        "network capture",
        "win32 exe",
        "xml pakietu",
        "pdf zestawy",
        "przechwytywanie",
        "office",
        "filehashsha1",
        "url https",
        "cve cve20201070",
        "cve cve20203153",
        "cve cve20201048",
        "cve cve20211732",
        "cve20201048 apr",
        "filehashmd5",
        "cve cve20010901",
        "cve cve20021841",
        "cve20153202 apr",
        "cve cve20160728",
        "cve cve20161807",
        "cve cve20175123",
        "cve20185407 apr",
        "cve cve20054605",
        "cve cve20060745",
        "cve cve20070452",
        "cve cve20070453",
        "cve cve20070454",
        "cve cve20071355",
        "cve cve20071358",
        "cve cve20071871",
        "cve20149614 apr",
        "cve cve20151503",
        "cve cve20152080",
        "cve cve20157377",
        "cve cve20170131",
        "cve20200796 may",
        "cve cve20113403"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 6861,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Arek-BTC",
        "id": "212764",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_212764/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 5771,
        "domain": 3139,
        "URL": 14525,
        "FileHash-SHA1": 2610,
        "IPv4": 108,
        "CIDR": 40,
        "FileHash-SHA256": 10705,
        "FileHash-MD5": 3373,
        "YARA": 2,
        "CVE": 148,
        "Mutex": 7,
        "FilePath": 3,
        "SSLCertFingerprint": 3,
        "email": 23,
        "JA3": 1,
        "IPv6": 2
      },
      "indicator_count": 40460,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "552 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708cdd2f63f24552fa3e39",
      "name": "BLNWX.COM",
      "description": "",
      "modified": "2023-12-06T15:01:49.772000",
      "created": "2023-12-06T15:01:49.772000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 400,
        "URL": 1905,
        "domain": 494,
        "hostname": 707
      },
      "indicator_count": 3506,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65708c534aadf7adf4f27d77",
      "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
      "description": "",
      "modified": "2023-12-06T14:59:31.122000",
      "created": "2023-12-06T14:59:31.122000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 302,
        "domain": 634,
        "URL": 2988,
        "hostname": 1208
      },
      "indicator_count": 5132,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "65707f8475d8a8785dfc5a2f",
      "name": "Zetalytics API",
      "description": "",
      "modified": "2023-12-06T14:04:52.250000",
      "created": "2023-12-06T14:04:52.250000",
      "tags": [],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 2,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "StreamMiningEx",
        "id": "262917",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 754,
        "hostname": 833,
        "domain": 441,
        "URL": 2375,
        "CIDR": 5,
        "FileHash-MD5": 2,
        "email": 1
      },
      "indicator_count": 4411,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 109,
      "modified_text": "865 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "62750795ebc8c475f4a3033a",
      "name": "aquanx.com (PegTech botnet hosting)",
      "description": "var b[f, g.g, is a new addition to the list of characters that can be added to a singleElement, as well as a set of numbers, if they are new.",
      "modified": "2022-06-05T00:03:45.266000",
      "created": "2022-05-06T11:33:41.174000",
      "tags": [
        "function",
        "eu cookie",
        "version",
        "tamas schalk",
        "element",
        "lang",
        "datadelay",
        "dataexpire",
        "dataclass",
        "name",
        "date",
        "path",
        "null",
        "cookie",
        "regexp",
        "typeof e",
        "please",
        "typeof t",
        "pseudo",
        "child",
        "array",
        "error",
        "class",
        "void",
        "this",
        "extendedvps",
        "login register",
        "product group",
        "svssdlinux",
        "svssdwindows",
        "password",
        "client area",
        "aquanx english",
        "azerbaijani",
        "catal",
        "colocation\uff0ccustomized service\uff0cone-stop service\uff0caffordable cloud ",
        "aquanx",
        "metal cloud",
        "chat",
        "ddos migration",
        "network",
        "colocation",
        "cloud",
        "colocation bare",
        "cloud hosting",
        "private cloud",
        "bare",
        "service",
        "custom build",
        "https",
        "bootstrap",
        "bootstrap hover",
        "dropdown",
        "author",
        "cameron spear",
        "mattia larentis",
        "dropdown plugin",
        "http",
        "plugin",
        "copyright",
        "twitter",
        "conflict",
        "focus",
        "object",
        "click",
        "open",
        "next",
        "target",
        "trigger",
        "checkbox",
        "delta",
        "scroll",
        "false",
        "type",
        "expando",
        "typeof selector",
        "sizzle",
        "elem",
        "match",
        "data",
        "seed",
        "vd",
        "number",
        "string",
        "ienew ca",
        "closure library",
        "quota",
        "aafunction",
        "dafunction"
      ],
      "references": [
        "https://www.googletagmanager.com/gtag/js?id=UA-59480575-2",
        "https://aquanx.com/js/jquery-1.12.4.min.js",
        "https://aquanx.com/js/bootstrap.js",
        "https://aquanx.com/js/bootstrap-hover-dropdown.min.js",
        "https://aquanx.com/js/modernizr-custom.js",
        "https://aquanx.com/js/cookie-warn.js?v=1_xSax0l",
        "https://aquanx.com/",
        "https://user.aquanx.com/clientarea.php",
        "https://user.aquanx.com/templates/aquanx20190627/js/scripts.min.js?v=8a99af",
        "https://alpha99.raksmart.com/whmcs/assets/js/cookie-warn.js",
        "xfe-URL-raksmart.com-stix2-2.1-export.json"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vd",
          "display_name": "Vd",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1106",
          "name": "Native API",
          "display_name": "T1106 - Native API"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 9,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 560,
        "URL": 1236,
        "domain": 184,
        "FileHash-SHA256": 79
      },
      "indicator_count": 2059,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 69,
      "modified_text": "1414 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "6271740be1d2d55007677274",
      "name": "Fiberhub.com and versaweb.com",
      "description": "The following is the full text of the code used to create Twitter's new web-based \"bootstrap\" - a guide to what to do if you want to use it in your browser.",
      "modified": "2022-06-02T00:03:59.540000",
      "created": "2022-05-03T18:27:23.636000",
      "tags": [
        "html5 shiv",
        "jdalton",
        "jonneal",
        "mitgpl2",
        "typeof c",
        "typeof module",
        "null",
        "plugin",
        "function",
        "copyright",
        "twitter",
        "bootstrap",
        "http",
        "conflict",
        "focus",
        "object",
        "error",
        "click",
        "open",
        "next",
        "target",
        "trigger",
        "config",
        "checkbox",
        "delta",
        "false",
        "scroll",
        "vd",
        "number",
        "string",
        "ienew ca",
        "date",
        "closure library",
        "quota",
        "aafunction",
        "dafunction",
        "fbcd",
        "328373057580084",
        "prop",
        "init",
        "autoconfig",
        "protocol",
        "adnxsdomain",
        "aoldomain",
        "adrolltpc",
        "regexp",
        "typeof b",
        "pseudo",
        "child",
        "array",
        "width",
        "sufeffxa0",
        "class",
        "accept",
        "please",
        "chat",
        "search",
        "language",
        "feel",
        "file",
        "call",
        "strongstart",
        "address",
        "again"
      ],
      "references": [
        "xfe-IP-76.164.203.68-stix2-2.1-export.json",
        "http://www.versaweb.com/js/bootstrap.js",
        "https://embed.tawk.to/_s/v4/app/625d36b405c/languages/en.js",
        "http://www.versaweb.com/css/1024.css",
        "https://cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/jquery.min.js",
        "https://d.adroll.com/pixel/LZLVHVDGLRC6BEJRRIQDVW/HBKRUDDSQJCU7GD5KH3RWC?adroll_fpc=fd1d5ad32fd771b6d89af530ec6ca1cf-1651601137287&arrfrr=http%3A%2F%2Fwww.versaweb.com%2F&pv=14491019928.1296&cookie=&adroll_s_ref=&keyw=",
        "https://d.adroll.com/consent/check/LZLVHVDGLRC6BEJRRIQDVW?arrfrr=http%3A%2F%2Fwww.versaweb.com%2F&_s=1b87c8c5132a03372125d888e43b0a86&_b=2",
        "https://s.adroll.com/j/exp/LZLVHVDGLRC6BEJRRIQDVW/index.js",
        "xfe-URL-versaweb.com-stix2-2.1-export.json",
        "xfe-URL-fiberhub.com-stix2-2.1-export.json",
        "https://www.googletagmanager.com/gtag/js?id=UA-33008870-1",
        "https://www.fiberhub.com/js/bootstrap.js",
        "https://cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv.min.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Vd",
          "display_name": "Vd",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 11,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 590,
        "URL": 1312,
        "domain": 376,
        "FileHash-SHA256": 203
      },
      "indicator_count": 2481,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 69,
      "modified_text": "1417 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "626acbf5b18bf4679059431e",
      "name": "BLNWX.COM",
      "description": "Users of the Internet Archive are being asked to login to the service to access the archive's archive, or PURL, and to view the Archive's collection of archived material.  \u00c2\u00a31.",
      "modified": "2022-05-28T00:03:46.141000",
      "created": "2022-04-28T17:16:37.507000",
      "tags": [
        "error",
        "modulenotfound",
        "knew promise",
        "parseint",
        "date",
        "fsettimeout",
        "typeof module",
        "null",
        "plugin",
        "function",
        "copyright",
        "twitter",
        "bootstrap",
        "http",
        "conflict",
        "focus",
        "object",
        "click",
        "open",
        "next",
        "target",
        "trigger",
        "checkbox",
        "delta",
        "scroll",
        "false",
        "regexp",
        "pseudo",
        "child",
        "sufeffxa0",
        "class",
        "attr",
        "foundation",
        "close",
        "user login",
        "cancel",
        "close user",
        "complete",
        "come",
        "sign",
        "cancel toggle",
        "purl",
        "administration"
      ],
      "references": [
        "xfe-IP-193.149.176.62-stix2-2.1-export.json",
        "xfe-URL-Purl.com-stix2-2.1-export.json",
        "xfe-URL-Easydns.com-stix2-2.1-export.json",
        "xfe-URL-creativecommons.org-stix2-2.1-export.json",
        "https://purl.archive.org/",
        "https://purl.archive.org/static/jquery/jquery.js",
        "https://purl.archive.org/static/bootstrap/js/bootstrap.js",
        "https://purl.archive.org/static/app.js",
        "xfe-URL-modernizr.com-stix2-2.1-export.json",
        "https://modernizr.com/js/build.js"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 7,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 1905,
        "hostname": 707,
        "domain": 494,
        "FileHash-SHA256": 400
      },
      "indicator_count": 3506,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 69,
      "modified_text": "1422 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "62616627ee302d24b23523c3",
      "name": "enom.com & 4vendeta.com - ReduceRight malware hosting/creation",
      "description": "New RegExp(M) is a new type, and it will change any of the elements to the same type if you want to add them to your HTML page or add a third element.",
      "modified": "2022-05-21T00:03:44.725000",
      "created": "2022-04-21T14:11:51.629000",
      "tags": [
        "tbody",
        "span",
        "thead",
        "tfoot",
        "multiple",
        "type",
        "href",
        "input",
        "halflings",
        "gradienttype1",
        "twitter",
        "false",
        "fontface",
        "fatface",
        "woff2",
        "u0259",
        "u1e001eff",
        "u2020",
        "u20a020ab",
        "u20ad20cf",
        "u2113",
        "u2c602c7f",
        "typesubmit",
        "function",
        "typeof c",
        "formdata",
        "this",
        "typeof define",
        "null",
        "typeof f",
        "object",
        "boolean",
        "typeof module",
        "error",
        "reflect",
        "math",
        "regexp",
        "number",
        "array",
        "typeerror",
        "string",
        "symbol",
        "typeof e",
        "typeof t",
        "class",
        "attr",
        "pseudo",
        "child",
        "js foundation",
        "account",
        "open",
        "navitem",
        "text",
        "mainnav",
        "click",
        "blank",
        "copyright",
        "u0027",
        "value",
        "body",
        "firefox",
        "enum",
        "html",
        "msie",
        "applewebkit",
        "traceconsole",
        "form",
        "iframe",
        "legend",
        "nonmsdombrowser",
        "callbackindex",
        "callbackframeid",
        "eventtarget",
        "eventargument",
        "validation",
        "explorer",
        "target",
        "plugin",
        "bootstrap",
        "https",
        "conflict",
        "focus",
        "next",
        "trigger",
        "checkbox",
        "delta",
        "scroll",
        "sourceid",
        "date",
        "sessiontoken",
        "sessionexpires",
        "void",
        "rangeerror",
        "utf16",
        "illegal input",
        "global",
        "chrome",
        "opredge",
        "opera",
        "safari",
        "version",
        "sxa0",
        "browser",
        "typeof require",
        "dom node",
        "typeof d",
        "component",
        "typeof h",
        "bubble",
        "reduceright",
        "script",
        "typeof n",
        "jhnew ia",
        "gtm5sn6brv",
        "path",
        "host",
        "trackpageview",
        "gw8yd4p2eny",
        "select",
        "strong",
        "uint8array",
        "android",
        "verify",
        "stop",
        "enterprise",
        "widget",
        "window",
        "generator",
        "reload",
        "r300",
        "caca",
        "closure library",
        "xdfunction",
        "adfunction",
        "cdfunction",
        "ddfunction",
        "bded",
        "please",
        "typeemail",
        "email",
        "jarallaxinner",
        "webkit",
        "property",
        "transform",
        "trident",
        "edge",
        "ipodi",
        "ipadi",
        "androidi",
        "blackberryi",
        "windows phonei",
        "xfunction",
        "pfunction",
        "wfunction",
        "show navigation",
        "mjquery",
        "typeof",
        "defaulttype",
        "hidden",
        "show",
        "shown",
        "startr",
        "endr",
        "federico zivolo",
        "distributed",
        "mit license",
        "statict",
        "flip"
      ],
      "references": [
        "xfe-IP-78.142.35.163-stix2-2.1-export.json",
        "xfe-URL-Enom.com-stix2-2.1-export.json",
        "xfe-URL-4vendeta.com-stix2-2.1-export.json",
        "https://4vendeta.com/assets/js/jquery.min.js",
        "https://4vendeta.com/assets/js/popper.min.js",
        "https://4vendeta.com/assets/js/bootstrap.min.js",
        "https://4vendeta.com/assets/js/meanmenu.min.js",
        "https://4vendeta.com/assets/js/parallax.min.js",
        "https://4vendeta.com/assets/js/ajaxchimp.min.js",
        "https://www.googletagmanager.com/gtag/js?id=UA-92521958-1",
        "https://www.googletagmanager.com/gtag/js?id=G-W8YD4P2ENY&l=dataLayer&cx=c",
        "https://www.gstatic.com/recaptcha/releases/QENb_qRrX0-mQMyENQjD6Fuj/recaptcha__en.js",
        "https://www.googletagmanager.com/gtm.js?id=GTM-5SN6BRV",
        "https://static.zdassets.com/ekr/snippet.js?key=7342b695-e394-4f25-89a0-da9d262a48da",
        "https://cp.enom.com/js/jquery-3.5.1.min.js",
        "https://cp.enom.com/responsive/_js/knockout-3.3.0.min.js",
        "https://cp.enom.com/js/global-functions.js",
        "https://cp.enom.com/js/punycode.min.js",
        "https://cp.enom.com/js/jquery.disableonsubmit.min.js",
        "https://cp.enom.com/js/jquery.cookie.min.js",
        "https://cp.enom.com/js/cart.minicart.min.js",
        "https://cp.enom.com/js/openWin.min.js",
        "https://cp.enom.com/js/jquery.jgrowl.min.js",
        "https://cp.enom.com/scripts/Session.min.js",
        "https://cp.enom.com/responsive/_js/init.min.js",
        "https://cp.enom.com/responsive/_js/bootstrap.js",
        "https://cp.enom.com/WebResource.axd?d=6rtXrDcnyiYD-9dFDFOkxTRcPVSrAN8fR-cHKzNqPTy7bHic-2LLMHDnielTzEI-sd1KplHrRBudcZJOm0-lxubO7k41&t=637453818340000000",
        "https://cp.enom.com/ScriptResource.axd?d=fVjQa-0YyNqO6JmV36bw6eBJdTjE2YSdtcunOWcKYcBNn73MOJKQA_rxX3YMhcxLTgyDsGTKy0p9NEPvxzpqEpBKtm3GLb2GgI1LFYMC0Xr2lh71ZCttzgNGFnc5mS_Fc_DY5UH0M19Mr958h1jvmK4kzAM1&t=363be08",
        "https://cp.enom.com/ScriptResource.axd?d=lDjPFfAIWSrEAVNgTHTrISQmLEFmHAaibvNJQuGRZDbWpGFPLrFwaGVpjCUsI6HkqzbpwmaAa0cJCrq8f0eqEvIsQM8lvN_dVYVyESnohON4oTvdMZHDmwG83uJA4m2oqykP8TTTSIeV2oaNrlIXaX8cOxC5Cv6aGmjpdB2u-227wdn30&t=363be08",
        "https://cdn.optimizely.com/js/26241557.js",
        "https://cp.enom.com/verisign-seal.htm",
        "https://cp.enom.com/global/TopMenu.ascx.js",
        "http://alp-vision.com/wp-includes/js/jquery/jquery.min.js?ver=3.5.1",
        "http://alp-vision.com/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4",
        "http://alp-vision.com/wp-content/cache/autoptimize/js/autoptimize_78b4f9b28399aa3c8a405e45931ad058.js",
        "http://alp-vision.com/wp-includes/css/dist/block-library/style.min.css?ver=5.7.6",
        "http://fonts.googleapis.com/css?family=Abril+Fatface%3Aregular&subset=latin%2Ccyrillic&ver=5.7.6",
        "http://alp-vision.com/wp-content/themes/alp-vision/css/bootstrap.css?ver=1.0"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "ReduceRight",
          "display_name": "ReduceRight",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059",
          "name": "Command and Scripting Interpreter",
          "display_name": "T1059 - Command and Scripting Interpreter"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 3,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "adjadex1@gmail.com",
        "id": "187163",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 2989,
        "hostname": 1208,
        "domain": 634,
        "FileHash-SHA256": 302
      },
      "indicator_count": 5133,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 68,
      "modified_text": "1429 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://this.props.top",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://this.props.top",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776616708.7536042
}