{
  "type": "URL",
  "indicator": "https://www.touchstoneimaging.com/",
  "general": {
    "sections": [
      "general",
      "url_list",
      "http_scans",
      "screenshot"
    ],
    "indicator": "https://www.touchstoneimaging.com/",
    "type": "url",
    "type_title": "URL",
    "validation": [],
    "base_indicator": {
      "id": 4075952359,
      "indicator": "https://www.touchstoneimaging.com/",
      "type": "URL",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 2,
      "pulses": [
        {
          "id": "684ba9cdc900a3d86b2d45ad",
          "name": "Porn library @ Imaging Center - Advesarial",
          "description": "Actually a major issue , there are more invasive problems found. More research needed.\nAnybody?",
          "modified": "2025-07-13T04:04:28.476000",
          "created": "2025-06-13T04:32:13.936000",
          "tags": [
            "url https",
            "url http",
            "ipv4",
            "domain",
            "filehashsha256",
            "czechia",
            "united kingdom",
            "france",
            "united",
            "search",
            "learn",
            "ck id",
            "name tactics",
            "suspicious",
            "informative",
            "command",
            "adversaries",
            "spawns",
            "mitre att",
            "ck techniques",
            "ipv6",
            "type indicator",
            "role title",
            "added active",
            "related pulses",
            "zeagle",
            "porn",
            "members",
            "phishing",
            "entries",
            "copy md5",
            "copy sha1",
            "copy sha256",
            "sha1",
            "sha256",
            "size",
            "pattern match",
            "ascii text",
            "null",
            "span",
            "error",
            "body",
            "june",
            "hybrid",
            "local",
            "path",
            "encrypt",
            "click",
            "date",
            "strings",
            "refresh",
            "tools",
            "virus",
            "domains",
            "hashes",
            "cyberpunk 2077",
            "porn host",
            "playboy"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "TrojanDownloaderWin32Zeagle",
              "display_name": "TrojanDownloaderWin32Zeagle",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1057",
              "name": "Process Discovery",
              "display_name": "T1057 - Process Discovery"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1480",
              "name": "Execution Guardrails",
              "display_name": "T1480 - Execution Guardrails"
            },
            {
              "id": "T1553",
              "name": "Subvert Trust Controls",
              "display_name": "T1553 - Subvert Trust Controls"
            },
            {
              "id": "T1583",
              "name": "Acquire Infrastructure",
              "display_name": "T1583 - Acquire Infrastructure"
            },
            {
              "id": "T1113",
              "name": "Screen Capture",
              "display_name": "T1113 - Screen Capture"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 31,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "URL": 92,
            "FileHash-MD5": 45,
            "domain": 15,
            "hostname": 55,
            "FileHash-SHA256": 138,
            "FileHash-SHA1": 49,
            "SSLCertFingerprint": 2
          },
          "indicator_count": 396,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "280 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        },
        {
          "id": "684b932fcbcc577471a28c8a",
          "name": "Imaging Center Malware, Virus other manipulations",
          "description": "IMO Serious!  Virus, Trojans, potential cams? PHI , PII access. Super concerning potential manipulation , imaging, reports., records, billing\nis manipulated.\nMore research necessary.\nTrue potential for manipulation \nof x-ray , ct scan dosing.\nExcessive Adult content:\ncdn1-thumbs.pornhost.com | \ncdn28.eporncam.com | \t\ncdn35.thotporn.tv | \ncdnst7.pornburst.xxx | \nmcdns.vrporn.com |\nURL\nhttps://c845a1577e.mjedge.net/contents/videos_screenshots/3979000/3979719/preview.jpg&tbnid=rLNgRtn9SIlcgM&vet=10CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH..i&imgrefurl=https:/it.vikiporn.com/videos/3979719/horror-porn-the-dark-side-of-the-woods/&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror porn&ved=0CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH |\nhttps://cdn1-thumbs.pornhost.com/0/2/0235809321/001_150_112.jpg | \n\u2022 Den:Variant.Application.Bundler.Ludus.1\n\u2022 PUABundler:Win32/YandexBundled\n\u2022 Adware.Win32.DownWare.cl\n\u2022 pua:Win32/Catalina\n\u2022W32.AIDetectMalware\n* Why is my OTX account blocked from features",
          "modified": "2025-07-13T02:05:19.612000",
          "created": "2025-06-13T02:55:42.562000",
          "tags": [
            "united",
            "asn16509",
            "amazon02",
            "frankfurt",
            "main",
            "germany",
            "asn60068",
            "cdn77 datacamp",
            "limited",
            "browsing",
            "reverse dns",
            "protocol h2",
            "security tls",
            "general full",
            "url https",
            "resource",
            "hash",
            "software",
            "dalles",
            "june",
            "de indicators",
            "domains",
            "hashes",
            "verified",
            "ecdsa",
            "linux x8664",
            "khtml",
            "gecko",
            "aes256gcm",
            "veryhigh",
            "patch",
            "accept",
            "encrypt",
            "cookie",
            "sticky",
            "aaaa",
            "cname",
            "ttl value",
            "algorithm",
            "key identifier",
            "v3 serial",
            "number",
            "cus olet",
            "encrypt cne5",
            "validity",
            "subject public",
            "key info",
            "key algorithm",
            "record type",
            "thumbprint"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 27,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Q.Vashti",
            "id": "337942",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-SHA256": 836,
            "hostname": 1001,
            "domain": 193,
            "URL": 3007,
            "FileHash-MD5": 83,
            "FileHash-SHA1": 42,
            "CIDR": 5
          },
          "indicator_count": 5167,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 137,
          "modified_text": "280 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "URL",
          "related_indicator_is_active": 1
        }
      ],
      "references": [],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": [],
          "unique_indicators": 0
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojandownloaderwin32zeagle"
          ],
          "industries": [],
          "unique_indicators": 5376
        }
      }
    },
    "false_positive": [],
    "alexa": "http://www.alexa.com/siteinfo/touchstoneimaging.com",
    "whois": "http://whois.domaintools.com/touchstoneimaging.com",
    "domain": "touchstoneimaging.com",
    "hostname": "www.touchstoneimaging.com"
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 2,
  "pulses": [
    {
      "id": "684ba9cdc900a3d86b2d45ad",
      "name": "Porn library @ Imaging Center - Advesarial",
      "description": "Actually a major issue , there are more invasive problems found. More research needed.\nAnybody?",
      "modified": "2025-07-13T04:04:28.476000",
      "created": "2025-06-13T04:32:13.936000",
      "tags": [
        "url https",
        "url http",
        "ipv4",
        "domain",
        "filehashsha256",
        "czechia",
        "united kingdom",
        "france",
        "united",
        "search",
        "learn",
        "ck id",
        "name tactics",
        "suspicious",
        "informative",
        "command",
        "adversaries",
        "spawns",
        "mitre att",
        "ck techniques",
        "ipv6",
        "type indicator",
        "role title",
        "added active",
        "related pulses",
        "zeagle",
        "porn",
        "members",
        "phishing",
        "entries",
        "copy md5",
        "copy sha1",
        "copy sha256",
        "sha1",
        "sha256",
        "size",
        "pattern match",
        "ascii text",
        "null",
        "span",
        "error",
        "body",
        "june",
        "hybrid",
        "local",
        "path",
        "encrypt",
        "click",
        "date",
        "strings",
        "refresh",
        "tools",
        "virus",
        "domains",
        "hashes",
        "cyberpunk 2077",
        "porn host",
        "playboy"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "TrojanDownloaderWin32Zeagle",
          "display_name": "TrojanDownloaderWin32Zeagle",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1057",
          "name": "Process Discovery",
          "display_name": "T1057 - Process Discovery"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1480",
          "name": "Execution Guardrails",
          "display_name": "T1480 - Execution Guardrails"
        },
        {
          "id": "T1553",
          "name": "Subvert Trust Controls",
          "display_name": "T1553 - Subvert Trust Controls"
        },
        {
          "id": "T1583",
          "name": "Acquire Infrastructure",
          "display_name": "T1583 - Acquire Infrastructure"
        },
        {
          "id": "T1113",
          "name": "Screen Capture",
          "display_name": "T1113 - Screen Capture"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 31,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "URL": 92,
        "FileHash-MD5": 45,
        "domain": 15,
        "hostname": 55,
        "FileHash-SHA256": 138,
        "FileHash-SHA1": 49,
        "SSLCertFingerprint": 2
      },
      "indicator_count": 396,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "280 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    },
    {
      "id": "684b932fcbcc577471a28c8a",
      "name": "Imaging Center Malware, Virus other manipulations",
      "description": "IMO Serious!  Virus, Trojans, potential cams? PHI , PII access. Super concerning potential manipulation , imaging, reports., records, billing\nis manipulated.\nMore research necessary.\nTrue potential for manipulation \nof x-ray , ct scan dosing.\nExcessive Adult content:\ncdn1-thumbs.pornhost.com | \ncdn28.eporncam.com | \t\ncdn35.thotporn.tv | \ncdnst7.pornburst.xxx | \nmcdns.vrporn.com |\nURL\nhttps://c845a1577e.mjedge.net/contents/videos_screenshots/3979000/3979719/preview.jpg&tbnid=rLNgRtn9SIlcgM&vet=10CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH..i&imgrefurl=https:/it.vikiporn.com/videos/3979719/horror-porn-the-dark-side-of-the-woods/&docid=tVU1jbsRquWQLM&w=1920&h=1080&itg=1&q=horror porn&ved=0CAwQ1JoKKARqFwoTCIjlsv7v0Y0DFQAAAAAdAAAAABAH |\nhttps://cdn1-thumbs.pornhost.com/0/2/0235809321/001_150_112.jpg | \n\u2022 Den:Variant.Application.Bundler.Ludus.1\n\u2022 PUABundler:Win32/YandexBundled\n\u2022 Adware.Win32.DownWare.cl\n\u2022 pua:Win32/Catalina\n\u2022W32.AIDetectMalware\n* Why is my OTX account blocked from features",
      "modified": "2025-07-13T02:05:19.612000",
      "created": "2025-06-13T02:55:42.562000",
      "tags": [
        "united",
        "asn16509",
        "amazon02",
        "frankfurt",
        "main",
        "germany",
        "asn60068",
        "cdn77 datacamp",
        "limited",
        "browsing",
        "reverse dns",
        "protocol h2",
        "security tls",
        "general full",
        "url https",
        "resource",
        "hash",
        "software",
        "dalles",
        "june",
        "de indicators",
        "domains",
        "hashes",
        "verified",
        "ecdsa",
        "linux x8664",
        "khtml",
        "gecko",
        "aes256gcm",
        "veryhigh",
        "patch",
        "accept",
        "encrypt",
        "cookie",
        "sticky",
        "aaaa",
        "cname",
        "ttl value",
        "algorithm",
        "key identifier",
        "v3 serial",
        "number",
        "cus olet",
        "encrypt cne5",
        "validity",
        "subject public",
        "key info",
        "key algorithm",
        "record type",
        "thumbprint"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "green",
      "cloned_from": null,
      "export_count": 27,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Q.Vashti",
        "id": "337942",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-SHA256": 836,
        "hostname": 1001,
        "domain": 193,
        "URL": 3007,
        "FileHash-MD5": 83,
        "FileHash-SHA1": 42,
        "CIDR": 5
      },
      "indicator_count": 5167,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 137,
      "modified_text": "280 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "URL",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "https://www.touchstoneimaging.com/",
    "type": "URL"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "https://www.touchstoneimaging.com/",
    "type": "URL",
    "found": false,
    "verdict": "clean",
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776628875.7353497
}