{
  "type": "Domain",
  "indicator": "linuxjournal.it",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/linuxjournal.it",
    "alexa": "http://www.alexa.com/siteinfo/linuxjournal.it",
    "indicator": "linuxjournal.it",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2259388472,
      "indicator": "linuxjournal.it",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 48,
      "pulses": [
        {
          "id": "69e4fdecc447b36cfde7bd19",
          "name": "Phishing | Apr 20, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 20, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-19T16:08:12.338000",
          "created": "2026-04-19T16:08:12.338000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "5 hours ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e3abe432171e566d251204",
          "name": "Phishing | Apr 19, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 19, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-18T16:05:56.745000",
          "created": "2026-04-18T16:05:56.745000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "1 day ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1d9cd805ecfc463bed935",
          "name": "BlackNet RAT clone credit octoseek",
          "description": "",
          "modified": "2026-04-18T00:51:09.427000",
          "created": "2026-04-17T06:57:17.378000",
          "tags": [
            "united",
            "heur",
            "bank",
            "covid19 scam",
            "anonymizer",
            "malicious site",
            "telefonica peru",
            "cyber threat",
            "proxy",
            "malware",
            "phishing",
            "zbot",
            "suppobox",
            "team",
            "trojanx",
            "service",
            "facebook",
            "win64",
            "trojan",
            "artemis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "engineering",
            "download",
            "microsoft",
            "generic",
            "union",
            "bazaloader",
            "media",
            "runescape",
            "blacklist https",
            "generic malware",
            "metro",
            "tmobile",
            "on us",
            "mls season",
            "home internet",
            "shop",
            "autopay",
            "free",
            "metro store",
            "limit",
            "pass",
            "close",
            "galaxy",
            "easy",
            "back",
            "stream",
            "find",
            "twitter",
            "intnavfnav",
            "conditions",
            "service url",
            "search live",
            "api blog",
            "docs pricing",
            "september",
            "instagram url",
            "facebook url",
            "value",
            "variables",
            "visitor object",
            "alpine object",
            "cookies",
            "taq boolean",
            "get h2",
            "kb script",
            "b xhr",
            "post h2",
            "frame",
            "b image",
            "kb image",
            "redirect chain",
            "frame c0bc",
            "kb stylesheet",
            "covid19",
            "phishing site",
            "malicious",
            "cve201711882",
            "cobalt strike",
            "squirrelwaffle",
            "pony",
            "binder",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "bambernek",
            "alexa",
            "unsafe",
            "opencandy",
            "downldr",
            "irata",
            "dbatloader",
            "vidar",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "blacknet rat",
            "stealer",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "riskware",
            "coinminer",
            "xrat",
            "swrort",
            "installcore",
            "trojanspy",
            "mbydkqdhtu0h",
            "pbiptbmvd0k4",
            "pbzpdldtg",
            "detection list",
            "glelexoputyh",
            "linkid252669",
            "s2okorbdpt2x",
            "el9km",
            "mtap2vnnnpj",
            "blacklist",
            "x22x22",
            "x22scriptx22",
            "x22dntx22",
            "date",
            "u002d2",
            "linkcode u002d",
            "srclang",
            "urllang",
            "srcurl",
            "qzid",
            "pattern match",
            "intnavtnav",
            "q0o0mahttp",
            "login",
            "windows nt",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "http traffic",
            "http",
            "suricata alerts",
            "event category",
            "description sid",
            "external",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "general",
            "file",
            "get fwlink",
            "geckohost",
            "suidm",
            "edgev1",
            "srchdafnoform",
            "srchuidv2",
            "edgesf1",
            "malware site",
            "agent",
            "exploit",
            "mimikatz",
            "quasar rat",
            "iframe",
            "beach research",
            "sgeneric",
            "static engine",
            "umbrella",
            "malware service",
            "exploit source",
            "scanning host",
            "Command and Control",
            "malicious url",
            "team malicious",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "bad traffic"
          ],
          "references": [
            "https://metro-tmo.com/",
            "Hybrid Analysis",
            "Alienvault OTX",
            "Data Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "South Africa",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:O97M/BazaLoader",
              "display_name": "TrojanDownloader:O97M/BazaLoader",
              "target": "/malware/TrojanDownloader:O97M/BazaLoader"
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Zbot",
              "display_name": "Backdoor:Win32/Zbot",
              "target": "/malware/Backdoor:Win32/Zbot"
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "Squirrelwaffle",
              "display_name": "Squirrelwaffle",
              "target": null
            },
            {
              "id": "Pony - S0453",
              "display_name": "Pony - S0453",
              "target": null
            },
            {
              "id": "TrojanDropper:VBS/Swrort",
              "display_name": "TrojanDropper:VBS/Swrort",
              "target": "/malware/TrojanDropper:VBS/Swrort"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/Metro",
              "display_name": "Virus:DOS/Metro",
              "target": "/malware/Virus:DOS/Metro"
            },
            {
              "id": "Metro",
              "display_name": "Metro",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Outbreak",
              "display_name": "Backdoor:Win32/Outbreak",
              "target": "/malware/Backdoor:Win32/Outbreak"
            },
            {
              "id": "ALF:PUA:Win32/OpenCandy",
              "display_name": "ALF:PUA:Win32/OpenCandy",
              "target": null
            },
            {
              "id": "IRATA",
              "display_name": "IRATA",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:Trojan:O97M/Emotet",
              "display_name": "ALF:Trojan:O97M/Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            }
          ],
          "attack_ids": [
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Food",
            "Gas",
            "Entertainment"
          ],
          "TLP": "white",
          "cloned_from": "650d0c66e0b02a6dde4a8b7a",
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "msudosos",
            "id": "381696",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 781,
            "FileHash-SHA256": 3085,
            "domain": 528,
            "URL": 3130,
            "CVE": 6,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368
          },
          "indicator_count": 8508,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 49,
          "modified_text": "1 day ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e2599bac8e32cdc59d710d",
          "name": "Phishing | Apr 18, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 18, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-17T16:02:35.563000",
          "created": "2026-04-17T16:02:35.563000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "2 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69e1099066d06e546e9f452f",
          "name": "Phishing | Apr 17, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 17, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-16T16:08:48.394000",
          "created": "2026-04-16T16:08:48.394000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "3 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69dfb7fdcee19d30954171fc",
          "name": "Phishing | Apr 16, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 16, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-15T16:08:28.992000",
          "created": "2026-04-15T16:08:28.992000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "4 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69de64ca735d57744b3be423",
          "name": "Phishing | Apr 15, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 15, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-14T16:01:14.927000",
          "created": "2026-04-14T16:01:14.927000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "5 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69dd772a89cf0b18745ad9a5",
          "name": "Phishing | Apr 14, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 14, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-13T23:07:22.349000",
          "created": "2026-04-13T23:07:22.349000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "5 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69dd088448163e9a666d021a",
          "name": "Phishing | Apr 14, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 14, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-13T15:15:16.152000",
          "created": "2026-04-13T15:15:16.152000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "6 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69dbb5e743f7f0fb5c3897b0",
          "name": "Phishing | Apr 13, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 13, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-12T15:10:31.587000",
          "created": "2026-04-12T15:10:31.587000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "7 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69da649c5b8dbdc7c7347d9f",
          "name": "Phishing | Apr 12, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 12, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-11T15:11:24.113000",
          "created": "2026-04-11T15:11:24.113000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "8 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d912d1b56bf1e8000adf78",
          "name": "Phishing | Apr 11, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 11, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-10T15:10:09.749000",
          "created": "2026-04-10T15:10:09.749000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "9 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d7c6771a4eceba6a8d6007",
          "name": "Phishing | Apr 10, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 10, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-09T15:32:07.741000",
          "created": "2026-04-09T15:32:07.741000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "10 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d6700ac66364274eb31c0a",
          "name": "Phishing | Apr 9, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 9, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-08T15:11:05.988000",
          "created": "2026-04-08T15:11:05.988000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "11 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d51dd1c7cb81be151dc260",
          "name": "Phishing | Apr 8, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 8, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-07T15:08:01.975000",
          "created": "2026-04-07T15:08:01.975000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 68,
          "modified_text": "12 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69d3ccdb3fa5b61533ff11dc",
          "name": "Phishing | Apr 7, 2026 | Part 138/566",
          "description": "Phishing indicators. Date: Apr 7, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-04-06T15:10:19.664000",
          "created": "2026-04-06T15:10:19.664000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1296,
            "domain": 704
          },
          "indicator_count": 2000,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "13 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69b02f8e2a4d055720a3faf3",
          "name": "Phishing | Mar 11, 2026 | Part 230/776",
          "description": "Phishing indicators. Date: Mar 11, 2026. Part 230/776. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-10T14:49:50.603000",
          "created": "2026-03-10T14:49:50.603000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1435,
            "domain": 563
          },
          "indicator_count": 1998,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "40 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aedc02c05912c5597f7459",
          "name": "Phishing | Mar 10, 2026 | Part 192/726",
          "description": "Phishing indicators. Date: Mar 10, 2026. Part 192/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-09T14:41:06.261000",
          "created": "2026-03-09T14:41:06.261000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1403,
            "domain": 595
          },
          "indicator_count": 1998,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "41 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ad88b75448e2c25461f49e",
          "name": "Phishing | Mar 9, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 9, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-08T14:33:27.379000",
          "created": "2026-03-08T14:33:27.379000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1306,
            "domain": 693
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "42 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69ac37e9dca41758892eaf18",
          "name": "Phishing | Mar 8, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 8, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-07T14:36:25.825000",
          "created": "2026-03-07T14:36:25.825000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1306,
            "domain": 693
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "43 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69aae5f252d7bc65b067d030",
          "name": "Phishing | Mar 7, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 7, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-06T14:34:26.649000",
          "created": "2026-03-06T14:34:26.649000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1307,
            "domain": 692
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "44 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a999dd6764ebb9a4452f76",
          "name": "Phishing | Mar 6, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 6, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-05T14:57:33.749000",
          "created": "2026-03-05T14:57:33.749000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1307,
            "domain": 692
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "45 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a843340ee78ce97d71ced7",
          "name": "Phishing | Mar 5, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 5, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-04T14:35:32.655000",
          "created": "2026-03-04T14:35:32.655000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1307,
            "domain": 692
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "46 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a6f051f641910ad7efea7d",
          "name": "Phishing | Mar 4, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 4, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-03T14:29:37.121000",
          "created": "2026-03-03T14:29:37.121000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1307,
            "domain": 692
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "47 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a5b639955a36450ed08c25",
          "name": "Phishing | Mar 3, 2026 | Part 193/726",
          "description": "Phishing indicators. Date: Mar 3, 2026. Part 193/726. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-02T16:09:29.229000",
          "created": "2026-03-02T16:09:29.229000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1307,
            "domain": 692
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "48 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a5146523feaa4621d62f42",
          "name": "Phishing | Mar 2, 2026 | Part 194/729",
          "description": "Phishing indicators. Date: Mar 2, 2026. Part 194/729. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-02T04:39:01.664000",
          "created": "2026-03-02T04:39:01.664000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1313,
            "domain": 686
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "48 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a440eb5563c3b9862b9e16",
          "name": "Phishing | Mar 2, 2026 | Part 196/732",
          "description": "Phishing indicators. Date: Mar 2, 2026. Part 196/732. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-01T13:36:43.221000",
          "created": "2026-03-01T13:36:43.221000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1299,
            "domain": 700
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "49 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a406abada3754077c35480",
          "name": "Phishing | Mar 1, 2026 | Part 196/732",
          "description": "Phishing indicators. Date: Mar 1, 2026. Part 196/732. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-01T09:28:11.131000",
          "created": "2026-03-01T09:28:11.131000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1299,
            "domain": 700
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "49 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69a38516741e4cb3ac8fc279",
          "name": "Phishing | Mar 1, 2026 | Part 196/733",
          "description": "Phishing indicators. Date: Mar 1, 2026. Part 196/733. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-03-01T00:15:18.642000",
          "created": "2026-03-01T00:15:18.642000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 612,
            "hostname": 1386
          },
          "indicator_count": 1998,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "49 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6997fbdaf396136d5a27c5ee",
          "name": "Phishing | Feb 20, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 20, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-20T06:14:50.254000",
          "created": "2026-02-20T06:14:50.254000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "58 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6997697cfd354d52a8ddc17a",
          "name": "Phishing | Feb 20, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 20, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-19T19:50:20.091000",
          "created": "2026-02-19T19:50:20.091000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "59 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69972a51a5441be7f3a6fe12",
          "name": "Phishing | Feb 20, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 20, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-19T15:20:49.485000",
          "created": "2026-02-19T15:20:49.485000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 1,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "59 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69970b0e885c96d2488a4fbc",
          "name": "Phishing | Feb 19, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 19, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-19T13:07:26.140000",
          "created": "2026-02-19T13:07:26.140000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "59 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "699634d85d1a7cb2bfb7b2d9",
          "name": "Phishing | Feb 19, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 19, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-18T21:53:28.527000",
          "created": "2026-02-18T21:53:28.527000",
          "tags": [
            "phishing"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "59 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "699575c26d3d4d979d9f067a",
          "name": "Phishing | Feb 18, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 18, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-18T08:18:10.697000",
          "created": "2026-02-18T08:18:10.697000",
          "tags": [
            "phishing",
            "threatfox",
            "phishing-database"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "60 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69949a2ad613710b19efdf6e",
          "name": "Phishing | Feb 18, 2026 | Part 198/735",
          "description": "Phishing indicators. Date: Feb 18, 2026. Part 198/735. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-17T16:41:14.772000",
          "created": "2026-02-17T16:41:14.772000",
          "tags": [
            "phishing",
            "phishing-database",
            "threatfox"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1300,
            "domain": 699
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "61 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6992984d62a5bcc18dbed5f7",
          "name": "Phishing | Feb 16, 2026 | Part 201/741",
          "description": "Phishing indicators. Date: Feb 16, 2026. Part 201/741. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-16T04:08:45.570000",
          "created": "2026-02-16T04:08:45.570000",
          "tags": [
            "phishing",
            "phishing-database",
            "threatfox"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1289,
            "domain": 710
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "62 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69915900a22d01fe16012f0e",
          "name": "Phishing | Feb 15, 2026 | Part 204/749",
          "description": "Phishing indicators. Date: Feb 15, 2026. Part 204/749. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-15T05:26:24.705000",
          "created": "2026-02-15T05:26:24.705000",
          "tags": [
            "phishing",
            "threatfox",
            "phishing-database"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 585,
            "hostname": 1413
          },
          "indicator_count": 1998,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "63 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "69908a71fdf900a5ede823ed",
          "name": "Phishing | Feb 15, 2026 | Part 207/754",
          "description": "Phishing indicators. Date: Feb 15, 2026. Part 207/754. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-14T14:45:05.241000",
          "created": "2026-02-14T14:45:05.241000",
          "tags": [
            "phishing",
            "phishing-database"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 765,
            "hostname": 1234
          },
          "indicator_count": 1999,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "64 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "698c5ccb38f21344db620d7d",
          "name": "Phishing | Feb 11, 2026 | Part 227/783",
          "description": "Phishing indicators. Date: Feb 11, 2026. Part 227/783. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-11T10:41:15.393000",
          "created": "2026-02-11T10:41:15.393000",
          "tags": [
            "phishing",
            "phishing-database"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 1444,
            "domain": 554
          },
          "indicator_count": 1998,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 66,
          "modified_text": "67 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6981a9dcbe28873a4263ebec",
          "name": "Phishing | 2026-01-31 | Part 61/163",
          "description": "Phishing indicators. Date: 2026-01-31. Part 61/163. For more threat intelligence visit https://ltna.com.au/cyber",
          "modified": "2026-02-03T07:55:08.935000",
          "created": "2026-02-03T07:55:08.935000",
          "tags": [
            "phishing",
            "phishing-database"
          ],
          "references": [
            "https://ltna.com.au/cyber"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "LTNA-Australia",
            "id": "380633",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 3169,
            "hostname": 6829
          },
          "indicator_count": 9998,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 67,
          "modified_text": "75 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5cb329096398f3411f4",
          "name": "Virus:DOS/Metro",
          "description": "",
          "modified": "2023-12-06T16:48:11.311000",
          "created": "2023-12-06T16:48:11.311000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-SHA256": 3085,
            "hostname": 780,
            "domain": 527,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368,
            "URL": 3128
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5ba6d66424b1992092e",
          "name": "BlackNet RAT",
          "description": "",
          "modified": "2023-12-06T16:47:54.897000",
          "created": "2023-12-06T16:47:54.897000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-SHA256": 3085,
            "hostname": 780,
            "domain": 527,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368,
            "URL": 3128
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 111,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6570a5b2ff4216fe9cd82624",
          "name": "Metro T-Mobile Command & Control. Cyber Threat",
          "description": "",
          "modified": "2023-12-06T16:47:46.826000",
          "created": "2023-12-06T16:47:46.826000",
          "tags": [],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "green",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "StreamMiningEx",
            "id": "262917",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "CVE": 6,
            "FileHash-SHA256": 3085,
            "hostname": 780,
            "domain": 527,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368,
            "URL": 3128
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 110,
          "modified_text": "865 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "650d0c8adc78d892cadd250a",
          "name": "Virus:DOS/Metro",
          "description": "",
          "modified": "2023-10-21T23:02:19.178000",
          "created": "2023-09-22T03:39:54.432000",
          "tags": [
            "united",
            "heur",
            "bank",
            "covid19 scam",
            "anonymizer",
            "malicious site",
            "telefonica peru",
            "cyber threat",
            "proxy",
            "malware",
            "phishing",
            "zbot",
            "suppobox",
            "team",
            "trojanx",
            "service",
            "facebook",
            "win64",
            "trojan",
            "artemis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "engineering",
            "download",
            "microsoft",
            "generic",
            "union",
            "bazaloader",
            "media",
            "runescape",
            "blacklist https",
            "generic malware",
            "metro",
            "tmobile",
            "on us",
            "mls season",
            "home internet",
            "shop",
            "autopay",
            "free",
            "metro store",
            "limit",
            "pass",
            "close",
            "galaxy",
            "easy",
            "back",
            "stream",
            "find",
            "twitter",
            "intnavfnav",
            "conditions",
            "service url",
            "search live",
            "api blog",
            "docs pricing",
            "september",
            "instagram url",
            "facebook url",
            "value",
            "variables",
            "visitor object",
            "alpine object",
            "cookies",
            "taq boolean",
            "get h2",
            "kb script",
            "b xhr",
            "post h2",
            "frame",
            "b image",
            "kb image",
            "redirect chain",
            "frame c0bc",
            "kb stylesheet",
            "covid19",
            "phishing site",
            "malicious",
            "cve201711882",
            "cobalt strike",
            "squirrelwaffle",
            "pony",
            "binder",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "bambernek",
            "alexa",
            "unsafe",
            "opencandy",
            "downldr",
            "irata",
            "dbatloader",
            "vidar",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "blacknet rat",
            "stealer",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "riskware",
            "coinminer",
            "xrat",
            "swrort",
            "installcore",
            "trojanspy",
            "mbydkqdhtu0h",
            "pbiptbmvd0k4",
            "pbzpdldtg",
            "detection list",
            "glelexoputyh",
            "linkid252669",
            "s2okorbdpt2x",
            "el9km",
            "mtap2vnnnpj",
            "blacklist",
            "x22x22",
            "x22scriptx22",
            "x22dntx22",
            "date",
            "u002d2",
            "linkcode u002d",
            "srclang",
            "urllang",
            "srcurl",
            "qzid",
            "pattern match",
            "intnavtnav",
            "q0o0mahttp",
            "login",
            "windows nt",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "http traffic",
            "http",
            "suricata alerts",
            "event category",
            "description sid",
            "external",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "general",
            "file",
            "get fwlink",
            "geckohost",
            "suidm",
            "edgev1",
            "srchdafnoform",
            "srchuidv2",
            "edgesf1",
            "malware site",
            "agent",
            "exploit",
            "mimikatz",
            "quasar rat",
            "iframe",
            "beach research",
            "sgeneric",
            "static engine",
            "umbrella",
            "malware service",
            "exploit source",
            "scanning host",
            "Command and Control",
            "malicious url",
            "team malicious",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "bad traffic"
          ],
          "references": [
            "https://metro-tmo.com/",
            "Hybrid Analysis",
            "Alienvault OTX",
            "Data Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "South Africa",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:O97M/BazaLoader",
              "display_name": "TrojanDownloader:O97M/BazaLoader",
              "target": "/malware/TrojanDownloader:O97M/BazaLoader"
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Zbot",
              "display_name": "Backdoor:Win32/Zbot",
              "target": "/malware/Backdoor:Win32/Zbot"
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "Squirrelwaffle",
              "display_name": "Squirrelwaffle",
              "target": null
            },
            {
              "id": "Pony - S0453",
              "display_name": "Pony - S0453",
              "target": null
            },
            {
              "id": "TrojanDropper:VBS/Swrort",
              "display_name": "TrojanDropper:VBS/Swrort",
              "target": "/malware/TrojanDropper:VBS/Swrort"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/Metro",
              "display_name": "Virus:DOS/Metro",
              "target": "/malware/Virus:DOS/Metro"
            },
            {
              "id": "Metro",
              "display_name": "Metro",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Outbreak",
              "display_name": "Backdoor:Win32/Outbreak",
              "target": "/malware/Backdoor:Win32/Outbreak"
            },
            {
              "id": "ALF:PUA:Win32/OpenCandy",
              "display_name": "ALF:PUA:Win32/OpenCandy",
              "target": null
            },
            {
              "id": "IRATA",
              "display_name": "IRATA",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:Trojan:O97M/Emotet",
              "display_name": "ALF:Trojan:O97M/Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            }
          ],
          "attack_ids": [
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Food",
            "Gas",
            "Entertainment"
          ],
          "TLP": "white",
          "cloned_from": "650d0c66e0b02a6dde4a8b7a",
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 780,
            "FileHash-SHA256": 3085,
            "domain": 527,
            "URL": 3128,
            "CVE": 6,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 221,
          "modified_text": "910 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "650d0c66e0b02a6dde4a8b7a",
          "name": "BlackNet RAT",
          "description": "",
          "modified": "2023-10-21T23:02:19.178000",
          "created": "2023-09-22T03:39:18.306000",
          "tags": [
            "united",
            "heur",
            "bank",
            "covid19 scam",
            "anonymizer",
            "malicious site",
            "telefonica peru",
            "cyber threat",
            "proxy",
            "malware",
            "phishing",
            "zbot",
            "suppobox",
            "team",
            "trojanx",
            "service",
            "facebook",
            "win64",
            "trojan",
            "artemis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "engineering",
            "download",
            "microsoft",
            "generic",
            "union",
            "bazaloader",
            "media",
            "runescape",
            "blacklist https",
            "generic malware",
            "metro",
            "tmobile",
            "on us",
            "mls season",
            "home internet",
            "shop",
            "autopay",
            "free",
            "metro store",
            "limit",
            "pass",
            "close",
            "galaxy",
            "easy",
            "back",
            "stream",
            "find",
            "twitter",
            "intnavfnav",
            "conditions",
            "service url",
            "search live",
            "api blog",
            "docs pricing",
            "september",
            "instagram url",
            "facebook url",
            "value",
            "variables",
            "visitor object",
            "alpine object",
            "cookies",
            "taq boolean",
            "get h2",
            "kb script",
            "b xhr",
            "post h2",
            "frame",
            "b image",
            "kb image",
            "redirect chain",
            "frame c0bc",
            "kb stylesheet",
            "covid19",
            "phishing site",
            "malicious",
            "cve201711882",
            "cobalt strike",
            "squirrelwaffle",
            "pony",
            "binder",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "bambernek",
            "alexa",
            "unsafe",
            "opencandy",
            "downldr",
            "irata",
            "dbatloader",
            "vidar",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "blacknet rat",
            "stealer",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "riskware",
            "coinminer",
            "xrat",
            "swrort",
            "installcore",
            "trojanspy",
            "mbydkqdhtu0h",
            "pbiptbmvd0k4",
            "pbzpdldtg",
            "detection list",
            "glelexoputyh",
            "linkid252669",
            "s2okorbdpt2x",
            "el9km",
            "mtap2vnnnpj",
            "blacklist",
            "x22x22",
            "x22scriptx22",
            "x22dntx22",
            "date",
            "u002d2",
            "linkcode u002d",
            "srclang",
            "urllang",
            "srcurl",
            "qzid",
            "pattern match",
            "intnavtnav",
            "q0o0mahttp",
            "login",
            "windows nt",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "http traffic",
            "http",
            "suricata alerts",
            "event category",
            "description sid",
            "external",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "general",
            "file",
            "get fwlink",
            "geckohost",
            "suidm",
            "edgev1",
            "srchdafnoform",
            "srchuidv2",
            "edgesf1",
            "malware site",
            "agent",
            "exploit",
            "mimikatz",
            "quasar rat",
            "iframe",
            "beach research",
            "sgeneric",
            "static engine",
            "umbrella",
            "malware service",
            "exploit source",
            "scanning host",
            "Command and Control",
            "malicious url",
            "team malicious",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "bad traffic"
          ],
          "references": [
            "https://metro-tmo.com/",
            "Hybrid Analysis",
            "Alienvault OTX",
            "Data Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "South Africa",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:O97M/BazaLoader",
              "display_name": "TrojanDownloader:O97M/BazaLoader",
              "target": "/malware/TrojanDownloader:O97M/BazaLoader"
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Zbot",
              "display_name": "Backdoor:Win32/Zbot",
              "target": "/malware/Backdoor:Win32/Zbot"
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "Squirrelwaffle",
              "display_name": "Squirrelwaffle",
              "target": null
            },
            {
              "id": "Pony - S0453",
              "display_name": "Pony - S0453",
              "target": null
            },
            {
              "id": "TrojanDropper:VBS/Swrort",
              "display_name": "TrojanDropper:VBS/Swrort",
              "target": "/malware/TrojanDropper:VBS/Swrort"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/Metro",
              "display_name": "Virus:DOS/Metro",
              "target": "/malware/Virus:DOS/Metro"
            },
            {
              "id": "Metro",
              "display_name": "Metro",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Outbreak",
              "display_name": "Backdoor:Win32/Outbreak",
              "target": "/malware/Backdoor:Win32/Outbreak"
            },
            {
              "id": "ALF:PUA:Win32/OpenCandy",
              "display_name": "ALF:PUA:Win32/OpenCandy",
              "target": null
            },
            {
              "id": "IRATA",
              "display_name": "IRATA",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:Trojan:O97M/Emotet",
              "display_name": "ALF:Trojan:O97M/Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            }
          ],
          "attack_ids": [
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Food",
            "Gas",
            "Entertainment"
          ],
          "TLP": "white",
          "cloned_from": "650d0c39523aa8a52fdb1fa1",
          "export_count": 41,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 780,
            "FileHash-SHA256": 3085,
            "domain": 527,
            "URL": 3128,
            "CVE": 6,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 219,
          "modified_text": "910 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "650d0c39523aa8a52fdb1fa1",
          "name": "Metro T-Mobile Command & Control. Cyber Threat",
          "description": "",
          "modified": "2023-10-21T23:02:19.178000",
          "created": "2023-09-22T03:38:33.405000",
          "tags": [
            "united",
            "heur",
            "bank",
            "covid19 scam",
            "anonymizer",
            "malicious site",
            "telefonica peru",
            "cyber threat",
            "proxy",
            "malware",
            "phishing",
            "zbot",
            "suppobox",
            "team",
            "trojanx",
            "service",
            "facebook",
            "win64",
            "trojan",
            "artemis",
            "cisco umbrella",
            "site",
            "alexa top",
            "million",
            "safe site",
            "engineering",
            "download",
            "microsoft",
            "generic",
            "union",
            "bazaloader",
            "media",
            "runescape",
            "blacklist https",
            "generic malware",
            "metro",
            "tmobile",
            "on us",
            "mls season",
            "home internet",
            "shop",
            "autopay",
            "free",
            "metro store",
            "limit",
            "pass",
            "close",
            "galaxy",
            "easy",
            "back",
            "stream",
            "find",
            "twitter",
            "intnavfnav",
            "conditions",
            "service url",
            "search live",
            "api blog",
            "docs pricing",
            "september",
            "instagram url",
            "facebook url",
            "value",
            "variables",
            "visitor object",
            "alpine object",
            "cookies",
            "taq boolean",
            "get h2",
            "kb script",
            "b xhr",
            "post h2",
            "frame",
            "b image",
            "kb image",
            "redirect chain",
            "frame c0bc",
            "kb stylesheet",
            "covid19",
            "phishing site",
            "malicious",
            "cve201711882",
            "cobalt strike",
            "squirrelwaffle",
            "pony",
            "binder",
            "virut",
            "ramnit",
            "dropper",
            "formbook",
            "azorult",
            "bambernek",
            "alexa",
            "unsafe",
            "opencandy",
            "downldr",
            "irata",
            "dbatloader",
            "vidar",
            "outbreak",
            "downloader",
            "blocker",
            "ransom",
            "autoit",
            "bladabindi",
            "emotet",
            "blacknet rat",
            "stealer",
            "presenoker",
            "fusioncore",
            "cleaner",
            "wacatac",
            "riskware",
            "coinminer",
            "xrat",
            "swrort",
            "installcore",
            "trojanspy",
            "mbydkqdhtu0h",
            "pbiptbmvd0k4",
            "pbzpdldtg",
            "detection list",
            "glelexoputyh",
            "linkid252669",
            "s2okorbdpt2x",
            "el9km",
            "mtap2vnnnpj",
            "blacklist",
            "x22x22",
            "x22scriptx22",
            "x22dntx22",
            "date",
            "u002d2",
            "linkcode u002d",
            "srclang",
            "urllang",
            "srcurl",
            "qzid",
            "pattern match",
            "intnavtnav",
            "q0o0mahttp",
            "login",
            "windows nt",
            "bad traffic",
            "et info",
            "tls handshake",
            "failure",
            "http traffic",
            "http",
            "suricata alerts",
            "event category",
            "description sid",
            "external",
            "logo",
            "av detection",
            "default browser",
            "guest system",
            "professional",
            "general",
            "file",
            "get fwlink",
            "geckohost",
            "suidm",
            "edgev1",
            "srchdafnoform",
            "srchuidv2",
            "edgesf1",
            "malware site",
            "agent",
            "exploit",
            "mimikatz",
            "quasar rat",
            "iframe",
            "beach research",
            "sgeneric",
            "static engine",
            "umbrella",
            "malware service",
            "exploit source",
            "scanning host",
            "Command and Control",
            "malicious url",
            "team malicious",
            "tor known",
            "tor relayrouter",
            "exit",
            "node tcp",
            "traffic",
            "bad traffic"
          ],
          "references": [
            "https://metro-tmo.com/",
            "Hybrid Analysis",
            "Alienvault OTX",
            "Data Analysis"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [
            "United States of America",
            "South Africa",
            "Japan"
          ],
          "malware_families": [
            {
              "id": "TrojanDownloader:O97M/BazaLoader",
              "display_name": "TrojanDownloader:O97M/BazaLoader",
              "target": "/malware/TrojanDownloader:O97M/BazaLoader"
            },
            {
              "id": "SuppoBox",
              "display_name": "SuppoBox",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Zbot",
              "display_name": "Backdoor:Win32/Zbot",
              "target": "/malware/Backdoor:Win32/Zbot"
            },
            {
              "id": "Maltiverse",
              "display_name": "Maltiverse",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "Beach Research",
              "display_name": "Beach Research",
              "target": null
            },
            {
              "id": "BlackNET RAT",
              "display_name": "BlackNET RAT",
              "target": null
            },
            {
              "id": "Backdoor:MSIL/Bladabindi",
              "display_name": "Backdoor:MSIL/Bladabindi",
              "target": "/malware/Backdoor:MSIL/Bladabindi"
            },
            {
              "id": "FormBook",
              "display_name": "FormBook",
              "target": null
            },
            {
              "id": "MimiKatz",
              "display_name": "MimiKatz",
              "target": null
            },
            {
              "id": "Squirrelwaffle",
              "display_name": "Squirrelwaffle",
              "target": null
            },
            {
              "id": "Pony - S0453",
              "display_name": "Pony - S0453",
              "target": null
            },
            {
              "id": "TrojanDropper:VBS/Swrort",
              "display_name": "TrojanDropper:VBS/Swrort",
              "target": "/malware/TrojanDropper:VBS/Swrort"
            },
            {
              "id": "Quasar RAT",
              "display_name": "Quasar RAT",
              "target": null
            },
            {
              "id": "Virus:DOS/Metro",
              "display_name": "Virus:DOS/Metro",
              "target": "/malware/Virus:DOS/Metro"
            },
            {
              "id": "Metro",
              "display_name": "Metro",
              "target": null
            },
            {
              "id": "Virut",
              "display_name": "Virut",
              "target": null
            },
            {
              "id": "Vidar",
              "display_name": "Vidar",
              "target": null
            },
            {
              "id": "AZORult",
              "display_name": "AZORult",
              "target": null
            },
            {
              "id": "Ramnit",
              "display_name": "Ramnit",
              "target": null
            },
            {
              "id": "Backdoor:Win32/Outbreak",
              "display_name": "Backdoor:Win32/Outbreak",
              "target": "/malware/Backdoor:Win32/Outbreak"
            },
            {
              "id": "ALF:PUA:Win32/OpenCandy",
              "display_name": "ALF:PUA:Win32/OpenCandy",
              "target": null
            },
            {
              "id": "IRATA",
              "display_name": "IRATA",
              "target": null
            },
            {
              "id": "Artemis",
              "display_name": "Artemis",
              "target": null
            },
            {
              "id": "Cobalt Strike - S0154",
              "display_name": "Cobalt Strike - S0154",
              "target": null
            },
            {
              "id": "ALF:PUA:Win32/FusionCore",
              "display_name": "ALF:PUA:Win32/FusionCore",
              "target": null
            },
            {
              "id": "ALF:Trojan:O97M/Emotet",
              "display_name": "ALF:Trojan:O97M/Emotet",
              "target": null
            },
            {
              "id": "Trojan:Win32/InstallCore",
              "display_name": "Trojan:Win32/InstallCore",
              "target": "/malware/Trojan:Win32/InstallCore"
            }
          ],
          "attack_ids": [
            {
              "id": "T1550",
              "name": "Use Alternate Authentication Material",
              "display_name": "T1550 - Use Alternate Authentication Material"
            },
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1027",
              "name": "Obfuscated Files or Information",
              "display_name": "T1027 - Obfuscated Files or Information"
            },
            {
              "id": "T1059.007",
              "name": "JavaScript",
              "display_name": "T1059.007 - JavaScript"
            },
            {
              "id": "T1071",
              "name": "Application Layer Protocol",
              "display_name": "T1071 - Application Layer Protocol"
            },
            {
              "id": "T1071.004",
              "name": "DNS",
              "display_name": "T1071.004 - DNS"
            },
            {
              "id": "T1071.003",
              "name": "Mail Protocols",
              "display_name": "T1071.003 - Mail Protocols"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1105",
              "name": "Ingress Tool Transfer",
              "display_name": "T1105 - Ingress Tool Transfer"
            },
            {
              "id": "T1560",
              "name": "Archive Collected Data",
              "display_name": "T1560 - Archive Collected Data"
            }
          ],
          "industries": [
            "Food",
            "Gas",
            "Entertainment"
          ],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 40,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "OctoSeek",
            "id": "243548",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_243548/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "hostname": 780,
            "FileHash-SHA256": 3085,
            "domain": 527,
            "URL": 3128,
            "CVE": 6,
            "FileHash-MD5": 610,
            "FileHash-SHA1": 368
          },
          "indicator_count": 8504,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 218,
          "modified_text": "910 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6507e71385d966429fb82783",
          "name": "NEW Phishing Links Discovered 2023-09-18",
          "description": "",
          "modified": "2023-10-18T05:00:18.068000",
          "created": "2023-09-18T05:58:43.467000",
          "tags": [
            "sign",
            "search",
            "github",
            "strong",
            "code issues",
            "pull",
            "browse",
            "sast",
            "skip",
            "product actions",
            "star",
            "footer"
          ],
          "references": [
            "https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/8862c986106a380915d200280a11f93030152568/phishing-domains-ACTIVE.txt"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 19,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "akhanafeer",
            "id": "195327",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 33,
            "FileHash-SHA1": 1,
            "URL": 1,
            "domain": 50140,
            "hostname": 7669
          },
          "indicator_count": 57844,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 81,
          "modified_text": "914 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "https://ltna.com.au/cyber",
        "https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/8862c986106a380915d200280a11f93030152568/phishing-domains-ACTIVE.txt",
        "Hybrid Analysis",
        "Alienvault OTX",
        "https://metro-tmo.com/",
        "Data Analysis"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojanspy",
            "Trojan:win32/installcore",
            "Maltiverse",
            "Artemis",
            "Trojandropper:vbs/swrort",
            "Cobalt strike - s0154",
            "Azorult",
            "Formbook",
            "Mimikatz",
            "Blacknet rat",
            "Ramnit",
            "Beach research",
            "Backdoor:win32/zbot",
            "Vidar",
            "Virut",
            "Trojandownloader:o97m/bazaloader",
            "Alf:pua:win32/opencandy",
            "Metro",
            "Backdoor:win32/outbreak",
            "Backdoor:msil/bladabindi",
            "Suppobox",
            "Pony - s0453",
            "Virus:dos/metro",
            "Quasar rat",
            "Squirrelwaffle",
            "Alf:trojan:o97m/emotet",
            "Alf:pua:win32/fusioncore",
            "Irata"
          ],
          "industries": [
            "Entertainment",
            "Food",
            "Gas"
          ]
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 48,
  "pulses": [
    {
      "id": "69e4fdecc447b36cfde7bd19",
      "name": "Phishing | Apr 20, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 20, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-19T16:08:12.338000",
      "created": "2026-04-19T16:08:12.338000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "5 hours ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e3abe432171e566d251204",
      "name": "Phishing | Apr 19, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 19, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-18T16:05:56.745000",
      "created": "2026-04-18T16:05:56.745000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "1 day ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1d9cd805ecfc463bed935",
      "name": "BlackNet RAT clone credit octoseek",
      "description": "",
      "modified": "2026-04-18T00:51:09.427000",
      "created": "2026-04-17T06:57:17.378000",
      "tags": [
        "united",
        "heur",
        "bank",
        "covid19 scam",
        "anonymizer",
        "malicious site",
        "telefonica peru",
        "cyber threat",
        "proxy",
        "malware",
        "phishing",
        "zbot",
        "suppobox",
        "team",
        "trojanx",
        "service",
        "facebook",
        "win64",
        "trojan",
        "artemis",
        "cisco umbrella",
        "site",
        "alexa top",
        "million",
        "safe site",
        "engineering",
        "download",
        "microsoft",
        "generic",
        "union",
        "bazaloader",
        "media",
        "runescape",
        "blacklist https",
        "generic malware",
        "metro",
        "tmobile",
        "on us",
        "mls season",
        "home internet",
        "shop",
        "autopay",
        "free",
        "metro store",
        "limit",
        "pass",
        "close",
        "galaxy",
        "easy",
        "back",
        "stream",
        "find",
        "twitter",
        "intnavfnav",
        "conditions",
        "service url",
        "search live",
        "api blog",
        "docs pricing",
        "september",
        "instagram url",
        "facebook url",
        "value",
        "variables",
        "visitor object",
        "alpine object",
        "cookies",
        "taq boolean",
        "get h2",
        "kb script",
        "b xhr",
        "post h2",
        "frame",
        "b image",
        "kb image",
        "redirect chain",
        "frame c0bc",
        "kb stylesheet",
        "covid19",
        "phishing site",
        "malicious",
        "cve201711882",
        "cobalt strike",
        "squirrelwaffle",
        "pony",
        "binder",
        "virut",
        "ramnit",
        "dropper",
        "formbook",
        "azorult",
        "bambernek",
        "alexa",
        "unsafe",
        "opencandy",
        "downldr",
        "irata",
        "dbatloader",
        "vidar",
        "outbreak",
        "downloader",
        "blocker",
        "ransom",
        "autoit",
        "bladabindi",
        "emotet",
        "blacknet rat",
        "stealer",
        "presenoker",
        "fusioncore",
        "cleaner",
        "wacatac",
        "riskware",
        "coinminer",
        "xrat",
        "swrort",
        "installcore",
        "trojanspy",
        "mbydkqdhtu0h",
        "pbiptbmvd0k4",
        "pbzpdldtg",
        "detection list",
        "glelexoputyh",
        "linkid252669",
        "s2okorbdpt2x",
        "el9km",
        "mtap2vnnnpj",
        "blacklist",
        "x22x22",
        "x22scriptx22",
        "x22dntx22",
        "date",
        "u002d2",
        "linkcode u002d",
        "srclang",
        "urllang",
        "srcurl",
        "qzid",
        "pattern match",
        "intnavtnav",
        "q0o0mahttp",
        "login",
        "windows nt",
        "bad traffic",
        "et info",
        "tls handshake",
        "failure",
        "http traffic",
        "http",
        "suricata alerts",
        "event category",
        "description sid",
        "external",
        "logo",
        "av detection",
        "default browser",
        "guest system",
        "professional",
        "general",
        "file",
        "get fwlink",
        "geckohost",
        "suidm",
        "edgev1",
        "srchdafnoform",
        "srchuidv2",
        "edgesf1",
        "malware site",
        "agent",
        "exploit",
        "mimikatz",
        "quasar rat",
        "iframe",
        "beach research",
        "sgeneric",
        "static engine",
        "umbrella",
        "malware service",
        "exploit source",
        "scanning host",
        "Command and Control",
        "malicious url",
        "team malicious",
        "tor known",
        "tor relayrouter",
        "exit",
        "node tcp",
        "traffic",
        "bad traffic"
      ],
      "references": [
        "https://metro-tmo.com/",
        "Hybrid Analysis",
        "Alienvault OTX",
        "Data Analysis"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [
        "United States of America",
        "South Africa",
        "Japan"
      ],
      "malware_families": [
        {
          "id": "TrojanDownloader:O97M/BazaLoader",
          "display_name": "TrojanDownloader:O97M/BazaLoader",
          "target": "/malware/TrojanDownloader:O97M/BazaLoader"
        },
        {
          "id": "SuppoBox",
          "display_name": "SuppoBox",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Zbot",
          "display_name": "Backdoor:Win32/Zbot",
          "target": "/malware/Backdoor:Win32/Zbot"
        },
        {
          "id": "Maltiverse",
          "display_name": "Maltiverse",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "Beach Research",
          "display_name": "Beach Research",
          "target": null
        },
        {
          "id": "BlackNET RAT",
          "display_name": "BlackNET RAT",
          "target": null
        },
        {
          "id": "Backdoor:MSIL/Bladabindi",
          "display_name": "Backdoor:MSIL/Bladabindi",
          "target": "/malware/Backdoor:MSIL/Bladabindi"
        },
        {
          "id": "FormBook",
          "display_name": "FormBook",
          "target": null
        },
        {
          "id": "MimiKatz",
          "display_name": "MimiKatz",
          "target": null
        },
        {
          "id": "Squirrelwaffle",
          "display_name": "Squirrelwaffle",
          "target": null
        },
        {
          "id": "Pony - S0453",
          "display_name": "Pony - S0453",
          "target": null
        },
        {
          "id": "TrojanDropper:VBS/Swrort",
          "display_name": "TrojanDropper:VBS/Swrort",
          "target": "/malware/TrojanDropper:VBS/Swrort"
        },
        {
          "id": "Quasar RAT",
          "display_name": "Quasar RAT",
          "target": null
        },
        {
          "id": "Virus:DOS/Metro",
          "display_name": "Virus:DOS/Metro",
          "target": "/malware/Virus:DOS/Metro"
        },
        {
          "id": "Metro",
          "display_name": "Metro",
          "target": null
        },
        {
          "id": "Virut",
          "display_name": "Virut",
          "target": null
        },
        {
          "id": "Vidar",
          "display_name": "Vidar",
          "target": null
        },
        {
          "id": "AZORult",
          "display_name": "AZORult",
          "target": null
        },
        {
          "id": "Ramnit",
          "display_name": "Ramnit",
          "target": null
        },
        {
          "id": "Backdoor:Win32/Outbreak",
          "display_name": "Backdoor:Win32/Outbreak",
          "target": "/malware/Backdoor:Win32/Outbreak"
        },
        {
          "id": "ALF:PUA:Win32/OpenCandy",
          "display_name": "ALF:PUA:Win32/OpenCandy",
          "target": null
        },
        {
          "id": "IRATA",
          "display_name": "IRATA",
          "target": null
        },
        {
          "id": "Artemis",
          "display_name": "Artemis",
          "target": null
        },
        {
          "id": "Cobalt Strike - S0154",
          "display_name": "Cobalt Strike - S0154",
          "target": null
        },
        {
          "id": "ALF:PUA:Win32/FusionCore",
          "display_name": "ALF:PUA:Win32/FusionCore",
          "target": null
        },
        {
          "id": "ALF:Trojan:O97M/Emotet",
          "display_name": "ALF:Trojan:O97M/Emotet",
          "target": null
        },
        {
          "id": "Trojan:Win32/InstallCore",
          "display_name": "Trojan:Win32/InstallCore",
          "target": "/malware/Trojan:Win32/InstallCore"
        }
      ],
      "attack_ids": [
        {
          "id": "T1550",
          "name": "Use Alternate Authentication Material",
          "display_name": "T1550 - Use Alternate Authentication Material"
        },
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1027",
          "name": "Obfuscated Files or Information",
          "display_name": "T1027 - Obfuscated Files or Information"
        },
        {
          "id": "T1059.007",
          "name": "JavaScript",
          "display_name": "T1059.007 - JavaScript"
        },
        {
          "id": "T1071",
          "name": "Application Layer Protocol",
          "display_name": "T1071 - Application Layer Protocol"
        },
        {
          "id": "T1071.004",
          "name": "DNS",
          "display_name": "T1071.004 - DNS"
        },
        {
          "id": "T1071.003",
          "name": "Mail Protocols",
          "display_name": "T1071.003 - Mail Protocols"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1105",
          "name": "Ingress Tool Transfer",
          "display_name": "T1105 - Ingress Tool Transfer"
        },
        {
          "id": "T1560",
          "name": "Archive Collected Data",
          "display_name": "T1560 - Archive Collected Data"
        }
      ],
      "industries": [
        "Food",
        "Gas",
        "Entertainment"
      ],
      "TLP": "white",
      "cloned_from": "650d0c66e0b02a6dde4a8b7a",
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "msudosos",
        "id": "381696",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 781,
        "FileHash-SHA256": 3085,
        "domain": 528,
        "URL": 3130,
        "CVE": 6,
        "FileHash-MD5": 610,
        "FileHash-SHA1": 368
      },
      "indicator_count": 8508,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 49,
      "modified_text": "1 day ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e2599bac8e32cdc59d710d",
      "name": "Phishing | Apr 18, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 18, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-17T16:02:35.563000",
      "created": "2026-04-17T16:02:35.563000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "2 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69e1099066d06e546e9f452f",
      "name": "Phishing | Apr 17, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 17, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-16T16:08:48.394000",
      "created": "2026-04-16T16:08:48.394000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "3 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69dfb7fdcee19d30954171fc",
      "name": "Phishing | Apr 16, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 16, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-15T16:08:28.992000",
      "created": "2026-04-15T16:08:28.992000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 66,
      "modified_text": "4 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69de64ca735d57744b3be423",
      "name": "Phishing | Apr 15, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 15, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-14T16:01:14.927000",
      "created": "2026-04-14T16:01:14.927000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "5 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69dd772a89cf0b18745ad9a5",
      "name": "Phishing | Apr 14, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 14, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-13T23:07:22.349000",
      "created": "2026-04-13T23:07:22.349000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 66,
      "modified_text": "5 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69dd088448163e9a666d021a",
      "name": "Phishing | Apr 14, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 14, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-13T15:15:16.152000",
      "created": "2026-04-13T15:15:16.152000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "6 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "69dbb5e743f7f0fb5c3897b0",
      "name": "Phishing | Apr 13, 2026 | Part 138/566",
      "description": "Phishing indicators. Date: Apr 13, 2026. Part 138/566. For more threat intelligence visit https://ltna.com.au/cyber",
      "modified": "2026-04-12T15:10:31.587000",
      "created": "2026-04-12T15:10:31.587000",
      "tags": [
        "phishing"
      ],
      "references": [
        "https://ltna.com.au/cyber"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "LTNA-Australia",
        "id": "380633",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_380633/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "hostname": 1296,
        "domain": 704
      },
      "indicator_count": 2000,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 67,
      "modified_text": "7 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "linuxjournal.it",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "linuxjournal.it",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776634653.9010432
}