{ "info": { "_postman_id": "f86db6eb-71f5-442f-8ee5-e9bd6656c459", "name": "Kenna Security API", "description": "Use steps: Update authorization tab with your API code and then proceed to the API requests you require which are grouped by function (assets, vulnerabilities, etc)\r\n\r\n*************************************************************************************************************\r\n\r\nThis is a list of API calls that can be leveraged to get the most out of the Kenna Platform. The most current documentation can be found at: https://apidocs.kennasecurity.com/reference#reference-getting-started \r\n\r\n\r\nGetting Started\r\nThis page will help you get started with Kenna Platform API.\r\n\r\n \r\nNo connector available yet for one of your security tools? No problem. You can push vulnerabilities from any external system into Kenna using our simple, secure API. Enterprise integration has never been easier.\r\n\r\nThe API is organized around REST to have predictable, resource-oriented URLs and to use HTTP response codes to indicate errors. We use HTTP verbs, which can be understood by off-the-shelf HTTP clients and libraries. The API utilizes JSON as the data exchange format.\r\n\r\nAll API calls must be made over HTTPS and be accompanied by a valid token parameter.\r\n\r\nYour Kenna API root path depends on your Kenna URL. In most cases the API root path will be https://{{API_URL}}, assuming your Kenna instance url is https://mycompany.kennasecurity.com/.\r\n\r\nIf you have an instance in the EU or in a private environment, your Kenna instance URL will include additional subdomain components, such as https://mycompany.eu.kennasecurity.com. In that case, only the instance specific hostname component (mycompany in the example)\r\nis replaced with api, so an instance with an EU address will use the EU api address of https://api.eu.kennasecurity.com/.\r\n\r\nSUGGEST EDITS\r\nAuthentication\r\n \r\nAccess to the API is controlled using a token. Every account has a token generated when the account is created.\r\n\r\nYou may locate and change your API token by logging in and clicking your company's name in the upper right hand corner. In the dropdown that appears, chose 'API Keys'. Your API token will be listed first in the table found on the applications page. You would replace in the example below with your API token.\r\n\r\nAll API requests must be made over HTTPS. Calls made over plain HTTP will fail. You must authenticate for all requests.\r\n\r\nRequests are limited to a maximum of 5 requests per second. If you exceed this limit, your request will receive a \u201c429: Too Many Requests\" status code response.\r\n\r\nSUGGEST EDITS\r\nParameters\r\n \r\nMany API methods take optional parameters. For GET requests, parameters are specified as a segment in the path. For example if you were requesting data regarding a vulnerability with an id of 100:\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/vulnerabilities/100\" -X GET\r\nFor most POST requests, parameters are encoded as JSON, with a Content-Type of 'application/json':\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" -H \"Content-Type: application/json\"\r\n https://{{API_URL}}/vulnerabilities\r\n -X POST\r\n -d '{\r\n \"vulnerability\":\r\n {\r\n \"wasc_id\" : \"WASC-01\",\r\n \"primary_locator\" : \"url\",\r\n \"url\" : \"http://www.example.com\"\r\n }\r\n }'\r\nNote: The Content-Type parameter should be omitted for specific POST request endpoints, such as the \"Upload Data File\" endpoint.\r\n\r\nLarger record sets are paginated by 500. For example, when requesting your list of vulnerabilities. To page through the record set, you pass a page parameter. Each paginated response includes meta data containing the current page and the total number of pages. Page limit is currently set to 20. Pages are 1-indexed based.\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/vulnerabilities/?page=3\" -X GET\r\nSUGGEST EDITS\r\nData Types\r\n \r\nThe API utilizes JSON as the data exchange format.\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/vulnerabilities/100\" -X GET\r\nSUGGEST EDITS\r\nErrors\r\n \r\nIn the case of an error, the appropriate HTTP status code will be returned in the response header. In addition, the response body will contain a JSON formatted description of what went wrong. The JSON will contain an error attribute, and may contain a more explanatory message attribute as well. It also includes a success attribute with a value of false.\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/assets/100\" -X PUT -d {\"priority\":\"-1\"}\r\nSUGGEST EDITS\r\nHTTP Status Codes\r\n \r\nThe following HTTP status codes are returned by the API.\r\n\r\nCode\tMeaning\r\n102\tProcessing\r\n200\tOK\r\n201\tCreated\r\n204\tNo Content\r\n400\tBad Request\r\n401\tUnauthorized\r\n404\tNot Found\r\n409\tConflict\r\n412\tPrecondition Failed\r\n422\tUnprocessable Entity\r\n429\tToo Many Requests (more than 5 per second)\r\n500\tInternal Server Error\r\nSUGGEST EDITS\r\nPagination\r\n \r\nRequests that return multiple items will be paginated to 1000 items at a time, by default. You can request further pages with the page parameter, and/or change the number of items returned with the per_page parameter. Note that page numbering is 1-based and that omitting the page parameter will return the first page.\r\n", "schema": "https://schema.getpostman.com/json/collection/v2.1.0/collection.json" }, "item": [ { "name": "Vulnerabilities ", "item": [ { "name": "List Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities" ] }, "description": "Returns a list of all of your open vulnerabilities that are associated with active assets paginated by 500 records at a time.\r\n\r\nThe response includes the current page requested as well as the total number of pages. Pagination is explained on the Parameters page. To retrieve closed vulnerabilities, you pass a \"filter\" parameter with the value \"closed\" (i.e. ?filter=closed)." }, "response": [] }, { "name": "Search Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "search" ], "query": [ { "key": "active_internet_breach[]", "value": "array of booleans", "description": "An array of booleans for filtering your vulnerabilities by those that have seen tranding breach activity.", "disabled": true }, { "key": "application_id", "value": "int32", "description": "(int32) The ID of an application to retrieve vulnerabilities for. All other search parameters are ignored if application_id is provided.\n\n", "disabled": true }, { "key": "asset_id[]", "value": "array of integers", "description": "array of integers\nSearch for all fixes related to vulnerabilities that are connected to a set of assets.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nBy default, only fixes for vulnerabilities with active assets are returned. To override this default specify the status param for an asset as shown. Status choices are active and inactive.", "disabled": true }, { "key": "classification[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified classifications.", "disabled": true }, { "key": "connector_names[]", "value": "array of strings", "description": "array of strings\nAn array of connector names related to your vulnerabilities.", "disabled": true }, { "key": "connector_types[]", "value": "array of strings", "description": "array of strings\nAn array of connector types related to your vulnerabilities.", "disabled": true }, { "key": "custom_fields:CUSTOM_FIELD_NAME[]", "value": "array of strings", "description": "array of strings\nSearch for all vulnerabilities that have a specific custom field value. The proper format for a custom field query is 'custom_fields:', then the id of the custom_field, then the name of the custom_field you are searching on, then the value you are searching for.", "disabled": true }, { "key": "easily_exploitable[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that have seen high levels of exploitation recently.", "disabled": true }, { "key": "has_known_exploits[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified known exploit related details.", "disabled": true }, { "key": "has_known_malware[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified known malware related details.vu", "disabled": true }, { "key": "id[]", "value": "int32", "description": "array of integers\nArray of vulnerability ids", "disabled": true }, { "key": "malware_exploitable[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that have had pieces of malware identified.", "disabled": true }, { "key": "max_priority", "value": "string", "description": "string\nFind all vulnerabilities on assets with priority levels less than this value.", "disabled": true }, { "key": "min_priority", "value": "string", "description": "Find all vulnerabilities on assets with priority levels greater than this value.", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nFind all vulnerabilities with risk scores less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nFind all vulnerabilities with risk scores greater than this value.\n\n", "disabled": true }, { "key": "max_rounded_risk_meter_score", "value": "int32", "description": "int32\nSimilar to max_risk_meter_score, rounded to the nearest integer.\n\n", "disabled": true }, { "key": "min_rounded_risk_meter_score", "value": "int32", "description": "int32\nSimilar to min_risk_meter_score, rounded to the nearest integer.", "disabled": true }, { "key": "max_severity", "value": "int32", "description": "Find all vulnerabilities with severity levels less than this value.", "disabled": true }, { "key": "min_severity", "value": "int32", "description": "int32\nFind all vulnerabilities with severity levels greater than this value.", "disabled": true }, { "key": "max_threat", "value": "int32", "description": "int32\nFind all vulnerabilities with threat levels less than this value.\n\n", "disabled": true }, { "key": "min_threat", "value": "int32", "description": "int32\nFind all vulnerabilities with threat levels greater than this value.\n\n", "disabled": true }, { "key": "no_vulnerability_definition_id[]", "value": "array of integers", "description": "array of integers\nExclude all vulnerabilities for the identified definition IDs.\n\n\n\n", "disabled": true }, { "key": "pci_related[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified PCI related details.", "disabled": true }, { "key": "popular_target[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that are popular targets.", "disabled": true }, { "key": "port[]", "value": "array of integers", "description": "array of integers\nAn array of ports associated with your vulnerabilities.\n\n\n\n", "disabled": true }, { "key": "predicted_exploitable[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that have been predicted to be exploited.", "disabled": true }, { "key": "prioritized[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified priority details.\n\n\n\n", "disabled": true }, { "key": "q", "value": "string", "description": "string\nAdditional text search parameters, as documented at: https://help.kennasecurity.com/hc/en-us/articles/206280593. Example q=tag:(mytag+AND+thetag).", "disabled": true }, { "key": "remote_code_execution[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified RCEs.\n\n\n\n", "disabled": true }, { "key": "search_id", "value": "int32", "description": "The ID of a risk meter group to retrieve vulnerabilities for. Other parameters are ignored if search_id is provided.\n\n", "disabled": true }, { "key": "service_ticket_status[]", "value": "array of strings", "description": "array of strings\nAn array of strings that represent the statuses of all service tickets connected to your vulnerabilities.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your vulnerabilities.\n\n\n\n", "disabled": true }, { "key": "top_exploit[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified top exploit related details.", "disabled": true }, { "key": "top_priority[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that Kenna recommends should be a top priority to fix.\n\n\n\n", "disabled": true }, { "key": "trending[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified trending related details.", "disabled": true }, { "key": "vulnerability_class[]", "value": "array of strings", "description": "array of strings\nAn array of strings describing the class of your vulnerabilities.", "disabled": true }, { "key": "vulnerability_definition_id[]", "value": "array of integers", "description": "array of integers\nFind all vulnerabilities for the identified definition IDs.", "disabled": true }, { "key": "wasc_classification[]", "value": "array of strings", "description": "array of strings\nAn array of WASC classifications related to your vulnerabilities.\n\n\n\n", "disabled": true }, { "key": "zero_day[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified zero day related details.", "disabled": true } ] }, "description": "Filters vulnerabilities by a given set of parameters and returns the filtered vulnerabilities as well as the total number of vulnerabilities in the filtered set.\r\n\r\nBy default, only open vulnerabilities with active assets are returned. Results are paginated in pages of 500. Each unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all vulnerabilities with status=[\"open\"] and port=[\"443\", \"80\"] you will receive all open vulnerabilities that have either port 443 or port 80. This is shown in the CURL example below." }, "response": [] }, { "name": "Validate Vulnerability Search Query", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/validate_search?q=string", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "validate_search" ], "query": [ { "key": "q", "value": "string", "description": "string\nThis can be any query string you want to search for, including a regex. For more detailed documentation on our search syntax visit our Help Center.\n\n" } ] }, "description": "Validate the query string portion of a vulnerability search. If the query is invalid and if the system can determine a suggested replacement, that suggestion will be returned in the response." }, "response": [] }, { "name": "Show Vulnerability", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id" ], "query": [ { "key": "", "value": null, "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "Kenna platform Vulnerability ID." } ] }, "description": "Returns a single vulnerability by ID." }, "response": [] }, { "name": "Show Scanner Vulnerability Details", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id/scanner_vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id", "scanner_vulnerabilities" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "the vulnerability ID found in Kenna when selected" } ] }, "description": "Returns an array of the scanner vulnerability details associated to a vulnerability by ID." }, "response": [] }, { "name": "Create Vulnerability", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability\": {\r\n \"asset_id\": \"\",\r\n \"cve_id\": \"\",\r\n \"cwe_id\": \"\",\r\n \"closed_at\": \"\",\r\n \"custom_fields\": \"\",\r\n \"database\": \"\",\r\n \"due_date\": \"\",\r\n \"file\": \"\",\r\n \"found_on\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"identifier\": \"\",\r\n \"ip_address\": \"\",\r\n \"jira_key\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"mac_address\": \"\",\r\n \"override_score\": \"\",\r\n \"port\": \"\",\r\n \"primary_locator\": \"\",\r\n \"prioritized\": \"false\",\r\n \"severity\": \"\",\r\n \"status\": \"open\",\r\n \"threat\": \"\",\r\n \"url\": \"\",\r\n \"wasc_id\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities" ], "query": [ { "key": "**PARMS BELOW ARE FOR \"BODY REFERENCE\"", "value": null, "description": "*****UPDATE IN BODY ONLY", "disabled": true }, { "key": "asset_id", "value": "int32", "description": "int32\nThe numeric id of an asset", "disabled": true }, { "key": "cve_id", "value": "string", "description": "string\nA National Vulnerability Database CVE identifier,", "disabled": true }, { "key": "cwe_id", "value": "string", "description": "string\nA CWE - Common Weakness Enumeration identifier\n\n", "disabled": true }, { "key": "closed_at", "value": "string", "description": "string\nThe datetime(as a UTC timestamp) to mark when a vulnerability was closed in the format (2013-09-01", "disabled": true }, { "key": "custom_fields", "value": "object", "description": "object\nCustom Fields are defined by Custom Field Definitions which can be set up in the UI for your account. When updating a vulnerability's custom fields, reference them by their custom_field_definition_id as in the example. Only ids that are present in the UPDATE request will be modified (ie: leaving out custom fields in the UPDATE request will not delete them on the server). To remove a vulnerability's custom field value, UPDATE it with an empty string. { \"777\": \"\" }", "disabled": true }, { "key": "database", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "due_date", "value": "string", "description": "string\nThe date a vulnerability needs to be fixed by.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "found_on", "value": "string", "description": "string\nThe date a vulnerability was found on.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA unique text identifier for this type of vulnerability", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "jira_key", "value": "string", "description": "string\nA JIRA ticket key to associate this vulnerability with", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string\nThe date a vulnerability was last seen on", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes on a vulnerability", "disabled": true }, { "key": "mac_address", "value": "string", "description": "Whichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "override_score", "value": "int32", "description": "int32\nAn integer (0 - 100) representing the risk score for a vulnerability. Kenna continuously updates risk scores as the threat landscape changes. If you manually override this score, the vulnerability will no longer be updated dynamically and the change will be logged for audit purposes.", "disabled": true }, { "key": "port", "value": "int32", "description": "int32\nThe port affected by the vulnerability.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary locator used for the corresponding asset. This is required to associate the vulnerability with the asset it was found on. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, or fqdn", "disabled": true }, { "key": "prioritized", "value": "boolean", "description": "boolean\nBoolean that indicates whether the vulnerability is a top priority or not.", "disabled": true }, { "key": "severity", "value": "int32", "description": "int32\nThe severity of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe status of a vulnerability (open, closed, risk_accepted, false_positive).", "disabled": true }, { "key": "threat", "value": "int32", "description": "int32\nThe threat level of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "url", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "wasc_id", "value": "string", "description": "string\nA WASC 2.0 Threat Classification ID", "disabled": true } ] }, "description": "Creates a single vulnerability and returns the record." }, "response": [] }, { "name": "Update Vulnerability ", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability\": {\r\n \"asset_id\": \"\",\r\n \"cve_id\": \"\",\r\n \"cwe_id\": \"\",\r\n \"closed_at\": \"\",\r\n \"custom_fields\": \"\",\r\n \"database\": \"\",\r\n \"due_date\": \"\",\r\n \"file\": \"\",\r\n \"found_on\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"identifier\": \"\",\r\n \"ip_address\": \"\",\r\n \"jira_key\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"mac_address\": \"\",\r\n \"override_score\": \"\",\r\n \"port\": \"\",\r\n \"primary_locator\": \"\",\r\n \"prioritized\": \"false\",\r\n \"severity\": \"\",\r\n \"status\": \"open\",\r\n \"threat\": \"\",\r\n \"url\": \"\",\r\n \"wasc_id\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id" ], "query": [ { "key": "id ****Update in Path variable below****", "value": null, "disabled": true }, { "key": "**Items below - Update in Body only", "value": "", "description": "**Items below - Update in Body only\n with vuln id found in URL when referencing the vuln \nin the Kenna Platform", "disabled": true }, { "key": "asset_id", "value": "int32", "description": "int32\nThe numeric id of an asset", "disabled": true }, { "key": "cve_id", "value": "string", "description": "string\nA National Vulnerability Database CVE identifier,", "disabled": true }, { "key": "cwe_id", "value": "string", "description": "string\nA CWE - Common Weakness Enumeration identifier\n\n", "disabled": true }, { "key": "closed_at", "value": "string", "description": "string\nThe datetime(as a UTC timestamp) to mark when a vulnerability was closed in the format (2013-09-01", "disabled": true }, { "key": "custom_fields", "value": "object", "description": "object\nCustom Fields are defined by Custom Field Definitions which can be set up in the UI for your account. When updating a vulnerability's custom fields, reference them by their custom_field_definition_id as in the example. Only ids that are present in the UPDATE request will be modified (ie: leaving out custom fields in the UPDATE request will not delete them on the server). To remove a vulnerability's custom field value, UPDATE it with an empty string. { \"777\": \"\" }", "disabled": true }, { "key": "database", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "due_date", "value": "string", "description": "string\nThe date a vulnerability needs to be fixed by.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "found_on", "value": "string", "description": "string\nThe date a vulnerability was found on.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA unique text identifier for this type of vulnerability", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "jira_key", "value": "string", "description": "string\nA JIRA ticket key to associate this vulnerability with", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string\nThe date a vulnerability was last seen on", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes on a vulnerability", "disabled": true }, { "key": "mac_address", "value": "string", "description": "Whichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "override_score", "value": "int32", "description": "int32\nAn integer (0 - 100) representing the risk score for a vulnerability. Kenna continuously updates risk scores as the threat landscape changes. If you manually override this score, the vulnerability will no longer be updated dynamically and the change will be logged for audit purposes.", "disabled": true }, { "key": "port", "value": "int32", "description": "int32\nThe port affected by the vulnerability.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary locator used for the corresponding asset. This is required to associate the vulnerability with the asset it was found on. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, or fqdn", "disabled": true }, { "key": "prioritized", "value": "boolean", "description": "boolean\nBoolean that indicates whether the vulnerability is a top priority or not.", "disabled": true }, { "key": "severity", "value": "int32", "description": "int32\nThe severity of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe status of a vulnerability (open, closed, risk_accepted, false_positive).", "disabled": true }, { "key": "threat", "value": "int32", "description": "int32\nThe threat level of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "url", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "wasc_id", "value": "string", "description": "string\nA WASC 2.0 Threat Classification ID", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32: ID of vuln found in URL when selected in Kenna" } ] }, "description": "When updating a vulnerability's custom fields, reference them by their custom_field_definition_id as in the example. Only ids that are present in the UPDATE request will be modified (ie: leaving out custom fields in the UPDATE request will not delete them on the server). To remove a vulnerability's custom field value, UPDATE it with an empty string." }, "response": [] }, { "name": "Bulk Update Vulnerabilities", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability_ids\": [\r\n \"\",\r\n \"\"\r\n ],\r\n \"vulnerability\": {\r\n \"asset_id\": \"\",\r\n \"cve_id\": \"\",\r\n \"cwe_id\": \"\",\r\n \"closed_at\": \"\",\r\n \"custom_fields\": \"\",\r\n \"database\": \"\",\r\n \"due_date\": \"\",\r\n \"file\": \"\",\r\n \"found_on\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"identifier\": \"\",\r\n \"ip_address\": \"\",\r\n \"jira_key\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"mac_address\": \"\",\r\n \"override_score\": \"\",\r\n \"port\": \"\",\r\n \"primary_locator\": \"\",\r\n \"prioritized\": \"false\",\r\n \"severity\": \"\",\r\n \"status\": \"open\",\r\n \"threat\": \"\",\r\n \"url\": \"\",\r\n \"wasc_id\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities/bulk", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "bulk" ], "query": [ { "key": "**Items below - Update in Body only", "value": null, "description": "**Items below - Update in Body only", "disabled": true }, { "key": "vulnerability_ids", "value": "[]", "description": "array of integers\nKenna IDs of all vulnerabilities to be updated", "disabled": true }, { "key": "asset_id", "value": "int32", "description": "int32\nThe numeric id of an asset", "disabled": true }, { "key": "cve_id", "value": "string", "description": "string\nA National Vulnerability Database CVE identifier,", "disabled": true }, { "key": "cwe_id", "value": "string", "description": "string\nA CWE - Common Weakness Enumeration identifier\n\n", "disabled": true }, { "key": "closed_at", "value": "string", "description": "string\nThe datetime(as a UTC timestamp) to mark when a vulnerability was closed in the format (2013-09-01", "disabled": true }, { "key": "custom_fields", "value": "object", "description": "object\nCustom Fields are defined by Custom Field Definitions which can be set up in the UI for your account. When updating a vulnerability's custom fields, reference them by their custom_field_definition_id as in the example. Only ids that are present in the UPDATE request will be modified (ie: leaving out custom fields in the UPDATE request will not delete them on the server). To remove a vulnerability's custom field value, UPDATE it with an empty string. { \"777\": \"\" }", "disabled": true }, { "key": "database", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "due_date", "value": "string", "description": "string\nThe date a vulnerability needs to be fixed by.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "found_on", "value": "string", "description": "string\nThe date a vulnerability was found on.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA unique text identifier for this type of vulnerability", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "jira_key", "value": "string", "description": "string\nA JIRA ticket key to associate this vulnerability with", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string\nThe date a vulnerability was last seen on", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes on a vulnerability", "disabled": true }, { "key": "mac_address", "value": "string", "description": "Whichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "override_score", "value": "int32", "description": "int32\nAn integer (0 - 100) representing the risk score for a vulnerability. Kenna continuously updates risk scores as the threat landscape changes. If you manually override this score, the vulnerability will no longer be updated dynamically and the change will be logged for audit purposes.", "disabled": true }, { "key": "port", "value": "int32", "description": "int32\nThe port affected by the vulnerability.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary locator used for the corresponding asset. This is required to associate the vulnerability with the asset it was found on. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, or fqdn", "disabled": true }, { "key": "prioritized", "value": "boolean", "description": "boolean\nBoolean that indicates whether the vulnerability is a top priority or not.", "disabled": true }, { "key": "severity", "value": "int32", "description": "int32\nThe severity of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe status of a vulnerability (open, closed, risk_accepted, false_positive).", "disabled": true }, { "key": "threat", "value": "int32", "description": "int32\nThe threat level of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "url", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "wasc_id", "value": "string", "description": "string\nA WASC 2.0 Threat Classification ID", "disabled": true } ] }, "description": "Update multiple vulnerabilities at a time using the bulk update endpoint. Update limit is 30,000 vulnerabilities at a time. By default we will index the vulnerabilities in the background." }, "response": [] }, { "name": "Delete Vulnerability", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id" ], "query": [ { "key": "Don't Include this line: Ref Description for path update %3D%3D>", "value": "int32", "description": "Update {{id}} in URL path above (or in variable)\n with vuln id found in URL when referencing the vuln \nin the Kenna Platform", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32: ID of the vulnerability found in the URL of the Kenna Platform after selecting." } ] }, "description": "Delete a single vulnerability by ID." }, "response": [] }, { "name": "Bulk Delete Vulnerabilities", "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability_ids\": [123, 456, 789]\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities/bulk_delete", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "bulk_delete" ], "query": [ { "key": "**Don's include this line - Update Vulns in Body**", "value": null, "description": "Obtain vuln ids from Kenna Platform url & update Body in Postman", "disabled": true } ] }, "description": "Delete multiple vulnerabilities at a time using the bulk delete endpoint. Delete limit is 2,000 vulnerabilities at a time." }, "response": [] }, { "name": "Download Zipped Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/download_data_zip", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "download_data_zip" ] }, "description": "Will return a zip file with the most recent data export of all of your vulnerabilities. In order to arrange for a daily full data export please contact our tech support staff." }, "response": [] } ], "event": [ { "listen": "prerequest", "script": { "type": "text/javascript", "exec": [ "" ] } }, { "listen": "test", "script": { "type": "text/javascript", "exec": [ "" ] } } ] }, { "name": "Assets", "item": [ { "name": "List Assets", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets" ] }, "description": "Returns a list of all of your active assets with open vulnerabilities paginated by 500 records at a time.\r\n\r\nThe response includes the current page requested as well as the total number of pages. Pagination is explained on the Parameters page. To retrieve inactive assets, you pass a \"filter\" parameter with the value \"inactive\" (i.e. ?filter=inactive)." }, "response": [ { "name": "List Assets", "originalRequest": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets" ] } }, "status": "OK", "code": 200, "_postman_previewlanguage": "json", "header": [ { "key": "Cache-Control", "value": "max-age=0, private, must-revalidate" }, { "key": "Content-Encoding", "value": "gzip" }, { "key": "Content-Type", "value": "application/json; charset=utf-8" }, { "key": "Date", "value": "Mon, 25 May 2020 23:29:09 GMT" }, { "key": "ETag", "value": "W/\"470c1b807ea5090d7afaf9bacdac152e\"" }, { "key": "Server", "value": "nginx" }, { "key": "Strict-Transport-Security", "value": "max-age=31556952; includeSubDomains" }, { "key": "X-Content-Type-Options", "value": "nosniff" }, { "key": "X-Frame-Options", "value": "SAMEORIGIN" }, { "key": "X-Rack-Cache", "value": "miss" }, { "key": "X-Request-Id", "value": "336017907214392b7b97716c82c77baa" }, { "key": "X-Runtime", "value": "0.777931" }, { "key": "X-XSS-Protection", "value": "1; mode=block" }, { "key": "transfer-encoding", "value": "chunked" }, { "key": "Connection", "value": "keep-alive" } ], "cookie": [], "body": "{\n \"assets\": [\n {\n \"id\": 9741430,\n \"created_at\": \"2017-03-16T18:59:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/install.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"JavaScript_Medium_Threat\",\n \"JavaScript\",\n \"JavaScript_Low_Visibility\",\n \"app portfolio\",\n \"test1234\",\n \"TEST12345\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741430/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/install.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741422,\n \"created_at\": \"2017-03-16T18:59:20Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/index.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"JavaScript_Medium_Threat\",\n \"JavaScript\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"app portfolio\",\n \"test1234\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741422/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/index.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741421,\n \"created_at\": \"2017-03-16T18:59:19Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/wdip.php\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:19Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741421/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/wdip.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 9741420,\n \"created_at\": \"2017-03-16T18:59:19Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/wcip.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741420/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/wcip.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741419,\n \"created_at\": \"2017-03-16T18:59:19Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/ciph.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741419/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/ciph.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741417,\n \"created_at\": \"2017-03-16T18:59:13Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/_logic.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T19:04:42Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741417/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/_logic.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741415,\n \"created_at\": \"2017-03-16T18:59:12Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/user-profile-exec.php\",\n \"vulnerabilities_count\": 11,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T19:04:55Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741415/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/user-profile-exec.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196122,\n \"name\": \"OWASP 9 (Using Components with Known Vulnerabilities)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741413,\n \"created_at\": \"2017-03-16T18:59:09Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-schemes.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741413/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-schemes.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741410,\n \"created_at\": \"2017-03-16T18:59:07Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-exceptions.php\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\",\n \"TestErie\"\n ],\n \"owner\": \"Aziz Kapadia\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741410/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-exceptions.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 209966,\n \"name\": \"Closed last 90 days\"\n },\n {\n \"id\": 189897,\n \"name\": \"External Assets Scheduled Items\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215254,\n \"name\": \"KRI3 - High Vulns remediated in last 90 days\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189946,\n \"name\": \"Exception Expiration 30 days\"\n }\n ]\n },\n {\n \"id\": 9741409,\n \"created_at\": \"2017-03-16T18:59:06Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-rules.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741409/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-rules.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741408,\n \"created_at\": \"2017-03-16T18:59:06Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-passes.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741408/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-passes.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741405,\n \"created_at\": \"2017-03-16T18:59:05Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-lots.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741405/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-lots.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741404,\n \"created_at\": \"2017-03-16T18:59:04Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/rules.php\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:43Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741404/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/rules.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741402,\n \"created_at\": \"2017-03-16T18:59:02Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/api.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:43Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741402/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/api.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741401,\n \"created_at\": \"2017-03-16T18:59:01Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/register.php\",\n \"vulnerabilities_count\": 8,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741401/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/register.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196122,\n \"name\": \"OWASP 9 (Using Components with Known Vulnerabilities)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741400,\n \"created_at\": \"2017-03-16T18:58:58Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-users.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741400/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-users.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354674,\n \"created_at\": \"2017-01-20T14:25:39Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Web.config\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_WebConfig\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354674/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Web.config\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354668,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/ShoppingCartRecord.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354668/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/ShoppingCartRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196117,\n \"name\": \"OWASP 5 (Broken Access Control)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354667,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Registration.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354667/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Registration.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354666,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/OrdersRecord.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354666/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/OrdersRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196117,\n \"name\": \"OWASP 5 (Broken Access Control)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354665,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersRecord.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354665/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354664,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MyInfo.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354664/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MyInfo.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354663,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialsRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354663/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialsRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354662,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialCatRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354662/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialCatRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354661,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CategoriesRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354661/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CategoriesRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354660,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/BookMaint.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354660/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/BookMaint.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354659,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CardTypesRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354659/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CardTypesRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354658,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CCPager.ascx\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354658/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CCPager.ascx\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 8354657,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Books.aspx\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354657/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Books.aspx\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 8354656,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersGrid.aspx\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354656/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersGrid.aspx\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 8354654,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/BookDetail.cs\",\n \"vulnerabilities_count\": 7,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354654/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/BookDetail.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196117,\n \"name\": \"OWASP 5 (Broken Access Control)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354649,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersInfo.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354649/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersInfo.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354648,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Login.cs\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:39Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354648/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Login.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354647,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/OrdersGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354647/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/OrdersGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354643,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersGrid.cs\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354643/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354640,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialsGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354640/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialsGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354636,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialCatGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354636/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialCatGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354633,\n \"created_at\": \"2017-01-20T14:25:29Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CategoriesGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354633/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CategoriesGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354631,\n \"created_at\": \"2017-01-20T14:25:29Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CardTypesGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:39Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354631/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CardTypesGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354626,\n \"created_at\": \"2017-01-20T14:25:27Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/AdminBooks.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"America\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": \"Simon\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354626/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/AdminBooks.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189983,\n \"name\": \"Tech - Simon\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354624,\n \"created_at\": \"2017-01-20T14:25:27Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/App_Code/temp/New Folder/CCUtility.cs\",\n \"vulnerabilities_count\": 7,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354624/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/App_Code/temp/New Folder/CCUtility.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 4357679,\n \"created_at\": \"2016-04-12T15:28:51Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"C:/Program Files/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/Samples/basic/php/sink.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2016-04-12T15:28:51Z\",\n \"network_ports\": [],\n \"tags\": [\n \"sample-php\",\n \"app test fortify\",\n \"App ABC\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/4357679/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"C:/Program Files/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/Samples/basic/php/sink.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 3274193,\n \"created_at\": \"2015-11-03T19:14:23Z\",\n \"priority\": 10,\n \"operating_system\": \"AXIS - Linux - Linux - 2.6)\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"10.10.3.2\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 8243659,\n \"port_number\": 123,\n \"extra_info\": null,\n \"hostname\": null,\n \"name\": null,\n \"ostype\": null,\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024555,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024556,\n \"port_number\": 23,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Telnet\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024557,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024558,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [\n \"PCI\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3274193/vulnerabilities\"\n },\n \"ip_address\": \"10.10.3.2\",\n \"database\": null,\n \"hostname\": \"10.10.3.2\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": \"56394653\",\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 3273443,\n \"created_at\": \"2015-11-03T19:08:01Z\",\n \"priority\": 10,\n \"operating_system\": \"AXIS - Linux - Linux - 2.6)\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"10.10.3.1\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 8242657,\n \"port_number\": 123,\n \"extra_info\": null,\n \"hostname\": null,\n \"name\": null,\n \"ostype\": null,\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024513,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024514,\n \"port_number\": 23,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Telnet\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024515,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024516,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [\n \"Not Win\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3273443/vulnerabilities\"\n },\n \"ip_address\": \"10.10.3.1\",\n \"database\": null,\n \"hostname\": \"10.10.3.1\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": \"56362630\",\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189997,\n \"name\": \"Non-Windows\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 3253303,\n \"created_at\": \"2015-11-02T19:10:56Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 R2 (Service Pack 2, Server, SQL Server, [++])\",\n \"notes\": \"\",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"192.46.26.9\",\n \"vulnerabilities_count\": 257,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:10:56Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\",\n \"DMZ Servers\",\n \"Sharepoint\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3253303/vulnerabilities\"\n },\n \"ip_address\": \"192.46.26.9\",\n \"database\": null,\n \"hostname\": \"192.46.26.9\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"http://testphp.vulnweb.com/\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189960,\n \"name\": \"Web Application (testphp)\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189981,\n \"name\": \"zSharepoint Exceptions - Approved\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3251925,\n \"created_at\": \"2015-11-02T19:08:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 (Service Pack 2, Server, [++])\",\n \"notes\": \"\",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.219.51\",\n \"vulnerabilities_count\": 17,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:08:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"Juniper\",\n \"app portfolio\",\n \"Bitsight\"\n ],\n \"owner\": \"Dave\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3251925/vulnerabilities\"\n },\n \"ip_address\": \"156.81.219.51\",\n \"database\": null,\n \"hostname\": \"156.81.219.51\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"Test PHP\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189973,\n \"name\": \"Bitsight\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3251001,\n \"created_at\": \"2015-11-02T19:07:18Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2008 (Service Pack 2, Server, [++])\",\n \"notes\": \"6/7/18 RJE Test Note \",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.217.141\",\n \"vulnerabilities_count\": 487,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:07:18Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\",\n \"DMZ Servers\",\n \"Bitsight\",\n \"Sharepoint\"\n ],\n \"owner\": \"Rich Eicher\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3251001/vulnerabilities\"\n },\n \"ip_address\": \"156.81.217.141\",\n \"database\": null,\n \"hostname\": \"156.81.217.141\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"WebGoat\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189973,\n \"name\": \"Bitsight\"\n },\n {\n \"id\": 189981,\n \"name\": \"zSharepoint Exceptions - Approved\"\n },\n {\n \"id\": 189984,\n \"name\": \"WebGoat Systems\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 190013,\n \"name\": \"Web Goat\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3250991,\n \"created_at\": \"2015-11-02T19:07:17Z\",\n \"priority\": 9,\n \"operating_system\": \"Windows Server 2008 (Service Pack 1, Server, SQL Server, [++])\",\n \"notes\": \"this is a version test - notes - RJE\\r\\ntest two - overwritten? \",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.219.54\",\n \"vulnerabilities_count\": 515,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:07:17Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3250991/vulnerabilities\"\n },\n \"ip_address\": \"156.81.219.54\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3249506,\n \"created_at\": \"2015-11-02T19:05:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2008 (Service Pack 2, Server, [++])\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.249.197\",\n \"vulnerabilities_count\": 538,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:05:21Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\",\n \"DMZ Servers\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3249506/vulnerabilities\"\n },\n \"ip_address\": \"156.81.249.197\",\n \"database\": null,\n \"hostname\": \"156.81.249.197\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3248899,\n \"created_at\": \"2015-11-02T19:04:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 (Service Pack 2, Server, [++])\",\n \"notes\": \"Test ABC App\",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"169.225.178.56\",\n \"vulnerabilities_count\": 642,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:04:35Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"Bank\",\n \"app portfolio\",\n \"DMZ Servers\",\n \"Office 3\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3248899/vulnerabilities\"\n },\n \"ip_address\": \"169.225.178.56\",\n \"database\": null,\n \"hostname\": \"169.225.178.56\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"Webgoat\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3248853,\n \"created_at\": \"2015-11-02T19:04:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 (Service Pack 2, Server, [++])\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"169.225.176.34\",\n \"vulnerabilities_count\": 579,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:04:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"Bank\",\n \"app portfolio\",\n \"DMZ Servers\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3248853/vulnerabilities\"\n },\n \"ip_address\": \"169.225.176.34\",\n \"database\": null,\n \"hostname\": \"169.225.176.34\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 18323888,\n \"created_at\": \"2020-03-08T03:36:08Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows 10 Pro 64 bit Edition Version 1903\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"netbios\",\n \"locator\": \"DENDESKTOP\",\n \"vulnerabilities_count\": 17,\n \"status\": \"active\",\n \"last_seen_time\": \"2020-05-23T19:42:48Z\",\n \"network_ports\": [],\n \"tags\": [\n \"Cloud Agent\",\n \"\",\n \"Test_vh\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323888/vulnerabilities\"\n },\n \"ip_address\": \"192.168.1.121\",\n \"database\": null,\n \"hostname\": \"dendesktop\",\n \"fqdn\": null,\n \"netbios\": \"DENDESKTOP\",\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": \"89091038\",\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 189939,\n \"name\": \"QG- Force\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 209966,\n \"name\": \"Closed last 90 days\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 214834,\n \"name\": \"qualys\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215254,\n \"name\": \"KRI3 - High Vulns remediated in last 90 days\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215422,\n \"name\": \"Cloud Agent Test - SB\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189901,\n \"name\": \"PCI Network Vulns\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221524,\n \"name\": \"Cloud Agents\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 18323886,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Debian - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.28\",\n \"vulnerabilities_count\": 75,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042983,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Symantec Mail Security for SMTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042984,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042985,\n \"port_number\": 143,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAP\",\n \"ostype\": \"\",\n \"product\": \"Dovecot\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042986,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042987,\n \"port_number\": 465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042988,\n \"port_number\": 995,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"POPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042989,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.16\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323886/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.28\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323885,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Debian - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.29\",\n \"vulnerabilities_count\": 59,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042971,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.5p1\"\n },\n {\n \"id\": 239042972,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.4.1\"\n },\n {\n \"id\": 239042973,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n },\n {\n \"id\": 239042974,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323885/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.29\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323884,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Debian - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.27\",\n \"vulnerabilities_count\": 75,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042975,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042976,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042977,\n \"port_number\": 143,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAP\",\n \"ostype\": \"\",\n \"product\": \"Dovecot\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042978,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042979,\n \"port_number\": 465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042980,\n \"port_number\": 993,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042981,\n \"port_number\": 995,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"POPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042982,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.16\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323884/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.27\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323883,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.26\",\n \"vulnerabilities_count\": 28,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042963,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Symantec Mail Security for SMTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042964,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042965,\n \"port_number\": 143,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042966,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042967,\n \"port_number\": 465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042968,\n \"port_number\": 993,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042969,\n \"port_number\": 995,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"POPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042970,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323883/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.26\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323880,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.21\",\n \"vulnerabilities_count\": 28,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042960,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042961,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042962,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323880/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.21\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323875,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.22\",\n \"vulnerabilities_count\": 28,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042957,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.4.2\"\n },\n {\n \"id\": 239042958,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.4.2\"\n },\n {\n \"id\": 239042959,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323875/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.22\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323858,\n \"created_at\": \"2019-11-05T15:38:59Z\",\n \"priority\": 10,\n \"operating_system\": \"HP - embedded - embedded\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.223.32\",\n \"vulnerabilities_count\": 10,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042874,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323858/vulnerabilities\"\n },\n \"ip_address\": \"63.245.223.32\",\n \"database\": null,\n \"hostname\": \"api-dev.community.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18323840,\n \"created_at\": \"2019-11-05T15:38:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.221.128\",\n \"vulnerabilities_count\": 84,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042848,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042849,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323840/vulnerabilities\"\n },\n \"ip_address\": \"63.245.221.128\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323832,\n \"created_at\": \"2019-11-05T15:38:58Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D48564584838\",\n \"vulnerabilities_count\": 359,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042831,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042832,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": \"BIND\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6\"\n },\n {\n \"id\": 239042833,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042834,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042835,\n \"port_number\": 41740,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042836,\n \"port_number\": 41967,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323832/vulnerabilities\"\n },\n \"ip_address\": \"63.245.218.9\",\n \"database\": null,\n \"hostname\": \"ns2b.pubdmz.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D48564584838\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323829,\n \"created_at\": \"2019-11-05T15:38:58Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D48564560438\",\n \"vulnerabilities_count\": 359,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042816,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042817,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": \"BIND\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6\"\n },\n {\n \"id\": 239042818,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042819,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042820,\n \"port_number\": 46441,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042821,\n \"port_number\": 53697,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323829/vulnerabilities\"\n },\n \"ip_address\": \"63.245.218.8\",\n \"database\": null,\n \"hostname\": \"ns2a.pubdmz.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D48564560438\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323828,\n \"created_at\": \"2019-11-05T15:38:58Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.218.7\",\n \"vulnerabilities_count\": 359,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042822,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042823,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": \"BIND\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6\"\n },\n {\n \"id\": 239042824,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042825,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042826,\n \"port_number\": 46441,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042827,\n \"port_number\": 53697,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323828/vulnerabilities\"\n },\n \"ip_address\": \"63.245.218.7\",\n \"database\": null,\n \"hostname\": \"ns2.acmeinc.org\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323827,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CFC\",\n \"vulnerabilities_count\": 90,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042798,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042799,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042800,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042801,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042802,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323827/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.223\",\n \"database\": null,\n \"hostname\": \"zlb5.ops.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CFC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323825,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CF6\",\n \"vulnerabilities_count\": 90,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042793,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042794,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042795,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042796,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042797,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323825/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.222\",\n \"database\": null,\n \"hostname\": \"zlb4.ops.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CF6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323823,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CDA\",\n \"vulnerabilities_count\": 90,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042783,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042784,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042785,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042786,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042787,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323823/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.221\",\n \"database\": null,\n \"hostname\": \"zlb3.ops.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CDA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323822,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD4513A2\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042780,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042781,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042782,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323822/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.218\",\n \"database\": null,\n \"hostname\": \"pp-zlb12.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD4513A2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323821,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CC8\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042788,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042789,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042790,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042791,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042792,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323821/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.217\",\n \"database\": null,\n \"hostname\": \"pp-zlb11.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CC8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323820,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CF0\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042775,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042776,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042777,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042778,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042779,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323820/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.215\",\n \"database\": null,\n \"hostname\": \"pp-zlb09.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CF0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323819,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CA4\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042770,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042771,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042772,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042773,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042774,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323819/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.216\",\n \"database\": null,\n \"hostname\": \"pp-zlb10.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CA4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323818,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CA6\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042744,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042745,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042746,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042747,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042748,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323818/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.214\",\n \"database\": null,\n \"hostname\": \"pp-zlb08.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CA6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323817,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.7\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"3C4A92DD0CB0\",\n \"vulnerabilities_count\": 168,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042759,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239042760,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042761,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042762,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042763,\n \"port_number\": 742,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042764,\n \"port_number\": 745,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323817/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.210\",\n \"database\": null,\n \"hostname\": \"pp-zlb06.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"3C4A92DD0CB0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323814,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.7\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"F4CE467EDFD0\",\n \"vulnerabilities_count\": 168,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042749,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239042750,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042751,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042752,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042753,\n \"port_number\": 871,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042754,\n \"port_number\": 874,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323814/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.204\",\n \"database\": null,\n \"hostname\": \"pp-zlb05.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"F4CE467EDFD0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323659,\n \"created_at\": \"2019-11-05T15:38:55Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.215.85\",\n \"vulnerabilities_count\": 32,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042144,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323659/vulnerabilities\"\n },\n \"ip_address\": \"63.245.215.85\",\n \"database\": null,\n \"hostname\": \"tableau-portal-zlb.vips.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18323616,\n \"created_at\": \"2019-11-05T15:38:54Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.8\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.215.43\",\n \"vulnerabilities_count\": 96,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042062,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323616/vulnerabilities\"\n },\n \"ip_address\": \"63.245.215.43\",\n \"database\": null,\n \"hostname\": \"cvs-rw-zlb.vips.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323588,\n \"created_at\": \"2019-11-05T15:38:54Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.214.124\",\n \"vulnerabilities_count\": 240,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042068,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323588/vulnerabilities\"\n },\n \"ip_address\": \"63.245.214.124\",\n \"database\": null,\n \"hostname\": \"vpn1.releng.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323561,\n \"created_at\": \"2019-11-05T15:38:52Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"001321AED2D8\",\n \"vulnerabilities_count\": 27,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239041938,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239041939,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041940,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041941,\n \"port_number\": 793,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041942,\n \"port_number\": 796,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041943,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323561/vulnerabilities\"\n },\n \"ip_address\": \"63.245.208.5\",\n \"database\": null,\n \"hostname\": \"boris.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"001321AED2D8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323421,\n \"created_at\": \"2019-11-05T15:38:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"000C297B283C\",\n \"vulnerabilities_count\": 273,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239041233,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239041234,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041235,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239041236,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041237,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323421/vulnerabilities\"\n },\n \"ip_address\": \"10.24.75.42\",\n \"database\": null,\n \"hostname\": \"nagios1.private.pek1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"000C297B283C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323368,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04D5\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040742,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323368/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.202\",\n \"database\": null,\n \"hostname\": \"logstash1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04D5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323365,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04CB\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040736,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040737,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040738,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323365/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.189\",\n \"database\": null,\n \"hostname\": \"nuxeo1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04CB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323364,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04D1\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040727,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323364/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.198\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04D1\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323360,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04C6\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040721,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323360/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.170\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04C6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323359,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04CA\",\n \"vulnerabilities_count\": 60,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040716,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040717,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040718,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323359/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.188\",\n \"database\": null,\n \"hostname\": \"razuna2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04CA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323358,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04F5\",\n \"vulnerabilities_count\": 67,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040709,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040710,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323358/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.190\",\n \"database\": null,\n \"hostname\": \"study1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04F5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323355,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04C1\",\n \"vulnerabilities_count\": 69,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040714,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040715,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323355/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.166\",\n \"database\": null,\n \"hostname\": \"assets2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04C1\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323350,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04BA\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040696,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323350/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.161\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04BA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323349,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04BD\",\n \"vulnerabilities_count\": 119,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040707,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040708,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323349/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.163\",\n \"database\": null,\n \"hostname\": \"festival3.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04BD\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323348,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04F8\",\n \"vulnerabilities_count\": 119,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040698,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040699,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323348/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.164\",\n \"database\": null,\n \"hostname\": \"festival4.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04F8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323346,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04B2\",\n \"vulnerabilities_count\": 164,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040705,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040706,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323346/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.154\",\n \"database\": null,\n \"hostname\": \"source-prod1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04B2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323345,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04B6\",\n \"vulnerabilities_count\": 268,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040694,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323345/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.158\",\n \"database\": null,\n \"hostname\": \"rhipe-build-centos6-1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04B6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18323343,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04B0\",\n \"vulnerabilities_count\": 197,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040690,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040691,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323343/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.152\",\n \"database\": null,\n \"hostname\": \"source-dev1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04B0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323335,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"linkdrop1.vm.labs.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 49,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040671,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239040672,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239040673,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040674,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040675,\n \"port_number\": 837,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040676,\n \"port_number\": 840,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040677,\n \"port_number\": 873,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Rsync\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323335/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.145\",\n \"database\": null,\n \"hostname\": \"linkdrop1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18323332,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04A4\",\n \"vulnerabilities_count\": 68,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040660,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040661,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [\n \"test1234\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323332/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.140\",\n \"database\": null,\n \"hostname\": \"static-www1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04A4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323331,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04A2\",\n \"vulnerabilities_count\": 102,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040680,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040681,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323331/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.138\",\n \"database\": null,\n \"hostname\": \"sumomo-web1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04A2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323329,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E046F\",\n \"vulnerabilities_count\": 201,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040657,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040658,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239040659,\n \"port_number\": 12345,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Thin\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2.11\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323329/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.136\",\n \"database\": null,\n \"hostname\": \"vcap-dea1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E046F\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323319,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0481\",\n \"vulnerabilities_count\": 71,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040625,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040626,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040627,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Winstone Servlet Engine v0.9.10\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323319/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.117\",\n \"database\": null,\n \"hostname\": \"butler1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0481\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323313,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0475\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040613,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040614,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323313/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.105\",\n \"database\": null,\n \"hostname\": \"teachwebmaking-prod1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0475\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323307,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E046D\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040608,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040609,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323307/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.97\",\n \"database\": null,\n \"hostname\": \"vidly.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E046D\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323304,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E045B\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040610,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040611,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323304/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.79\",\n \"database\": null,\n \"hostname\": \"webfwd2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E045B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323293,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E044D\",\n \"vulnerabilities_count\": 122,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040591,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040592,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323293/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.65\",\n \"database\": null,\n \"hostname\": \"festival2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E044D\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323292,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0448\",\n \"vulnerabilities_count\": 123,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040598,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040599,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323292/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.60\",\n \"database\": null,\n \"hostname\": \"festival1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0448\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323291,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E044B\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040596,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040597,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323291/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.63\",\n \"database\": null,\n \"hostname\": \"webfwd-stage1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E044B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323284,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0424\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040574,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040575,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239040576,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323284/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.36\",\n \"database\": null,\n \"hostname\": \"resourcespace1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0424\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323282,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0423\",\n \"vulnerabilities_count\": 177,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040558,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323282/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.35\",\n \"database\": null,\n \"hostname\": \"razuna1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0423\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323235,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04EB\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040449,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040450,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040451,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040452,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323235/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.97\",\n \"database\": null,\n \"hostname\": \"gradient3.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04EB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323233,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04E9\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040422,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040423,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323233/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.95\",\n \"database\": null,\n \"hostname\": \"gradient1.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04E9\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323232,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04BF\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040417,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040418,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323232/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.90\",\n \"database\": null,\n \"hostname\": \"tiffin1.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04BF\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323229,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04E5\",\n \"vulnerabilities_count\": 54,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040411,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323229/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.69\",\n \"database\": null,\n \"hostname\": \"logstash1.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04E5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323228,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04EA\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040412,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040413,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040414,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040415,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323228/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.96\",\n \"database\": null,\n \"hostname\": \"gradient2.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04EA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323196,\n \"created_at\": \"2019-11-05T15:38:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2917\",\n \"vulnerabilities_count\": 285,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040371,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040372,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Winstone Servlet Engine v0.9.10\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323196/vulnerabilities\"\n },\n \"ip_address\": \"10.22.92.150\",\n \"database\": null,\n \"hostname\": \"jenkins1.sec.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2917\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323193,\n \"created_at\": \"2019-11-05T15:38:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D741018\",\n \"vulnerabilities_count\": 91,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040308,\n \"port_number\": 21,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"FTP\",\n \"ostype\": \"\",\n \"product\": \"vsFTPd\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.3.5\"\n },\n {\n \"id\": 239040309,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n },\n {\n \"id\": 239040310,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Postfix\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040311,\n \"port_number\": 5432,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Postgres\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040312,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040313,\n \"port_number\": 6000,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"XWindows\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040314,\n \"port_number\": 8081,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"SimpleHTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"0.6\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323193/vulnerabilities\"\n },\n \"ip_address\": \"10.22.92.147\",\n \"database\": null,\n \"hostname\": \"fuzzer-linux4.sec.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D741018\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323190,\n \"created_at\": \"2019-11-05T15:38:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D73FC80\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040280,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n },\n {\n \"id\": 239040281,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Postfix\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040282,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040283,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040284,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040285,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040286,\n \"port_number\": 2200,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"6.1p1\"\n },\n {\n \"id\": 239040287,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239040288,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239040289,\n \"port_number\": 35343,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040290,\n \"port_number\": 37522,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040291,\n \"port_number\": 38615,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040292,\n \"port_number\": 47144,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040293,\n \"port_number\": 50153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040294,\n \"port_number\": 52070,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040295,\n \"port_number\": 53336,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040296,\n \"port_number\": 57181,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040297,\n \"port_number\": 57923,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040298,\n \"port_number\": 58333,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323190/vulnerabilities\"\n },\n \"ip_address\": \"10.22.92.145\",\n \"database\": null,\n \"hostname\": \"fuzzer-linux2.sec.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D73FC80\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323134,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299370012\",\n \"vulnerabilities_count\": 184,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039949,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039950,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039951,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323134/vulnerabilities\"\n },\n \"ip_address\": \"10.22.83.41\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.builder.addons.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299370012\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323129,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299368103\",\n \"vulnerabilities_count\": 153,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039931,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039932,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039933,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323129/vulnerabilities\"\n },\n \"ip_address\": \"10.22.83.40\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.builder.addons.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299368103\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323125,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26BE\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039928,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039929,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039930,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323125/vulnerabilities\"\n },\n \"ip_address\": \"10.22.82.44\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.bugs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26BE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323124,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26BF\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039883,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039884,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039885,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323124/vulnerabilities\"\n },\n \"ip_address\": \"10.22.82.45\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.bugs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26BF\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323123,\n \"created_at\": \"2019-11-05T15:38:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26BD\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039905,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039906,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039907,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323123/vulnerabilities\"\n },\n \"ip_address\": \"10.22.82.43\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.bugs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26BD\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323116,\n \"created_at\": \"2019-11-05T15:38:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.6\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DBC\",\n \"vulnerabilities_count\": 276,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039934,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039935,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039936,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039937,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039938,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039939,\n \"port_number\": 926,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039940,\n \"port_number\": 929,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039941,\n \"port_number\": 964,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039942,\n \"port_number\": 967,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039943,\n \"port_number\": 996,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039944,\n \"port_number\": 999,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039945,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039946,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039947,\n \"port_number\": 32957,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039948,\n \"port_number\": 43696,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323116/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DBC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18323092,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB631B\",\n \"vulnerabilities_count\": 143,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039644,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239039645,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039646,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039647,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039648,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039649,\n \"port_number\": 797,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039650,\n \"port_number\": 800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039651,\n \"port_number\": 803,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039652,\n \"port_number\": 806,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039653,\n \"port_number\": 843,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039654,\n \"port_number\": 846,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039655,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039656,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039657,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239039658,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239039659,\n \"port_number\": 35074,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039660,\n \"port_number\": 54465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323092/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.140\",\n \"database\": null,\n \"hostname\": \"oldstage2.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB631B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323087,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056971EF7\",\n \"vulnerabilities_count\": 511,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039805,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039806,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039807,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039808,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039809,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039810,\n \"port_number\": 933,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039811,\n \"port_number\": 936,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039812,\n \"port_number\": 961,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039813,\n \"port_number\": 964,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039814,\n \"port_number\": 1004,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039815,\n \"port_number\": 1007,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039816,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039817,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039818,\n \"port_number\": 35064,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039819,\n \"port_number\": 38153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323087/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.135\",\n \"database\": null,\n \"hostname\": \"acmeinc-eu.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056971EF7\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323082,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E04\",\n \"vulnerabilities_count\": 331,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039698,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039699,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039700,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039701,\n \"port_number\": 893,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039702,\n \"port_number\": 896,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039703,\n \"port_number\": 988,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039704,\n \"port_number\": 991,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039705,\n \"port_number\": 1016,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039706,\n \"port_number\": 1019,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039707,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039708,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039709,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039710,\n \"port_number\": 44975,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039711,\n \"port_number\": 48722,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323082/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.132\",\n \"database\": null,\n \"hostname\": \"amoforums1.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E04\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323081,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E1C\",\n \"vulnerabilities_count\": 53,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039557,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239039558,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039559,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n },\n {\n \"id\": 239039560,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039561,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039562,\n \"port_number\": 760,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039563,\n \"port_number\": 763,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039564,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323081/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.134\",\n \"database\": null,\n \"hostname\": \"verbatim1.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E1C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323077,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"80C16E7959E0\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039584,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039585,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039586,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323077/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.100\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"80C16E7959E0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323075,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAF5518\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039524,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039525,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039526,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323075/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.104\",\n \"database\": null,\n \"hostname\": \"elasticsearch5.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAF5518\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323073,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAF0520\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039544,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039545,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039546,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323073/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.102\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAF0520\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323072,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAE2B70\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039547,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039548,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039549,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323072/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.101\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAE2B70\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323070,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAF5568\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039446,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039447,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039448,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323070/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.103\",\n \"database\": null,\n \"hostname\": \"elasticsearch4.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAF5568\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323046,\n \"created_at\": \"2019-11-05T15:38:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.6\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DBB\",\n \"vulnerabilities_count\": 276,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039295,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039296,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039297,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039298,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039299,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039300,\n \"port_number\": 926,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039301,\n \"port_number\": 929,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039302,\n \"port_number\": 964,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039303,\n \"port_number\": 967,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039304,\n \"port_number\": 996,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039305,\n \"port_number\": 999,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039306,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039307,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039308,\n \"port_number\": 32957,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039309,\n \"port_number\": 43696,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323046/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.35\",\n \"database\": null,\n \"hostname\": \"mrapp4.stage.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DBB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18323030,\n \"created_at\": \"2019-11-05T15:38:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490772\",\n \"vulnerabilities_count\": 182,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039038,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039039,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239039040,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323030/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.127\",\n \"database\": null,\n \"hostname\": \"node63.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490772\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323029,\n \"created_at\": \"2019-11-05T15:38:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490762\",\n \"vulnerabilities_count\": 182,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039041,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039042,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239039043,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323029/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.126\",\n \"database\": null,\n \"hostname\": \"node62.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490762\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323022,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490702\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039011,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323022/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.120\",\n \"database\": null,\n \"hostname\": \"node56.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490702\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323021,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490672\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039014,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323021/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.119\",\n \"database\": null,\n \"hostname\": \"node55.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490672\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323020,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490722\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039007,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323020/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.122\",\n \"database\": null,\n \"hostname\": \"node58.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490722\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323019,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490712\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039002,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323019/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.121\",\n \"database\": null,\n \"hostname\": \"node57.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490712\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323018,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490662\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039004,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323018/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.118\",\n \"database\": null,\n \"hostname\": \"node54.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490662\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323015,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490622\",\n \"vulnerabilities_count\": 207,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039001,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323015/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.114\",\n \"database\": null,\n \"hostname\": \"node50.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490622\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323014,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490632\",\n \"vulnerabilities_count\": 207,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038999,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323014/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.115\",\n \"database\": null,\n \"hostname\": \"node51.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490632\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323013,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490612\",\n \"vulnerabilities_count\": 178,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038998,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323013/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.113\",\n \"database\": null,\n \"hostname\": \"node49.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490612\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323010,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490602\",\n \"vulnerabilities_count\": 178,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038996,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323010/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.112\",\n \"database\": null,\n \"hostname\": \"node48.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490602\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323005,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490512\",\n \"vulnerabilities_count\": 180,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038989,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038990,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323005/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.105\",\n \"database\": null,\n \"hostname\": \"node41.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490512\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323004,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490502\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038988,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323004/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.104\",\n \"database\": null,\n \"hostname\": \"node40.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490502\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323003,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490472\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038987,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323003/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.103\",\n \"database\": null,\n \"hostname\": \"node39.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490472\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323002,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490462\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038986,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323002/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.102\",\n \"database\": null,\n \"hostname\": \"node38.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490462\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323001,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490452\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038985,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323001/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.101\",\n \"database\": null,\n \"hostname\": \"node37.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490452\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323000,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490442\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038983,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323000/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.100\",\n \"database\": null,\n \"hostname\": \"node36.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490442\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322999,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490432\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038981,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322999/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.99\",\n \"database\": null,\n \"hostname\": \"node35.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490432\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322998,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490422\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038982,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322998/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.98\",\n \"database\": null,\n \"hostname\": \"node34.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490422\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322997,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490412\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038984,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322997/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.97\",\n \"database\": null,\n \"hostname\": \"node33.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490412\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322996,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490402\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038978,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322996/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.96\",\n \"database\": null,\n \"hostname\": \"node32.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490402\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322995,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490372\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038980,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322995/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.95\",\n \"database\": null,\n \"hostname\": \"node31.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490372\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322994,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490362\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038979,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322994/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.94\",\n \"database\": null,\n \"hostname\": \"node30.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490362\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322993,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490352\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038976,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322993/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.93\",\n \"database\": null,\n \"hostname\": \"node29.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490352\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322992,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490342\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038977,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322992/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.92\",\n \"database\": null,\n \"hostname\": \"node28.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490342\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322991,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490332\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038975,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322991/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.91\",\n \"database\": null,\n \"hostname\": \"node27.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490332\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322990,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490322\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038973,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322990/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.90\",\n \"database\": null,\n \"hostname\": \"node26.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490322\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322989,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490312\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038972,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322989/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.89\",\n \"database\": null,\n \"hostname\": \"node25.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490312\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322988,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490272\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038974,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322988/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.87\",\n \"database\": null,\n \"hostname\": \"node23.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490272\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322987,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490302\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038971,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322987/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.88\",\n \"database\": null,\n \"hostname\": \"node24.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490302\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322986,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490262\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038968,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322986/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.86\",\n \"database\": null,\n \"hostname\": \"node22.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490262\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322985,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490242\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038969,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322985/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.84\",\n \"database\": null,\n \"hostname\": \"node20.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490242\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322984,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490232\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038970,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322984/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.83\",\n \"database\": null,\n \"hostname\": \"node19.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490232\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322983,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490252\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038967,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322983/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.85\",\n \"database\": null,\n \"hostname\": \"node21.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490252\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322982,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490202\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038966,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322982/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.80\",\n \"database\": null,\n \"hostname\": \"node16.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490202\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322981,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490222\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038963,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322981/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.82\",\n \"database\": null,\n \"hostname\": \"node18.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490222\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322980,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490212\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038965,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322980/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.81\",\n \"database\": null,\n \"hostname\": \"node17.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490212\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322979,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490172\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038964,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322979/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.79\",\n \"database\": null,\n \"hostname\": \"node15.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490172\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322978,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490162\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038962,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322978/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.78\",\n \"database\": null,\n \"hostname\": \"node14.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490162\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322977,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490152\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038961,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322977/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.77\",\n \"database\": null,\n \"hostname\": \"node13.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490152\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322976,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490132\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038960,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322976/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.75\",\n \"database\": null,\n \"hostname\": \"node11.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490132\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322975,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490142\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038957,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322975/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.76\",\n \"database\": null,\n \"hostname\": \"node12.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490142\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322974,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490112\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038956,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322974/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.73\",\n \"database\": null,\n \"hostname\": \"node9.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490112\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322973,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490102\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038946,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322973/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.72\",\n \"database\": null,\n \"hostname\": \"node8.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490102\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322972,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490122\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038958,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322972/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.74\",\n \"database\": null,\n \"hostname\": \"node10.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490122\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322971,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490072\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038959,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322971/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.71\",\n \"database\": null,\n \"hostname\": \"node7.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490072\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322970,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490062\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038937,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322970/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.70\",\n \"database\": null,\n \"hostname\": \"node6.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490062\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322969,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490022\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038939,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322969/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.66\",\n \"database\": null,\n \"hostname\": \"node2.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490022\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322968,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490052\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038938,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322968/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.69\",\n \"database\": null,\n \"hostname\": \"node5.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490052\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322967,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490042\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038936,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322967/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.68\",\n \"database\": null,\n \"hostname\": \"node4.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490042\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322966,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490032\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038934,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322966/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.67\",\n \"database\": null,\n \"hostname\": \"node3.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490032\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322965,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490002\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038935,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322965/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.64\",\n \"database\": null,\n \"hostname\": \"node0.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490002\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322964,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490012\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038933,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322964/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.65\",\n \"database\": null,\n \"hostname\": \"node1.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490012\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322963,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"VMware - VMware ESX/ESXi - VMware ESX Server - 4.1.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.22.75.250\",\n \"vulnerabilities_count\": 255,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038940,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038941,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038942,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038943,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239038944,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239038945,\n \"port_number\": 5989,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"sfcb\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322963/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.250\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18322960,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows Server 2008 R2, Standard Edition - SP1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"BYOB-KEYMASTER1\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038919,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038920,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038921,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038922,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038923,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038924,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038925,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038926,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038927,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322960/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.240\",\n \"database\": null,\n \"hostname\": \"BYOB-KEYMASTER1\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18322958,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DC2\",\n \"vulnerabilities_count\": 575,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038947,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038948,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038949,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038950,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038951,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038952,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038953,\n \"port_number\": 873,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Rsync\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038954,\n \"port_number\": 898,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038955,\n \"port_number\": 901,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322958/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.204\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DC2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322944,\n \"created_at\": \"2019-11-05T15:38:30Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00237DA4D29C\",\n \"vulnerabilities_count\": 87,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038842,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038843,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038844,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038845,\n \"port_number\": 769,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038846,\n \"port_number\": 772,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038847,\n \"port_number\": 778,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038848,\n \"port_number\": 781,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038849,\n \"port_number\": 815,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038850,\n \"port_number\": 818,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038851,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038852,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038853,\n \"port_number\": 36535,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038854,\n \"port_number\": 51910,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322944/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.143\",\n \"database\": null,\n \"hostname\": \"backup2.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00237DA4D29C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322941,\n \"created_at\": \"2019-11-05T15:38:30Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB3A27\",\n \"vulnerabilities_count\": 284,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038906,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322941/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.140\",\n \"database\": null,\n \"hostname\": \"gads1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB3A27\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322933,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.6\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"001B78986474\",\n \"vulnerabilities_count\": 368,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038877,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038878,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038879,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038880,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038881,\n \"port_number\": 601,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038882,\n \"port_number\": 873,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Rsync\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038883,\n \"port_number\": 946,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038884,\n \"port_number\": 949,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038885,\n \"port_number\": 985,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038886,\n \"port_number\": 988,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038887,\n \"port_number\": 1022,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038888,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038889,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038890,\n \"port_number\": 9999,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038891,\n \"port_number\": 47888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038892,\n \"port_number\": 57223,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322933/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.130\",\n \"database\": null,\n \"hostname\": \"mradm02.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"001B78986474\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18322931,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"AXIS - Linux - Linux - 2.6)\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"as-logger1.private.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038760,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038761,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322931/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.131\",\n \"database\": null,\n \"hostname\": \"as-logger1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322927,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E83935BD0994\",\n \"vulnerabilities_count\": 360,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038765,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038766,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038767,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038768,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038769,\n \"port_number\": 514,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Remote Shell\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038770,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038771,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Jetty\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.0.5.v20130815\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322927/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.126\",\n \"database\": null,\n \"hostname\": \"netops1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E83935BD0994\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322921,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26A0\",\n \"vulnerabilities_count\": 80,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038744,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038745,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038746,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038747,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038748,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038749,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322921/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.111\",\n \"database\": null,\n \"hostname\": \"graphite2.dev.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26A0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322918,\n \"created_at\": \"2019-11-05T15:38:28Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB292A\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038719,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n },\n {\n \"id\": 239038720,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n },\n {\n \"id\": 239038721,\n \"port_number\": 514,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Remote Shell\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322918/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.99\",\n \"database\": null,\n \"hostname\": \"nsmserver1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB292A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322908,\n \"created_at\": \"2019-11-05T15:38:28Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB62F2\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038704,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038705,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038706,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038707,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038708,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038709,\n \"port_number\": 737,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038710,\n \"port_number\": 740,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038711,\n \"port_number\": 769,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038712,\n \"port_number\": 772,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038713,\n \"port_number\": 777,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038714,\n \"port_number\": 780,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038715,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038716,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038717,\n \"port_number\": 34472,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038718,\n \"port_number\": 52263,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322908/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.77\",\n \"database\": null,\n \"hostname\": \"sentry1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB62F2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322904,\n \"created_at\": \"2019-11-05T15:38:28Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"F4CE4689B708\",\n \"vulnerabilities_count\": 192,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038648,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038649,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038650,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038651,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038652,\n \"port_number\": 788,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038653,\n \"port_number\": 791,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322904/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.74\",\n \"database\": null,\n \"hostname\": \"tufin1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"F4CE4689B708\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322901,\n \"created_at\": \"2019-11-05T15:38:27Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.7\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E43\",\n \"vulnerabilities_count\": 263,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038659,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038660,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038661,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038662,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038663,\n \"port_number\": 623,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038664,\n \"port_number\": 626,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322901/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.67\",\n \"database\": null,\n \"hostname\": \"virusscan1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E43\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322900,\n \"created_at\": \"2019-11-05T15:38:27Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.8\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DB6\",\n \"vulnerabilities_count\": 266,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038643,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038644,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038645,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038646,\n \"port_number\": 602,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038647,\n \"port_number\": 605,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322900/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.65\",\n \"database\": null,\n \"hostname\": \"rhel5dev32.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DB6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322886,\n \"created_at\": \"2019-11-05T15:38:27Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D8D385B6C880\",\n \"vulnerabilities_count\": 287,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038492,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038493,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322886/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.42\",\n \"database\": null,\n \"hostname\": \"nagios1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D8D385B6C880\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322864,\n \"created_at\": \"2019-11-05T15:38:26Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DFB\",\n \"vulnerabilities_count\": 261,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038457,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038458,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038459,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322864/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.20\",\n \"database\": null,\n \"hostname\": \"ganglia1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DFB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322845,\n \"created_at\": \"2019-11-05T15:38:25Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB28F3\",\n \"vulnerabilities_count\": 189,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038252,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038253,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038254,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038255,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038256,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322845/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.163\",\n \"database\": null,\n \"hostname\": \"rhnsat1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB28F3\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322841,\n \"created_at\": \"2019-11-05T15:38:25Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CD74\",\n \"vulnerabilities_count\": 122,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038232,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038233,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038234,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038235,\n \"port_number\": 5901,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038236,\n \"port_number\": 6001,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"XWindows\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322841/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.154\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux4.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CD74\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322839,\n \"created_at\": \"2019-11-05T15:38:25Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CEB8\",\n \"vulnerabilities_count\": 246,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038247,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038248,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.19\"\n },\n {\n \"id\": 239038249,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038250,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322839/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.153\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux3.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CEB8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322838,\n \"created_at\": \"2019-11-05T15:38:24Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CAD8\",\n \"vulnerabilities_count\": 246,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038217,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038218,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.19\"\n },\n {\n \"id\": 239038219,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038220,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322838/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.152\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux2.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CAD8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18322837,\n \"created_at\": \"2019-11-05T15:38:24Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CE88\",\n \"vulnerabilities_count\": 246,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038226,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038227,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.19\"\n },\n {\n \"id\": 239038228,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038229,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038230,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2.0\"\n },\n {\n \"id\": 239038231,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"WSGIServer\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"0.1\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322837/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.151\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CE88\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18322825,\n \"created_at\": \"2019-11-05T15:38:24Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E97\",\n \"vulnerabilities_count\": 248,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038165,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038166,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038167,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322825/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.138\",\n \"database\": null,\n \"hostname\": \"nagios1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E97\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322802,\n \"created_at\": \"2019-11-05T15:38:22Z\",\n \"priority\": 10,\n \"operating_system\": \"Linux - Linux - Linux - 2.6.27\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"time2.dmz.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 216,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038024,\n \"port_number\": 13,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"daytime\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038025,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038026,\n \"port_number\": 37,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"timeserver\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038027,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.3.33\"\n },\n {\n \"id\": 239038028,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.3.33\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322802/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.69\",\n \"database\": null,\n \"hostname\": \"time2.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322791,\n \"created_at\": \"2019-11-05T15:38:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows Server 2008 R2, Standard Edition - SP1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"byob-windows-signing1.dmz.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037809,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037810,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037811,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037812,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037813,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037814,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037815,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037816,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037817,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322791/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.58\",\n \"database\": null,\n \"hostname\": \"byob-windows-signing1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18322769,\n \"created_at\": \"2019-11-05T15:38:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"001CC4D80EE4\",\n \"vulnerabilities_count\": 212,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037818,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239037819,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037820,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037821,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037822,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037823,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037824,\n \"port_number\": 606,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037825,\n \"port_number\": 608,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037826,\n \"port_number\": 609,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037827,\n \"port_number\": 611,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037828,\n \"port_number\": 641,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037829,\n \"port_number\": 644,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037830,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037831,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037832,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037833,\n \"port_number\": 45980,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037834,\n \"port_number\": 47402,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322769/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.21\",\n \"database\": null,\n \"hostname\": \"khan.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"001CC4D80EE4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322765,\n \"created_at\": \"2019-11-05T15:38:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E47\",\n \"vulnerabilities_count\": 257,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037835,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239037836,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239037837,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322765/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.22\",\n \"database\": null,\n \"hostname\": \"ganglia1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E47\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322716,\n \"created_at\": \"2019-11-05T15:38:20Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"vidyodashboard.corpdmz.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037237,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n },\n {\n \"id\": 239037238,\n \"port_number\": 2222,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322716/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.141\",\n \"database\": null,\n \"hostname\": \"vidyodashboard.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322713,\n \"created_at\": \"2019-11-05T15:38:20Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB290D\",\n \"vulnerabilities_count\": 346,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037320,\n \"port_number\": 21,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"FTP\",\n \"ostype\": \"\",\n \"product\": \"vsFTPd\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.2\"\n },\n {\n \"id\": 239037321,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239037322,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"Jetty\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.1.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322713/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.138\",\n \"database\": null,\n \"hostname\": \"wifimgr1.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB290D\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322706,\n \"created_at\": \"2019-11-05T15:38:19Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DD5\",\n \"vulnerabilities_count\": 310,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037252,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239037253,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037254,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037255,\n \"port_number\": 947,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037256,\n \"port_number\": 950,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322706/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.129\",\n \"database\": null,\n \"hostname\": \"sectest2.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DD5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322705,\n \"created_at\": \"2019-11-05T15:38:19Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DD4\",\n \"vulnerabilities_count\": 468,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037208,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239037209,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037210,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037211,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037212,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037213,\n \"port_number\": 748,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037214,\n \"port_number\": 751,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037215,\n \"port_number\": 773,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037216,\n \"port_number\": 776,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037217,\n \"port_number\": 801,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037218,\n \"port_number\": 804,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037219,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037220,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037221,\n \"port_number\": 40013,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037222,\n \"port_number\": 51627,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322705/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.128\",\n \"database\": null,\n \"hostname\": \"sectest1.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DD4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322640,\n \"created_at\": \"2019-11-05T15:38:16Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA15C3018\",\n \"vulnerabilities_count\": 109,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036980,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036981,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322640/vulnerabilities\"\n },\n \"ip_address\": \"10.22.70.36\",\n \"database\": null,\n \"hostname\": \"bugzilla4.db.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA15C3018\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322611,\n \"created_at\": \"2019-11-05T15:38:15Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048F6D9A6\",\n \"vulnerabilities_count\": 462,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036891,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322611/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.215\",\n \"database\": null,\n \"hostname\": \"node8.testing.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048F6D9A6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322610,\n \"created_at\": \"2019-11-05T15:38:14Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048F6DF2A\",\n \"vulnerabilities_count\": 462,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036879,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036880,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036881,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036882,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322610/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.214\",\n \"database\": null,\n \"hostname\": \"node7.testing.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048F6DF2A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322609,\n \"created_at\": \"2019-11-05T15:38:14Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0025901AA566\",\n \"vulnerabilities_count\": 474,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036884,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036885,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036886,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036887,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322609/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.213\",\n \"database\": null,\n \"hostname\": \"node6.testing.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0025901AA566\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322598,\n \"created_at\": \"2019-11-05T15:38:13Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"F4CE46BBC378\",\n \"vulnerabilities_count\": 170,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036725,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322598/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.163\",\n \"database\": null,\n \"hostname\": \"webapp2.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"F4CE46BBC378\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322597,\n \"created_at\": \"2019-11-05T15:38:13Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D8D385619050\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036722,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036723,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Tomcat\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322597/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.162\",\n \"database\": null,\n \"hostname\": \"webapp1.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D8D385619050\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322579,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D7688A0\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036711,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036712,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036713,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322579/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.252\",\n \"database\": null,\n \"hostname\": \"node2.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D7688A0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322577,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768A4FB5A0\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036717,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036718,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036719,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322577/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.253\",\n \"database\": null,\n \"hostname\": \"node1.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768A4FB5A0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322574,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D787E20\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036643,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036644,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036645,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322574/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.250\",\n \"database\": null,\n \"hostname\": \"node4.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D787E20\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322573,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D76D2FC\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036646,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036647,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036648,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322573/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.251\",\n \"database\": null,\n \"hostname\": \"node3.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D76D2FC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322572,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D78B398\",\n \"vulnerabilities_count\": 299,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036641,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036642,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322572/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.249\",\n \"database\": null,\n \"hostname\": \"node5.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D78B398\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322571,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768A56D828\",\n \"vulnerabilities_count\": 299,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036622,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036623,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322571/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.247\",\n \"database\": null,\n \"hostname\": \"node7.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768A56D828\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322570,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D708914\",\n \"vulnerabilities_count\": 299,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036605,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036606,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322570/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.248\",\n \"database\": null,\n \"hostname\": \"node6.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D708914\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322569,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26A2\",\n \"vulnerabilities_count\": 123,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036583,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036584,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036585,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322569/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.138\",\n \"database\": null,\n \"hostname\": \"bamboo1.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26A2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322568,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048F52E94\",\n \"vulnerabilities_count\": 583,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036655,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036656,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239036657,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036658,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036659,\n \"port_number\": 5432,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Postgres\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322568/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.91\",\n \"database\": null,\n \"hostname\": \"node24.generic.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048F52E94\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322564,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00259069ED26\",\n \"vulnerabilities_count\": 191,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036517,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036518,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036519,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322564/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.73\",\n \"database\": null,\n \"hostname\": \"elasticsearch6.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00259069ED26\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322562,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048DCA8F6\",\n \"vulnerabilities_count\": 662,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036589,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036590,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036591,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036592,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036593,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036594,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036595,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036596,\n \"port_number\": 35801,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036597,\n \"port_number\": 38784,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036598,\n \"port_number\": 40237,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036599,\n \"port_number\": 41428,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036600,\n \"port_number\": 44815,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036601,\n \"port_number\": 60757,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322562/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.70\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048DCA8F6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322561,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048DCA93C\",\n \"vulnerabilities_count\": 650,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036660,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036661,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036662,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036663,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036664,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036665,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036666,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036667,\n \"port_number\": 34558,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036668,\n \"port_number\": 35957,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036669,\n \"port_number\": 36013,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036670,\n \"port_number\": 55458,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036671,\n \"port_number\": 58459,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036672,\n \"port_number\": 58706,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322561/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.68\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048DCA93C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322559,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048DCA800\",\n \"vulnerabilities_count\": 664,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036609,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036610,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036611,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036612,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036613,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036614,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036615,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036616,\n \"port_number\": 38548,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036617,\n \"port_number\": 38607,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036618,\n \"port_number\": 39558,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036619,\n \"port_number\": 42555,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036620,\n \"port_number\": 44971,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036621,\n \"port_number\": 58887,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322559/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.69\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048DCA800\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322553,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E83935BCD160\",\n \"vulnerabilities_count\": 456,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036563,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036564,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036565,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036566,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036567,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036568,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036569,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036570,\n \"port_number\": 33797,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036571,\n \"port_number\": 34239,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036572,\n \"port_number\": 34271,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036573,\n \"port_number\": 41796,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036574,\n \"port_number\": 42283,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036575,\n \"port_number\": 43200,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036576,\n \"port_number\": 49662,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036577,\n \"port_number\": 52667,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036578,\n \"port_number\": 53193,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036579,\n \"port_number\": 57468,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322553/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.21\",\n \"database\": null,\n \"hostname\": \"etl2.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E83935BCD160\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322552,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D8D3856627E0\",\n \"vulnerabilities_count\": 259,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036526,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239036527,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239036528,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036529,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036530,\n \"port_number\": 723,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036531,\n \"port_number\": 726,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036532,\n \"port_number\": 740,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036533,\n \"port_number\": 743,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036534,\n \"port_number\": 811,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036535,\n \"port_number\": 814,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036536,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036537,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036538,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": \"MySQL\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.5.31\"\n },\n {\n \"id\": 239036539,\n \"port_number\": 33921,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036540,\n \"port_number\": 39831,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322552/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.36\",\n \"database\": null,\n \"hostname\": \"mysql1.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D8D3856627E0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322488,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115B98EA80\",\n \"vulnerabilities_count\": 242,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036264,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036265,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239036266,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036267,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036268,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036269,\n \"port_number\": 33661,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036270,\n \"port_number\": 54353,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036271,\n \"port_number\": 57487,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036272,\n \"port_number\": 59423,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322488/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.149\",\n \"database\": null,\n \"hostname\": \"hala.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115B98EA80\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322487,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D84B53C\",\n \"vulnerabilities_count\": 183,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036240,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036241,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036242,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036243,\n \"port_number\": 8480,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IBM AS400 Ultimedia Services\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322487/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.150\",\n \"database\": null,\n \"hostname\": \"node1.admin.peach.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D84B53C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322486,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA10E\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036256,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036257,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322486/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.104\",\n \"database\": null,\n \"hostname\": \"node56.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA10E\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322484,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91FE\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036262,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036263,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322484/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.102\",\n \"database\": null,\n \"hostname\": \"node54.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91FE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322482,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA116\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036225,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036226,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322482/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.103\",\n \"database\": null,\n \"hostname\": \"node55.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA116\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322481,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA158\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036208,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036209,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322481/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.101\",\n \"database\": null,\n \"hostname\": \"node53.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA158\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322480,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA114\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036210,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036211,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322480/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.99\",\n \"database\": null,\n \"hostname\": \"node51.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA114\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322479,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA15A\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036204,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036205,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322479/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.100\",\n \"database\": null,\n \"hostname\": \"node52.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA15A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322478,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91E4\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036202,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036203,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322478/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.97\",\n \"database\": null,\n \"hostname\": \"node49.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91E4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322477,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158FDDC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036200,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036201,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322477/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.98\",\n \"database\": null,\n \"hostname\": \"node50.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158FDDC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322476,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1584C94\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036206,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036207,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322476/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.96\",\n \"database\": null,\n \"hostname\": \"node48.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1584C94\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322475,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1586D6C\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036194,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036195,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322475/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.95\",\n \"database\": null,\n \"hostname\": \"node47.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1586D6C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322474,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1582D00\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036198,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036199,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322474/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.94\",\n \"database\": null,\n \"hostname\": \"node46.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1582D00\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322473,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1584C84\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036196,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036197,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322473/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.93\",\n \"database\": null,\n \"hostname\": \"node45.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1584C84\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322472,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA11C\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036192,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036193,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322472/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.92\",\n \"database\": null,\n \"hostname\": \"node44.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA11C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322471,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158FDE2\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036190,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036191,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322471/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.91\",\n \"database\": null,\n \"hostname\": \"node43.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158FDE2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322470,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEB0E8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036186,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036187,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322470/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.90\",\n \"database\": null,\n \"hostname\": \"node42.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEB0E8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322469,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158ED66\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036188,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036189,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322469/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.89\",\n \"database\": null,\n \"hostname\": \"node41.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158ED66\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322468,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1583DDC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036184,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036185,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322468/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.88\",\n \"database\": null,\n \"hostname\": \"node40.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1583DDC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322467,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA17A\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036180,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036181,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322467/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.87\",\n \"database\": null,\n \"hostname\": \"node39.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA17A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322466,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA170\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036182,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036183,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322466/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.86\",\n \"database\": null,\n \"hostname\": \"node38.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA170\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322465,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158BDEC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036178,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036179,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322465/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.85\",\n \"database\": null,\n \"hostname\": \"node37.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158BDEC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322464,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91E2\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036174,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036175,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322464/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.84\",\n \"database\": null,\n \"hostname\": \"node36.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91E2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322463,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91E8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036164,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036165,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322463/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.83\",\n \"database\": null,\n \"hostname\": \"node35.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91E8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322462,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91EA\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036176,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036177,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322462/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.82\",\n \"database\": null,\n \"hostname\": \"node34.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91EA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322461,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA10A\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036170,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036171,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036172,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036173,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322461/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.81\",\n \"database\": null,\n \"hostname\": \"node33.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA10A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322460,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91F6\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036168,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036169,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322460/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.79\",\n \"database\": null,\n \"hostname\": \"node31.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91F6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322459,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91FC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036166,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036167,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322459/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.80\",\n \"database\": null,\n \"hostname\": \"node32.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91FC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322458,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA146\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036162,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036163,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322458/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.78\",\n \"database\": null,\n \"hostname\": \"node30.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA146\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322457,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA11E\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036160,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036161,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322457/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.77\",\n \"database\": null,\n \"hostname\": \"node29.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA11E\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322456,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158DCC8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036158,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036159,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322456/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.76\",\n \"database\": null,\n \"hostname\": \"node28.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158DCC8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322455,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1583E26\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036156,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036157,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322455/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.75\",\n \"database\": null,\n \"hostname\": \"node27.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1583E26\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322454,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1580EF0\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036154,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036155,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322454/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.74\",\n \"database\": null,\n \"hostname\": \"node26.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1580EF0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322453,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA136\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036152,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036153,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322453/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.73\",\n \"database\": null,\n \"hostname\": \"node25.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA136\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322452,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158AA06\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036137,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036138,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322452/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.72\",\n \"database\": null,\n \"hostname\": \"node24.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158AA06\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322451,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEB1FC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036117,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036118,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322451/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.71\",\n \"database\": null,\n \"hostname\": \"node23.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEB1FC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322450,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158EE02\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036150,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036151,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322450/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.64\",\n \"database\": null,\n \"hostname\": \"node16.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158EE02\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322449,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA128\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036141,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036142,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036143,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036144,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322449/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.67\",\n \"database\": null,\n \"hostname\": \"node19.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA128\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322448,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEB19C\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036105,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036106,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322448/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.70\",\n \"database\": null,\n \"hostname\": \"node22.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEB19C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322447,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA174\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036135,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036136,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322447/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.68\",\n \"database\": null,\n \"hostname\": \"node20.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA174\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322446,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CEC8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036139,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036140,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322446/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.69\",\n \"database\": null,\n \"hostname\": \"node21.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CEC8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322445,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91B8\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036129,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036130,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322445/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.60\",\n \"database\": null,\n \"hostname\": \"node12.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91B8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322444,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1580EEA\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036131,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036132,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322444/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.63\",\n \"database\": null,\n \"hostname\": \"node15.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1580EEA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322443,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA15C\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036086,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036087,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322443/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.61\",\n \"database\": null,\n \"hostname\": \"node13.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA15C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322442,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91EE\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036088,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036089,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322442/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.65\",\n \"database\": null,\n \"hostname\": \"node17.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91EE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322441,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91F8\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036107,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036108,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322441/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.56\",\n \"database\": null,\n \"hostname\": \"node8.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91F8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322440,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1582EC4\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036121,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036122,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322440/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.49\",\n \"database\": null,\n \"hostname\": \"node1.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1582EC4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322439,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158FDEE\",\n \"vulnerabilities_count\": 266,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036101,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036102,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036103,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036104,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322439/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.57\",\n \"database\": null,\n \"hostname\": \"node9.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158FDEE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322438,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA142\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036082,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036083,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322438/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.58\",\n \"database\": null,\n \"hostname\": \"node10.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA142\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322437,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CEF8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036109,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036110,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036111,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036112,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322437/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.66\",\n \"database\": null,\n \"hostname\": \"node18.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CEF8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322436,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1582DDA\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036133,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036134,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322436/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.55\",\n \"database\": null,\n \"hostname\": \"node7.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1582DDA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322435,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA16E\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036113,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036114,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322435/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.62\",\n \"database\": null,\n \"hostname\": \"node14.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA16E\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322434,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CC7A\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036115,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036116,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322434/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.52\",\n \"database\": null,\n \"hostname\": \"node4.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CC7A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322433,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CEC0\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036125,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036126,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036127,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036128,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322433/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.54\",\n \"database\": null,\n \"hostname\": \"node6.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CEC0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322432,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB654B\",\n \"vulnerabilities_count\": 268,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036090,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036091,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036092,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036093,\n \"port_number\": 8100,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"SimpleHTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"0.6\"\n },\n {\n \"id\": 239036094,\n \"port_number\": 10000,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036095,\n \"port_number\": 42575,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036096,\n \"port_number\": 48408,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036097,\n \"port_number\": 48644,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036098,\n \"port_number\": 51149,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322432/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.48\",\n \"database\": null,\n \"hostname\": \"mango-gw.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB654B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322431,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1581DAC\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036099,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036100,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322431/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.59\",\n \"database\": null,\n \"hostname\": \"node11.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1581DAC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322429,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158EE00\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036119,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036120,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322429/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.51\",\n \"database\": null,\n \"hostname\": \"node3.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158EE00\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322427,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE9134\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036123,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036124,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322427/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.50\",\n \"database\": null,\n \"hostname\": \"node2.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE9134\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322426,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1580E3A\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036084,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036085,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322426/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.53\",\n \"database\": null,\n \"hostname\": \"node5.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1580E3A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322425,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002655FFFA30\",\n \"vulnerabilities_count\": 292,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036075,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036076,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036077,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036078,\n \"port_number\": 8480,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IBM AS400 Ultimedia Services\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036079,\n \"port_number\": 36383,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036080,\n \"port_number\": 59610,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036081,\n \"port_number\": 60000,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Lotus Notes RDEBUG\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322425/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.36\",\n \"database\": null,\n \"hostname\": \"node1.admin.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002655FFFA30\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322323,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AA00001991DD\",\n \"vulnerabilities_count\": 573,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035207,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035208,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Squid\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"3.1.10\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322323/vulnerabilities\"\n },\n \"ip_address\": \"10.18.74.22\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AA00001991DD\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322322,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AA00006A6E66\",\n \"vulnerabilities_count\": 197,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035145,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035146,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Squid\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"3.1.10\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322322/vulnerabilities\"\n },\n \"ip_address\": \"10.18.74.21\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AA00006A6E66\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322321,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.203\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035142,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035143,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035144,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322321/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322320,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.202\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035116,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035117,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035118,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322320/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.202\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322319,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.201\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035119,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035120,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035121,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322319/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.201\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322318,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.200\",\n \"vulnerabilities_count\": 425,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035158,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035159,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035160,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035161,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": \"MySQL\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.1.58\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322318/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.200\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322314,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.203\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035086,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035087,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035088,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322314/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322313,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.202\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035079,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035080,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035081,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322313/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.202\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322312,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.201\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035074,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035075,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035076,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322312/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.201\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322311,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.200\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035082,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035083,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239035084,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035085,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322311/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.200\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322308,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.203\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035069,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035070,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035071,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322308/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322307,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.202\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035065,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035066,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035067,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322307/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.202\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322306,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.201\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035062,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035063,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035064,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322306/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.201\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322305,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.200\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035058,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035059,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239035060,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035061,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322305/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.200\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18321627,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-110.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033217,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033218,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033219,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033220,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033221,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033222,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033223,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321627/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.236\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-110.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321625,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-109.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033224,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033225,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033226,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033227,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033228,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033229,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033230,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321625/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.235\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-109.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321619,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-108.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033169,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033170,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033171,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033172,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033173,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033174,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033175,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321619/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.234\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-108.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321607,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-ref.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033196,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033197,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033198,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033199,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033200,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033201,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033202,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321607/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.229\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-ref.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321601,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-107.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033032,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033033,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033034,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033035,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033036,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033037,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033038,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321601/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.227\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-107.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321588,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-106.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032963,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032964,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032965,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032966,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032967,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032968,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032969,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321588/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.212\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-106.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321583,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-105.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032956,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032957,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032958,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032959,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032960,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032961,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032962,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321583/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.206\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-105.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321577,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-104.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032921,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032922,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032923,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032924,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032925,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032926,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032927,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321577/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.201\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-104.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321575,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-103.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032903,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032904,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032905,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032906,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032907,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032908,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032909,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321575/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.200\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-103.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321569,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-102.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032879,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032880,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032881,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032882,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032883,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032884,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032885,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321569/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.189\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-102.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321565,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-113.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032827,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032828,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032829,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032830,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032831,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032832,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032833,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032834,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032835,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032836,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032837,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032838,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032839,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032840,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321565/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.186\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-113.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321564,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-114.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032795,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032796,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032797,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032798,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032799,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032800,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032801,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032802,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032803,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032804,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032805,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032806,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032807,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321564/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.187\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-114.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321563,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-111.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032808,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032809,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032810,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032811,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032812,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032813,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032814,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032815,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032816,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032817,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032818,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032819,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032820,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032821,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321563/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.184\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-111.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321562,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-112.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032781,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032782,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032783,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032784,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032785,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032786,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032787,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032788,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032789,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032790,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032791,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032792,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032793,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032794,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321562/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.185\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-112.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321561,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-110.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032761,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032762,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032763,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032764,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032765,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032766,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032767,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032768,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032769,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032770,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032771,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032772,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032773,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032774,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321561/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.183\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-110.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321534,\n \"created_at\": \"2019-11-05T15:37:49Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-109.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032613,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032614,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032615,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032616,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032617,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032618,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032619,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032620,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032621,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032622,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032623,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032624,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032625,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032626,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321534/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.149\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-109.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321513,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-108.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032483,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032484,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032485,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032486,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032487,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032488,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032489,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032490,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032491,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032492,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032493,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032494,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032495,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032496,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321513/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.126\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-108.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321509,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-107.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032469,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032470,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032471,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032472,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032473,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032474,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032475,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032476,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032477,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032478,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032479,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032480,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032481,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032482,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321509/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.123\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-107.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321506,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-106.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032433,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032434,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032435,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032436,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032437,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032438,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032439,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032440,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032441,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032442,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032443,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032444,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032445,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032446,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321506/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.120\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-106.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321504,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-105.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032415,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032416,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032417,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032418,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032419,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032420,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032421,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032422,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032423,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032424,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032425,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032426,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032427,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321504/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.119\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-105.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321420,\n \"created_at\": \"2019-11-05T15:37:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-075.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032033,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032034,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032035,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032036,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032037,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032038,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032039,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321420/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.28\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-075.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321418,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-074.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 20,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032016,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032017,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032018,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032019,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032020,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032021,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321418/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.27\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-074.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321417,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-073.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032022,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032023,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032024,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032025,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032026,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032027,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032028,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321417/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.26\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-073.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321416,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-072.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 21,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031997,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031998,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031999,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032000,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032001,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032002,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321416/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.25\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-072.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321415,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-092.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031932,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031933,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031934,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031935,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031936,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031937,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031938,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031939,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031940,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031941,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031942,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031943,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031944,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321415/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.24\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-092.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321414,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-090.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031971,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031972,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031973,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031974,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031975,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031976,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031977,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031978,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031979,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031980,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031981,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031982,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031983,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321414/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.22\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-090.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321413,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-091.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031919,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031920,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031921,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031922,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031923,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031924,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031925,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031926,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031927,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031928,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031929,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031930,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031931,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321413/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.23\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-091.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321412,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-089.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031984,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031985,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031986,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031987,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031988,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031989,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031990,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031991,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031992,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031993,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031994,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031995,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031996,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321412/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.21\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-089.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321411,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"TALOS-R3-W7-087\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031945,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031946,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031947,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031948,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031949,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031950,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031951,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031952,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031953,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031954,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031955,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031956,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031957,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321411/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.254\",\n \"database\": null,\n \"hostname\": \"TALOS-R3-W7-087\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321410,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-088.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031958,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031959,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031960,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031961,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031962,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031963,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031964,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031965,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031966,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031967,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031968,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031969,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031970,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321410/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.20\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-088.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321409,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-062.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032003,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032004,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032005,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032006,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032007,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032008,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032009,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032010,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032011,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032012,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032013,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032014,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032015,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321409/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.251\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-062.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321408,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-064.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031906,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031907,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031908,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031909,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031910,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031911,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031912,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031913,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031914,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031915,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031916,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031917,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031918,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321408/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.253\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-064.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321407,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-063.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031854,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031855,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031856,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031857,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031858,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031859,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031860,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031861,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031862,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031863,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031864,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031865,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031866,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321407/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.252\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-063.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321406,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-060.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031893,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031894,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031895,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031896,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031897,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031898,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031899,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031900,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031901,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031902,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031903,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031904,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031905,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321406/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.249\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-060.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321405,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-059.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031880,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031881,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031882,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031883,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031884,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031885,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031886,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031887,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031888,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031889,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031890,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031891,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031892,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321405/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.248\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-059.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321404,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-061.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031867,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031868,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031869,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031870,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031871,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031872,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031873,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031874,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031875,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031876,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031877,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031878,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031879,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321404/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.250\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-061.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321403,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-058.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031841,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031842,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031843,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031844,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031845,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031846,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031847,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031848,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031849,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031850,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031851,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031852,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031853,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321403/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.247\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-058.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321402,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-057.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031828,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031829,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031830,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031831,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031832,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031833,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031834,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031835,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031836,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031837,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031838,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031839,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031840,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321402/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.246\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-057.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321401,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-055.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031815,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031816,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031817,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031818,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031819,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031820,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031821,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031822,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031823,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031824,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031825,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031826,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031827,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321401/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.244\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-055.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321400,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-056.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031782,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031783,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031784,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031785,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031786,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031787,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031788,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031789,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031790,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031791,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031792,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031793,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031794,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321400/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.245\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-056.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321399,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-040.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031802,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031803,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031804,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031805,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031806,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031807,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031808,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031809,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031810,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031811,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031812,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031813,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031814,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321399/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.242\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-040.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321398,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-054.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031769,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031770,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031771,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031772,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031773,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031774,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031775,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031776,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031777,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031778,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031779,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031780,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031781,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321398/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.243\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-054.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321397,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-062.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031795,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031796,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031797,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031798,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031799,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031800,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031801,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321397/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.241\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-062.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321396,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-061.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031755,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031756,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031757,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031758,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031759,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031760,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031761,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321396/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.240\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-061.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321395,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-060.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031762,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031763,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031764,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031765,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031766,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031767,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031768,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321395/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.239\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-060.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321392,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-057.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031727,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031728,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031729,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031730,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031731,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031732,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031733,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321392/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.236\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-057.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321391,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-056.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031720,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031721,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031722,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031723,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031724,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031725,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031726,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321391/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.235\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-056.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321390,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-055.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031734,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031735,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031736,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031737,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031738,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031739,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031740,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321390/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.234\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-055.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321389,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-054.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031713,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031714,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031715,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031716,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031717,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031718,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031719,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321389/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.233\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-054.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321374,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-053.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031593,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031594,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031595,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031596,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031597,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031598,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031599,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031600,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031601,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031602,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031603,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031604,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031605,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321374/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.213\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-053.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321370,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-051.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031580,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031581,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031582,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031583,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031584,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031585,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031586,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031587,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031588,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031589,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031590,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031591,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031592,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321370/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.211\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-051.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321369,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-048.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031620,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031621,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031622,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031623,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031624,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031625,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031626,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031627,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031628,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031629,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031630,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031631,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031632,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321369/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.208\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-048.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321368,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-052.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031525,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031526,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031527,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031528,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031529,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031530,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031531,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031532,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031533,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031534,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031535,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031536,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031537,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321368/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.212\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-052.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321367,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-050.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031560,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031561,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031562,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031563,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031564,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031565,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031566,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031567,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031568,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031569,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031570,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031571,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031572,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321367/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.210\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-050.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321366,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-046.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031512,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031513,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031514,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031515,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031516,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031517,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031518,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031519,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031520,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031521,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031522,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031523,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031524,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321366/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.206\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-046.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321365,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-049.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031499,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031500,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031501,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031502,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031503,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031504,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031505,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031506,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031507,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031508,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031509,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031510,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031511,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321365/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.209\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-049.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321364,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-047.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031486,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031487,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031488,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031489,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031490,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031491,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031492,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031493,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031494,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031495,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031496,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031497,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031498,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321364/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.207\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-047.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321363,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-045.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031473,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031474,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031475,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031476,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031477,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031478,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031479,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031480,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031481,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031482,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031483,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031484,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031485,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321363/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.205\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-045.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321362,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-044.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031446,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031447,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031448,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031449,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031450,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031451,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031452,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031453,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031454,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031455,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031456,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031457,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031458,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031459,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321362/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.204\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-044.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321361,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-043.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031460,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031461,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031462,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031463,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031464,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031465,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031466,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031467,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031468,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031469,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031470,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031471,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031472,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321361/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.203\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-043.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321360,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-042.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031433,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031434,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031435,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031436,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031437,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031438,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031439,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031440,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031441,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031442,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031443,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031444,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031445,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321360/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.202\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-042.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321359,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-039.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031419,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031420,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031421,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031422,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031423,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031424,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031425,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031426,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031427,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031428,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031429,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031430,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031431,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031432,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321359/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.200\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-039.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321358,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-041.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031393,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031394,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031395,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031396,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031397,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031398,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031399,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031400,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031401,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031402,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031403,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031404,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031405,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321358/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.201\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-041.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321357,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-038.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031406,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031407,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031408,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031409,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031410,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031411,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031412,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031413,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031414,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031415,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031416,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031417,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031418,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321357/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.199\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-038.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321356,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-035.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031380,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031381,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031382,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031383,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031384,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031385,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031386,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031387,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031388,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031389,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031390,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031391,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031392,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321356/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.196\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-035.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321355,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-037.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031353,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031354,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031355,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031356,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031357,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031358,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031359,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031360,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031361,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031362,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031363,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031364,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031365,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031366,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321355/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.198\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-037.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321354,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-036.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031367,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031368,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031369,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031370,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031371,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031372,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031373,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031374,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031375,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031376,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031377,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031378,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031379,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321354/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.197\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-036.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321353,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-034.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031340,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031341,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031342,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031343,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031344,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031345,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031346,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031347,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031348,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031349,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031350,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031351,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031352,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321353/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.195\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-034.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321352,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-033.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031301,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031302,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031303,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031304,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031305,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031306,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031307,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031308,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031309,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031310,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031311,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031312,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031313,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321352/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.194\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-033.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321351,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-031.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031314,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031315,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031316,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031317,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031318,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031319,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031320,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031321,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031322,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031323,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031324,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031325,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031326,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321351/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.192\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-031.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321350,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-030.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031327,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031328,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031329,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031330,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031331,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031332,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031333,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031334,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031335,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031336,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031337,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031338,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031339,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321350/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.191\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-030.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321349,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-032.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031288,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031289,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031290,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031291,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031292,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031293,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031294,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031295,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031296,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031297,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031298,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031299,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031300,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321349/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.193\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-032.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321348,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-026.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031275,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031276,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031277,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031278,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031279,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031280,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031281,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031282,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031283,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031284,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031285,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031286,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031287,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321348/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.187\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-026.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321347,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-029.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031261,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031262,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031263,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031264,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031265,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031266,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031267,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031268,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031269,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031270,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031271,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031272,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031273,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031274,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321347/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.190\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-029.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321346,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-028.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031222,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031223,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031224,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031225,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031226,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031227,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031228,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031229,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031230,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031231,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031232,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031233,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031234,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321346/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.189\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-028.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321345,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-025.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031248,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031249,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031250,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031251,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031252,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031253,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031254,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031255,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031256,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031257,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031258,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031259,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031260,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321345/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.186\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-025.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321344,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-027.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031235,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031236,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031237,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031238,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031239,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031240,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031241,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031242,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031243,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031244,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031245,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031246,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031247,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321344/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.188\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-027.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321343,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-021.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031208,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031209,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031210,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031211,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031212,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031213,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031214,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031215,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031216,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031217,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031218,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031219,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031220,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031221,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321343/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.182\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-021.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321342,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-024.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031195,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031196,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031197,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031198,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031199,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031200,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031201,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031202,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031203,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031204,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031205,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031206,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031207,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321342/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.185\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-024.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321341,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-023.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031181,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031182,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031183,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031184,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031185,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031186,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031187,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031188,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031189,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031190,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031191,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031192,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031193,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031194,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321341/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.184\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-023.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321340,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-022.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031167,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031168,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031169,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031170,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031171,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031172,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031173,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031174,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031175,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031176,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031177,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031178,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031179,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031180,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321340/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.183\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-022.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321339,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-020.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031140,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031141,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031142,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031143,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031144,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031145,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031146,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031147,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031148,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031149,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031150,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031151,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031152,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031153,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321339/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.181\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-020.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321338,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-018.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031154,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031155,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031156,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031157,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031158,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031159,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031160,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031161,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031162,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031163,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031164,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031165,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031166,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321338/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.179\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-018.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321337,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-019.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031113,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031114,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031115,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031116,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031117,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031118,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031119,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031120,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031121,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031122,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031123,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031124,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031125,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321337/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.180\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-019.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321336,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-016.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031100,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031101,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031102,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031103,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031104,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031105,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031106,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031107,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031108,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031109,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031110,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031111,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031112,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321336/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.177\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-016.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321335,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-015.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031126,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031127,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031128,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031129,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031130,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031131,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031132,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031133,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031134,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031135,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031136,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031137,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031138,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031139,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321335/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.176\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-015.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321334,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-014.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031087,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031088,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031089,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031090,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031091,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031092,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031093,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031094,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031095,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031096,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031097,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031098,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031099,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321334/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.175\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-014.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321333,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-013.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031061,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031062,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031063,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031064,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031065,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031066,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031067,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031068,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031069,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031070,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031071,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031072,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031073,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321333/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.174\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-013.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321332,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-009.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031074,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031075,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031076,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031077,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031078,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031079,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031080,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031081,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031082,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031083,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031084,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031085,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031086,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321332/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.170\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-009.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321331,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-012.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031048,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031049,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031050,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031051,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031052,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031053,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031054,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031055,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031056,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031057,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031058,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031059,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031060,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321331/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.173\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-012.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321330,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-123.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 20,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031009,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031010,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031011,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031012,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031013,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031014,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321330/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.164\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-123.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321329,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-004.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031028,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031029,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031030,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031031,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031032,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031033,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031034,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031035,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031036,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031037,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031038,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031039,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031040,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321329/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.165\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-004.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321328,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-011.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031015,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031016,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031017,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031018,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031019,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031020,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031021,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031022,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031023,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031024,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031025,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031026,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031027,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321328/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.172\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-011.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321327,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-124.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031041,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031042,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031043,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031044,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031045,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031046,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031047,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321327/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.171\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-124.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321326,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-005.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030996,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030997,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030998,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030999,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031000,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031001,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031002,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031003,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031004,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031005,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031006,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031007,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031008,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321326/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.166\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-005.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321325,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-008.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030983,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030984,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030985,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030986,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030987,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030988,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030989,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030990,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030991,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030992,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030993,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030994,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030995,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321325/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.169\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-008.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321324,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-007.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030970,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030971,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030972,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030973,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030974,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030975,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030976,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030977,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030978,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030979,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030980,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030981,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030982,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321324/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.168\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-007.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321323,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-121.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030963,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030964,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030965,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030966,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030967,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030968,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030969,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321323/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.162\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-121.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321322,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-053.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030956,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030957,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030958,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030959,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030960,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030961,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030962,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321322/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.161\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-053.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321321,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-052.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030942,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030943,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030944,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030945,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030946,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030947,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030948,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321321/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.160\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-052.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321320,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-050.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030949,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030950,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030951,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030952,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030953,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030954,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030955,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321320/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.158\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-050.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321319,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-051.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030935,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030936,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030937,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030938,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030939,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030940,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030941,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321319/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.159\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-051.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321318,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-048.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030928,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030929,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030930,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030931,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030932,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030933,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030934,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321318/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.156\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-048.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321317,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-049.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030914,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030915,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030916,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030917,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030918,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030919,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030920,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321317/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.157\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-049.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321316,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-047.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030921,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030922,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030923,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030924,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030925,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030926,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030927,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321316/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.155\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-047.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321315,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-046.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030907,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030908,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030909,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030910,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030911,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030912,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030913,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321315/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.154\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-046.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321314,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-044.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030900,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030901,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030902,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030903,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030904,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030905,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030906,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321314/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.152\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-044.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321313,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-043.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030893,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030894,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030895,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030896,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030897,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030898,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030899,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321313/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.151\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-043.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321312,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-042.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030886,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030887,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030888,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030889,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030890,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030891,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030892,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321312/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.150\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-042.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321311,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-041.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030879,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030880,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030881,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030882,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030883,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030884,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030885,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321311/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.149\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-041.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321310,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-040.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030872,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030873,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030874,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030875,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030876,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030877,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030878,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321310/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.148\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-040.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321309,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-038.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030865,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030866,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030867,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030868,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030869,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030870,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030871,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321309/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.146\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-038.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321308,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-039.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030851,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030852,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030853,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030854,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030855,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030856,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030857,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321308/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.147\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-039.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321307,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-037.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030858,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030859,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030860,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030861,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030862,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030863,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030864,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321307/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.145\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-037.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321306,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-036.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030844,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030845,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030846,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030847,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030848,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030849,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030850,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321306/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.144\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-036.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321305,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-035.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030837,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030838,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030839,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030840,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030841,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030842,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030843,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321305/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.143\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-035.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321304,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-034.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030830,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030831,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030832,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030833,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030834,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030835,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030836,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321304/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.142\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-034.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321303,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-033.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030823,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030824,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030825,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030826,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030827,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030828,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030829,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321303/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.141\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-033.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321302,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-032.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030816,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030817,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030818,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030819,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030820,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030821,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030822,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321302/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.140\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-032.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321301,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-031.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030809,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030810,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030811,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030812,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030813,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030814,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030815,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321301/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.139\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-031.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321300,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-030.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030802,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030803,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030804,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030805,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030806,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030807,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030808,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321300/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.138\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-030.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321299,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-029.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030788,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030789,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030790,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030791,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030792,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030793,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030794,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321299/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.137\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-029.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321298,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-028.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030795,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030796,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030797,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030798,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030799,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030800,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030801,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321298/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.136\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-028.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321297,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-027.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030781,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030782,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030783,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030784,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030785,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030786,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030787,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321297/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.135\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-027.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321296,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-025.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030774,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030775,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030776,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030777,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030778,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030779,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030780,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321296/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.133\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-025.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321295,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-026.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030760,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030761,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030762,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030763,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030764,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030765,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030766,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321295/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.134\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-026.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321294,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-023.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030767,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030768,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030769,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030770,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030771,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030772,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030773,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321294/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.131\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-023.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321293,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-024.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030753,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030754,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030755,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030756,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030757,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030758,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030759,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321293/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.132\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-024.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321292,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-022.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030746,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030747,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030748,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030749,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030750,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030751,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030752,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321292/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.130\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-022.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321291,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-021.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030739,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030740,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030741,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030742,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030743,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030744,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030745,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321291/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.129\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-021.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321290,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-020.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030711,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030712,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030713,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030714,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030715,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030716,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030717,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321290/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.128\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-020.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321289,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-019.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030718,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030719,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030720,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030721,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030722,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030723,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030724,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321289/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.127\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-019.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321288,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-018.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030732,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030733,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030734,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030735,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030736,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030737,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030738,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321288/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.126\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-018.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321287,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-017.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030725,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030726,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030727,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030728,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030729,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030730,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030731,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321287/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.125\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-017.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321286,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-016.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030690,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030691,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030692,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030693,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030694,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030695,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030696,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321286/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.124\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-016.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321285,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-014.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030704,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030705,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030706,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030707,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030708,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030709,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030710,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321285/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.122\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-014.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321284,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-015.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 58,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030697,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030698,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030699,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030700,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030701,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030702,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030703,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321284/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.123\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-015.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321283,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-013.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030683,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030684,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030685,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030686,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030687,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030688,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030689,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321283/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.121\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-013.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321282,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-011.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030676,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030677,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030678,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030679,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030680,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030681,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030682,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321282/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.119\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-011.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321281,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-012.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 21,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030656,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030657,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030658,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030659,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030660,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030661,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321281/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.120\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-012.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321280,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-009.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030669,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030670,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030671,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030672,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030673,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030674,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030675,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321280/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.117\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-009.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321279,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-010.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030662,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030663,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030664,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030665,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030666,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030667,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030668,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321279/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.118\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-010.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321278,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-007.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030649,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030650,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030651,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030652,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030653,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030654,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030655,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321278/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.115\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-007.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321277,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-008.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030642,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030643,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030644,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030645,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030646,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030647,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030648,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321277/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.116\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-008.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321276,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-006.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030635,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030636,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030637,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030638,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030639,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030640,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030641,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321276/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.114\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-006.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321275,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-005.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030628,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030629,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030630,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030631,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030632,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030633,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030634,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321275/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.113\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-005.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321274,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-002.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030621,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030622,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030623,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030624,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030625,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030626,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030627,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321274/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.110\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-002.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321273,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-003.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 71,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030614,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030615,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030616,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030617,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030618,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030619,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030620,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321273/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.111\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-003.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321272,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-001.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 18,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030601,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030602,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030603,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030604,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030605,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030606,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321272/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.109\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-001.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321271,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-071.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030594,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030595,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030596,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030597,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030598,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030599,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030600,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321271/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.108\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-071.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321270,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-070.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 71,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030607,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030608,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030609,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030610,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030611,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030612,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030613,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321270/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.107\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-070.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321269,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-069.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030587,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030588,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030589,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030590,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030591,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030592,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030593,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321269/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.106\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-069.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321268,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-068.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030580,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030581,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030582,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030583,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030584,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030585,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030586,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321268/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.105\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-068.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321267,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-067.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030573,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030574,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030575,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030576,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030577,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030578,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030579,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321267/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.104\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-067.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321266,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-066.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030566,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030567,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030568,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030569,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030570,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030571,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030572,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321266/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.103\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-066.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321265,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-065.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030559,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030560,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030561,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030562,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030563,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030564,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030565,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321265/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.102\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-065.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321264,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-064.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030552,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030553,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030554,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030555,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030556,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030557,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030558,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321264/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.101\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-064.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321263,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-063.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030545,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030546,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030547,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030548,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030549,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030550,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030551,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321263/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.100\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-063.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321262,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-079.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030493,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030494,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030495,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030496,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030497,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030498,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030499,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030500,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030501,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030502,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030503,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030504,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030505,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321262/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.99\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-079.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321261,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-077.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030402,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030403,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030404,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030405,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030406,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030407,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030408,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030409,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030410,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030411,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030412,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030413,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030414,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321261/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.97\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-077.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321260,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-078.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030376,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030377,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030378,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030379,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030380,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030381,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030382,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030383,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030384,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030385,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030386,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030387,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030388,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321260/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.98\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-078.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321259,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-076.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030363,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030364,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030365,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030366,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030367,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030368,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030369,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030370,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030371,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030372,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030373,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030374,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030375,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321259/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.96\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-076.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321258,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-071.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030454,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030455,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030456,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030457,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030458,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030459,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030460,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030461,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030462,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030463,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030464,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030465,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030466,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321258/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.91\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-071.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321257,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-066.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030519,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030520,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030521,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030522,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030523,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030524,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030525,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030526,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030527,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030528,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030529,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030530,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030531,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321257/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.86\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-066.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321256,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-075.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030350,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030351,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030352,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030353,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030354,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030355,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030356,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030357,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030358,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030359,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030360,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030361,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030362,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321256/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.95\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-075.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321255,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-074.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030389,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030390,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030391,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030392,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030393,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030394,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030395,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030396,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030397,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030398,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030399,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030400,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030401,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321255/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.94\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-074.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321254,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-073.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030532,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030533,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030534,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030535,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030536,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030537,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030538,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030539,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030540,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030541,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030542,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030543,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030544,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321254/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.93\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-073.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321253,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-097.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030467,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030468,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030469,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030470,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030471,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030472,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030473,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030474,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030475,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030476,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030477,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030478,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030479,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321253/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.83\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-097.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321252,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-099.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030415,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030416,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030417,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030418,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030419,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030420,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030421,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030422,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030423,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030424,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030425,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030426,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030427,\n \"port_number\": 49160,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321252/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.85\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-099.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321251,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-072.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030324,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030325,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030326,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030327,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030328,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030329,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030330,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030331,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030332,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030333,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030334,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030335,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030336,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321251/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.92\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-072.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321250,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-067.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030428,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030429,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030430,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030431,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030432,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030433,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030434,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030435,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030436,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030437,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030438,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030439,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030440,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321250/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.87\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-067.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321249,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-096.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 33,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030506,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030507,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030508,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030509,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030510,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030511,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030512,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030513,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030514,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030515,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030516,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030517,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030518,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321249/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.82\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-096.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321248,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-098.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030441,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030442,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030443,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030444,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030445,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030446,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030447,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030448,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030449,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030450,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030451,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030452,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030453,\n \"port_number\": 49160,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321248/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.84\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-098.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321247,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-068.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030311,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030312,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030313,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030314,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030315,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030316,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030317,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030318,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030319,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030320,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030321,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030322,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030323,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321247/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.88\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-068.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321246,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-070.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030337,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030338,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030339,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030340,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030341,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030342,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030343,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030344,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030345,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030346,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030347,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030348,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030349,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321246/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.90\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-070.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321245,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-069.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030480,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030481,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030482,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030483,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030484,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030485,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030486,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030487,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030488,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030489,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030490,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030491,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030492,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321245/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.89\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-069.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321243,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-095.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030271,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030272,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030273,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030274,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030275,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030276,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030277,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030278,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030279,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030280,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030281,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030282,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030283,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321243/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.81\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-095.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321242,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-094.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030250,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030251,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030252,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030253,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030254,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030255,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030256,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030257,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030258,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030259,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030260,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030261,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030262,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321242/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.80\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-094.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321241,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-093.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030284,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030285,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030286,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030287,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030288,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030289,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030290,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030291,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030292,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030293,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030294,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030295,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030296,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321241/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.79\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-093.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321218,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-086.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030097,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030098,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030099,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030100,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030101,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030102,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030103,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030104,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030105,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030106,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030107,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030108,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030109,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321218/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.53\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-086.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321217,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-085.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030077,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030078,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030079,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030080,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030081,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030082,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030083,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030084,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030085,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030086,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030087,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030088,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030089,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321217/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.52\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-085.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321216,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-084.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030064,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030065,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030066,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030067,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030068,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030069,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030070,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030071,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030072,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030073,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030074,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030075,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030076,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321216/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.51\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-084.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321215,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-083.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030051,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030052,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030053,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030054,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030055,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030056,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030057,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030058,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030059,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030060,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030061,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030062,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030063,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321215/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.50\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-083.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321214,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-082.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030038,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030039,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030040,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030041,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030042,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030043,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030044,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030045,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030046,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030047,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030048,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030049,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030050,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321214/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.49\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-082.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321213,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-081.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030018,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030019,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030020,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030021,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030022,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030023,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030024,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030025,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030026,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030027,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030028,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030029,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030030,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321213/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.48\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-081.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321212,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-080.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029997,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029998,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239029999,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030000,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030001,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030002,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030003,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030004,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030005,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030006,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030007,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030008,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030009,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030010,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321212/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.47\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-080.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321211,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-095.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030031,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030032,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030033,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030034,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030035,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030036,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030037,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321211/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.46\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-095.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321210,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-094.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030011,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030012,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030013,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030014,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030015,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030016,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030017,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321210/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.45\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-094.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321209,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-093.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029983,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029984,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029985,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029986,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029987,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029988,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029989,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321209/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.44\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-093.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321208,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-092.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029990,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029991,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029992,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029993,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029994,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029995,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029996,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321208/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.43\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-092.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321207,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-091.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029976,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029977,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029978,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029979,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029980,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029981,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029982,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321207/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.42\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-091.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321206,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-090.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029969,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029970,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029971,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029972,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029973,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029974,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029975,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321206/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.41\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-090.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321205,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-089.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029955,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029956,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029957,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029958,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029959,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029960,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029961,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321205/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.40\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-089.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321204,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-088.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029962,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029963,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029964,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029965,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029966,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029967,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029968,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321204/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.39\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-088.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n }\n ],\n \"meta\": {\n \"page\": 1,\n \"pages\": 10\n }\n}" } ] }, { "name": "Search Assets", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "search" ], "query": [ { "key": "application_id", "value": "int32", "description": "The ID of an application to retrieve assets for. All other search parameters are ignored if application_id is provided.", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings\nIf you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of asset IDs", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority greater than this value", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string\nThis can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_names[]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings\nAn array of ports relating to your assets.", "disabled": true }, { "key": "service_products[]", "value": "array of integers", "description": "array of integers\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32\nSearch values specified in the risk meter group definition will override their respective values provided in this request when search_id is provided.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string\nSet this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "vulnerability", "value": "object", "description": "Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] }, "description": "Filters assets by a given set of parameters and returns the filtered assets as well as the total number of assets in the filtered set.\r\n\r\nBy default, only active assets with open vulnerabilities are returned. Results are paginated in pages of 500. Each unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all assets with status=[\"active\"] and tags=[\"foo\", \"bar\"] you will receive all active assets that have either a \"foo\" tag or a \"bar\" tag. This is shown in the CURL example below." }, "response": [] }, { "name": "Search Assets by Custom Query", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/search?q=asset_created:<2020-12-08", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "search" ], "query": [ { "key": "application_id", "value": "int32", "description": "The ID of an application to retrieve assets for. All other search parameters are ignored if application_id is provided.", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings\nIf you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of asset IDs", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority greater than this value", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "asset_created:<2020-12-08", "description": "string\nThis can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE." }, { "key": "service_names[]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings\nAn array of ports relating to your assets.", "disabled": true }, { "key": "service_products[]", "value": "array of integers", "description": "array of integers\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32\nSearch values specified in the risk meter group definition will override their respective values provided in this request when search_id is provided.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string\nSet this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "vulnerability", "value": "object", "description": "Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] } }, "response": [] }, { "name": "Search Assets by Custom Field", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/search?status%5B%5D=open%26custom_fields%3Acustomfield1%5B%5D=JA", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "search" ], "query": [ { "key": "application_id", "value": "int32", "description": "The ID of an application to retrieve assets for. All other search parameters are ignored if application_id is provided.", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings\nIf you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of asset IDs", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority greater than this value", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "service_names[]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings\nAn array of ports relating to your assets.", "disabled": true }, { "key": "service_products[]", "value": "array of integers", "description": "array of integers\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32\nSearch values specified in the risk meter group definition will override their respective values provided in this request when search_id is provided.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string\nSet this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "vulnerability", "value": "object", "description": "Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true }, { "key": "status%5B%5D", "value": "open%26custom_fields%3Acustomfield1%5B%5D=JA" } ] } }, "response": [] }, { "name": "Validate Asset Search Query", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/validate_search?q=string", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "validate_search" ], "query": [ { "key": "q", "value": "string", "description": "string\nThis can be any query string you want to search for, including a regex. For more detailed documentation on our search syntax visit our Help Center." } ] }, "description": "Validate the query string portion of an asset search. If the query is invalid and if the system can determine a suggested replacement, that suggestion will be returned in the response." }, "response": [] }, { "name": "Show Asset", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id" ], "query": [ { "key": "", "value": null, "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "Asset ID of Kenna found in platform. Select asset and look in URL for ID." } ] }, "description": "Returns a single asset by ID." }, "response": [] }, { "name": "Create Asset", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\": {\r\n \"application\": \"\",\r\n \"external_id\": \"\",\r\n \"database\": \"\",\r\n \"ec2\": \"\",\r\n \"file\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"inactive\": \"\",\r\n \"ip_address\": \"\",\r\n \"ipv6\": \"\",\r\n \"last_booted_at\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"mac_address\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"operating_system\": \"\",\r\n \"owner\": \"\",\r\n \"primary_locator\": \"\",\r\n \"priority\": \"\",\r\n \"url\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets" ], "query": [ { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "Asset", "value": "Object", "disabled": true }, { "key": "application", "value": "string", "description": "string\nThe application name\n\n", "disabled": true }, { "key": "external_id", "value": "string", "description": "string\nThe external_id of the asset", "disabled": true }, { "key": "database", "value": "string", "description": "string\nThe database name of the asset", "disabled": true }, { "key": "ec2", "value": "string", "description": "string\nThe ec2 name of the asset", "disabled": true }, { "key": "file", "value": "string", "description": "string\nThe Fully Qualified path of the file", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nThe Fully Qualified Domain Name of the asset", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nThe hostname of the asset", "disabled": true }, { "key": "inactive", "value": "boolean", "description": "boolean\nA boolean value to set the asset inactive", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nThe IP address of the asset", "disabled": true }, { "key": "ipv6", "value": "string", "description": "string\nThe asset's ipv6 address", "disabled": true }, { "key": "last_booted_at", "value": "string", "description": "string\nA datetime (as an iso8601 timestamp) identifying when the asset was last booted\n\n", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string - A datetime (as an iso8601 timestamp) identifying when the asset was last seen", "disabled": true }, { "key": "mac_address", "value": "string", "description": "string\nThe MAC address of the asset", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nThe NetBIOS address of the asset", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes about an asset\n\n", "disabled": true }, { "key": "operating_system", "value": "string", "description": "string\nThe operating system of the asset", "disabled": true }, { "key": "owner", "value": "string", "description": "string\nThe name of the owner of an asset.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary_locator field is deprecated. It is accepted for backward compatibility, but it's calculated by our back-end system and it is ignored.", "disabled": true }, { "key": "priority", "value": "int32", "description": "int32\nThe priority of the asset; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "url", "value": "string", "description": "string\nThe URL of the asset", "disabled": true } ] }, "description": "Creates a single asset and returns the record." }, "response": [] }, { "name": "Update Asset ", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\": {\r\n \"application\": \"\",\r\n \"external_id\": \"\",\r\n \"database\": \"\",\r\n \"ec2\": \"\",\r\n \"file\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"inactive\": \"\",\r\n \"ip_address\": \"\",\r\n \"ipv6\": \"\",\r\n \"last_booted_at\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"mac_address\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"operating_system\": \"\",\r\n \"owner\": \"\",\r\n \"primary_locator\": \"\",\r\n \"priority\": \"\",\r\n \"url\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id" ], "query": [ { "key": "**Update {{id}} below in path parm", "value": null, "disabled": true }, { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "Asset", "value": "Object", "disabled": true }, { "key": "application", "value": "string", "description": "string\nThe application name\n\n", "disabled": true }, { "key": "external_id", "value": "string", "description": "string\nThe external_id of the asset", "disabled": true }, { "key": "database", "value": "string", "description": "string\nThe database name of the asset", "disabled": true }, { "key": "ec2", "value": "string", "description": "string\nThe ec2 name of the asset", "disabled": true }, { "key": "file", "value": "string", "description": "string\nThe Fully Qualified path of the file", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nThe Fully Qualified Domain Name of the asset", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nThe hostname of the asset", "disabled": true }, { "key": "inactive", "value": "boolean", "description": "boolean\nA boolean value to set the asset inactive", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nThe IP address of the asset", "disabled": true }, { "key": "ipv6", "value": "string", "description": "string\nThe asset's ipv6 address", "disabled": true }, { "key": "last_booted_at", "value": "string", "description": "string\nA datetime (as an iso8601 timestamp) identifying when the asset was last booted\n\n", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string - A datetime (as an iso8601 timestamp) identifying when the asset was last seen", "disabled": true }, { "key": "mac_address", "value": "string", "description": "string\nThe MAC address of the asset", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nThe NetBIOS address of the asset", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes about an asset\n\n", "disabled": true }, { "key": "operating_system", "value": "string", "description": "string\nThe operating system of the asset", "disabled": true }, { "key": "owner", "value": "string", "description": "string\nThe name of the owner of an asset.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary_locator field is deprecated. It is accepted for backward compatibility, but it's calculated by our back-end system and it is ignored.", "disabled": true }, { "key": "priority", "value": "int32", "description": "int32\nThe priority of the asset; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "url", "value": "string", "description": "string\nThe URL of the asset", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "ID can be found in Kenna Platform in URL after selecting the asset" } ] }, "description": "Update a single asset's attributes by ID." }, "response": [] }, { "name": "Bulk Update Assets", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\": {\r\n \"priority\": \"\",\r\n \"notes\": \"\",\r\n \"created_at\": \"\",\r\n \"operating_system\": \"\",\r\n \"last_booted_at\": \"\",\r\n \"ipv6\": \"\",\r\n \"inactive\": \"\",\r\n \"owner\": \"\",\r\n \"reset_tags\": \"\",\r\n \"last_seen_time\": \"\"\r\n },\r\n \"asset_ids\": [\r\n \"\",\r\n \"\"\r\n ],\r\n \"realtime\": \"\"\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/bulk", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "bulk" ], "query": [ { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "asset_ids", "value": "array of integers", "description": "array of integers - Kenna ids found in URL of asset when selected", "disabled": true }, { "key": "Asset", "value": "Object", "disabled": true }, { "key": "inactive", "value": "boolean", "description": "boolean\nA boolean value to set the asset inactive", "disabled": true }, { "key": "ipv6", "value": "string", "description": "string\nThe asset's ipv6 address", "disabled": true }, { "key": "last_booted_at", "value": "string", "description": "string\nA datetime (as an iso8601 timestamp) identifying when the asset was last booted\n\n", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string - A datetime (as an iso8601 timestamp) identifying when the asset was last seen", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes about an asset\n\n", "disabled": true }, { "key": "operating_system", "value": "string", "description": "string\nThe operating system of the asset", "disabled": true }, { "key": "owner", "value": "string", "description": "string\nThe name of the owner of an asset.", "disabled": true }, { "key": "priority", "value": "int32", "description": "int32\nThe priority of the asset; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "reset_tags", "value": "boolean", "description": "Boolean - reset tags?", "disabled": true }, { "key": "remove_tags", "value": "[]", "description": "array of strings- specify which ones to remove", "disabled": true }, { "key": "tags", "value": "[]", "description": "array of strings - add tags", "disabled": true }, { "key": "realtime", "value": "boolean", "description": "Boolean - determines if indexing is required in real time or background", "disabled": true } ] }, "description": "Update multiple assets at a time using the bulk update endpoint. Update limit is 30,000 assets at a time.\r\n\r\nBy default we will index the assets in the background. In order to index your assets synchronously pass in the realtime parameter and set it to true.\r\n\r\nIn addition to the standard attributes on the \"asset\" parameter, you can also provide a \"remove_tags\" params: an array of strings that represent tags you would like removed, and a \"reset_tags\" param: a boolean value set to true if you would like to completely clear tags for each asset." }, "response": [] }, { "name": "Show Asset Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/:id/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id", "vulnerabilities" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "ID can be found in Kenna Platform in URL after selecting the asset" } ] }, "description": "Returns all vulnerabilities for a single asset." }, "response": [] }, { "name": "Download Zipped Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/download_data_zip", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "download_data_zip" ] }, "description": "Will return a gzipped file with the most recent data export of all of your assets. In order to arrange for a daily full data export please contact our tech support staff." }, "response": [] } ], "description": "Kenna API use cases for Assets within the Kenna Platform." }, { "name": "Asset Tagging", "item": [ { "name": "List Tags", "event": [ { "listen": "prerequest", "script": { "exec": [ "\r", "" ], "type": "text/javascript" } } ], "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/:id/tags", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id", "tags" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "ID can be found in Kenna Platform in URL after selecting the asset" } ] }, "description": "Returns a list of tags for a given asset." }, "response": [] }, { "name": "Tag an Asset", "event": [ { "listen": "prerequest", "script": { "exec": [ "\r", "" ], "type": "text/javascript" } } ], "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\":\r\n {\r\n \"tags\" : [\"tcg\",\"123\"]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/:id/tags", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id", "tags" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "ID can be found in Kenna Platform in URL after selecting the asset" } ] }, "description": "Update a single asset by ID with given tags or tag. Supports either an array of tags, each tag wrapped in single or double quotes, or a single string with a comma separator." }, "response": [] }, { "name": "Untag an Asset", "event": [ { "listen": "prerequest", "script": { "exec": [ "\r", "" ], "type": "text/javascript" } } ], "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\":\r\n {\r\n \"tags\" : [\"123\", \"https\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/{{id}}/tags", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "{{id}}", "tags" ], "query": [ { "key": "**{{id}} - field to be updated in the variable or URL above**", "value": "int32", "description": "Asset ID found in the Kenna Platform URL when the asset is selected", "disabled": true } ] }, "description": "Update a single asset by ID removing given tags or tag. Supports either an array of tags, each tag wrapped in single or double quotes, or a single string with a comma separator." }, "response": [] } ] }, { "name": "Asset Groups", "item": [ { "name": "List Asset Groups", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups" ], "query": [ { "key": "page", "value": "int32", "description": "int32 - The specific page being requested.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "int32 - Number of Asset Groups per page. This differs from the typical default of 1000.", "disabled": true } ] }, "description": "Returns a list of all of your asset groups. Pagination defaults to a value of 30 asset groups per page, which differs from the typical default of 1000 items per page." }, "response": [] }, { "name": "Show Asset Group", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**Update {{id}} in the URL above to reflect asset group ", "value": "int32", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true } ] }, "description": "Returns a single asset group by ID." }, "response": [] }, { "name": "Show All Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}/fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}", "fixes" ], "query": [ { "key": "**Update {{id}} in the URL above to reflect asset group ", "value": "int32", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true } ] }, "description": "Returns a paginated list of fixes that are related to all of your open vulnerabilities within an asset group. The default and maximum page size is 100. The total number of fixes, page number, and total number of pages are available in the meta data.\r\n\r\nThis request may take longer to complete depending on the number of assets and vulnerabilities associated with your asset group." }, "response": [] }, { "name": "Show Top Fix Groups", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/top_fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "top_fixes" ], "query": [ { "key": "fix_type", "value": "string", "description": "string- The type of fixes you wish to retrieve. Can be either \"infrastructure\" (default) or \"appsec\".", "disabled": true }, { "key": "hide_asset", "value": "boolean", "description": "boolean - Set to \"true\" to hide assets and only return fix data.\n\n", "disabled": true } ], "variable": [ { "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "key": "id", "type": "string", "value": "189999" } ] }, "description": "Returns top fixes for an asset group ID. You can optionally hide assets and only return fix data by passing the hide_asset parameter and setting it equal to true" }, "response": [] }, { "name": "Create Asset Group and Risk Meter", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset_group\":\r\n {\r\n \"name\":\"Test123\",\r\n \"query\":\r\n {\r\n \"status\": [\"active\"],\r\n \"tags\": [\"foo\", \"bar\"],\r\n \"vulnerability\":\r\n { \r\n \"q\":\"vulnerability_found:>now-90d AND closed_at:>now-1d\"\r\n }\r\n } \r\n }\r\n}\r\n", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups" ], "query": [ { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - If you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags. For example, if you want to return all assets the have the tag foo and the tag bar your request would look like this:", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] }, "description": "Creates a new Asset Group and Risk Meter." }, "response": [] }, { "name": "Create Risk Meter from Custom Field", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset_group\":\r\n {\r\n \"name\":\"Custom Field Test\",\r\n \"query\":\r\n {\r\n \"status\": [\"active\"],\r\n \"vulnerability\":\r\n { \r\n \"custom_fields\":\"Custom Field Dummy:Example custom field text\"\r\n }\r\n } \r\n }\r\n}\r\n", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups" ], "query": [ { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - If you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags. For example, if you want to return all assets the have the tag foo and the tag bar your request would look like this:", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] } }, "response": [] }, { "name": "Update Asset Group", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset_group\":\r\n {\r\n \"name\" : \"demotcg2\"\r\n }\r\n }\r\n", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**{{id}} above in url (or variable) to be updated with asset group ID found in Kenna Platform", "value": null, "description": "**Select asset group in Kenna Platform and get asset id from the URL", "disabled": true }, { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - If you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags. For example, if you want to return all assets the have the tag foo and the tag bar your request would look like this:", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] }, "description": "Update a single asset group's attributes by ID. This will update the asset group's risk meter as well." }, "response": [] }, { "name": "Delete Asset Group", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true } ] }, "description": "Delete as asset group using its ID. This also deletes its risk meter." }, "response": [] } ] }, { "name": "Asset Group Reporting", "item": [ { "name": "Historical Mean Time To Remediate by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_mean_time_to_remediate_by_risk_level?all_time=true", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_mean_time_to_remediate_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "all_time", "value": "true", "description": "boolean- Setting this parameter to any value will retrieve the MTTR for the asset group for its whole lifetime. This parameter overrides the start_date and end_date parameters." }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "189941", "description": "ID of Risk Meter requested" } ] }, "description": "Returns a listing of the historical Mean Time To Remediate by Risk Level (MTTR) for the Asset Group ID provided." }, "response": [] }, { "name": "Historical Risk Meter Scores", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_risk_meter_scores", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_risk_meter_scores" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "all_time", "value": "boolean", "description": "boolean- Setting this parameter to any value will retrieve the MTTR for the asset group for its whole lifetime. This parameter overrides the start_date and end_date parameters.", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "description": "Risk meter ID" } ] }, "description": "Returns a listing of the historical Risk Meter scores for the Asset Group ID provided. If a start or end date is not provided, this endpoint defaults to returning risk meter scores for all time for the specified Asset Group." }, "response": [] }, { "name": "Historical Vulnerability Risk Category Counts", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_open_vulnerability_count_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_open_vulnerability_count_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or in the variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns a listing of the historical Vulnerability Risk Category (\"High\", \"Medium\", \"Low\") counts for the Asset Group ID provided. If a start or end date is not provided, this endpoint defaults to returning data for all time for the specified Asset Group." }, "response": [] }, { "name": "Historical Vulnerability Risk Category Counts Copy", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_open_vulnerability_count_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_open_vulnerability_count_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns a listing of the historical Vulnerability Risk Category (\"High\", \"Medium\", \"Low\") counts for the Asset Group ID provided. If a start or end date is not provided, this endpoint defaults to returning data for all time for the specified Asset Group." }, "response": [] }, { "name": "Vulnerabilities by Due Date", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/vulnerabilities_by_due_date", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "vulnerabilities_by_due_date" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns the count of vulnerabilities for a given Asset Group categorized by when they are due." }, "response": [] }, { "name": "Average Days Open by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_avg_days_open_vulnerabilities_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_avg_days_open_vulnerabilities_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 ", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns the average days open of vulnerabilities by risk status in each level (low, medium, and high) for a given Asset Group over time." }, "response": [] }, { "name": "Risk Accepted by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/risk_accepted_over_time", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "risk_accepted_over_time" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 ", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns the count of vulnerabilities with risk-accepted status in each level (low, medium, and high) for a given Asset Group over time." }, "response": [] }, { "name": "False Positive by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_false_positives_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_false_positives_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 ", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "" } ] }, "description": "Returns the count of vulnerabilities manually marked as false positive for a given date range, grouped by risk level." }, "response": [] }, { "name": "Past Due Vulnerabilities by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_past_due_vulnerabilities_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_past_due_vulnerabilities_by_risk_level" ], "query": [ { "key": "", "value": "", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 ", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected" } ] }, "description": "Returns the count of vulnerabilities that are past their due date for a given date range, grouped by risk level." }, "response": [] }, { "name": "Refresh Reporting Data", "request": { "method": "POST", "header": [], "url": { "raw": "https://{{API_URL}}/clients/refresh_reports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "clients", "refresh_reports" ], "query": [ { "key": "", "value": "", "disabled": true } ] }, "description": "Refresh all reporting data. Only one client report refresh can be run at a time. If the scheduled client report refresh or a manual refresh is already running you will not be able to manually kick off a new one until the one currently running is finished." }, "response": [] }, { "name": "Get Refresh Reporting Status", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/clients/refresh_reports_status", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "clients", "refresh_reports_status" ], "query": [ { "key": "", "value": "", "disabled": true } ] }, "description": "Get status of reporting data refresh . Only one client report refresh can be run at a time. If the scheduled client report refresh or a manual refresh is already running you will not be able to manually kick off a new one until the one currently running is finished." }, "response": [] } ] }, { "name": "Connectors", "item": [ { "name": "List Connectors", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors" ] }, "description": "Returns a list of all of your connectors." }, "response": [] }, { "name": "Update Connector", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"connector\": {\r\n \"name\": \"\",\r\n \"host\": \"\",\r\n \"username\": \"\",\r\n \"password\": \"\",\r\n \"api_key\": \"\",\r\n \"scan_policy\": \"\",\r\n \"scan_list\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/connectors/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", "{{id}}" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect connector identifier", "value": "int32 above", "description": "Connector id can be found in Kenna platform URL when connector is selected", "disabled": true }, { "key": "{{**All items below are to be updated in the body tab -- here only for doc}}", "value": null, "disabled": true }, { "key": "name", "value": "string", "description": "string- The name used to identify this connector within Kenna.", "disabled": true }, { "key": "host", "value": "string", "description": "string - The hostname of your vulnerability scanner (if applicable).", "disabled": true }, { "key": "username", "value": "string", "description": "string - The username of an account on your vulnerability scanner (if applicable).\n\n", "disabled": true }, { "key": "password", "value": "string", "description": "string - The password of an account on your vulnerability scanner (if applicable).\n\n", "disabled": true }, { "key": "api_key", "value": "string", "description": "string - The API key used to access your vulnerability scanner (if applicable).", "disabled": true }, { "key": "scan_policy", "value": "string", "description": "string - The stored policy the vulnerability scanner uses for this connector.", "disabled": true }, { "key": "scan_list", "value": "string", "description": "string - The list of scans with this connector (if applicable). List is a comma separated string, or null.", "disabled": true } ] }, "description": "Updates the attributes of a connector by given id." }, "response": [] } ] }, { "name": "Connector Runs", "item": [ { "name": "List Connector Runs", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors/{{id}}/connector_runs/{{connector_run_id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", "{{id}}", "connector_runs", "{{connector_run_id}}" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect connector identifier", "value": "int32 above", "description": "Connector id can be found in Kenna platform in URL when selected from connector tab", "disabled": true } ] }, "description": "Returns a list of connector runs for a connector." }, "response": [] }, { "name": "Show Connector Run", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors/{{id}}/connector_runs/{{connector_run_id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", "{{id}}", "connector_runs", "{{connector_run_id}}" ], "query": [ { "key": "**Update connector run {{id}} in the URL above (or variable) to reflect connector run identifier", "value": "int32 above", "description": "Connector id can be found from UI when selected", "disabled": true }, { "key": "**Update connector run {{connector_run_id}}} in the URL above (or variable) to reflect connector run identifier", "value": null, "description": "Connector run id can be found from API \"List ", "disabled": true } ] }, "description": "Return a single connector run by ID." }, "response": [] }, { "name": "Upload Data File", "protocolProfileBehavior": { "disabledSystemHeaders": {} }, "request": { "method": "POST", "header": [], "body": { "mode": "formdata", "formdata": [ { "key": "file", "contentType": "application/xml", "type": "file", "src": "/C:/Users/toby/Downloads/Kenna API.postman_collection_v4.json" }, { "key": "run", "value": "true", "type": "text" } ], "options": { "raw": { "language": "text" } } }, "url": { "raw": "https://{{API_URL}}/connectors/:id/data_file", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", ":id", "data_file" ], "query": [ { "key": "{{**Update params below in body tab - doco only below **}}", "value": null, "description": "{{**Update params below in body tab - doco only below **}}", "disabled": true }, { "key": "file", "value": "file name", "description": "File to be uploaded and associated with connector", "disabled": true }, { "key": "encoding", "value": "string", "description": "string - Compression encoding (or absent, currently deflate is the only valid encoding if this parameter is present) of the file input.", "disabled": true }, { "key": "run", "value": "boolean", "description": "boolean \"true\" if you want the connector to run immediately after the file has been uploaded", "disabled": true } ], "variable": [ { "key": "id", "value": "154513", "type": "string", "description": "Connector run id can be found from API \"List Connector Runs\"" } ] }, "description": "Uploads a data file to a file based connector.\r\n\r\n-- Including the parameter \"Content-Type: application/json\" in the header will result in a 422 Unprocessable Entity.\r\n-- Including the parameter \"run: true\", refer to the response from the Run Connector endpoint." }, "response": [] }, { "name": "Run Connector", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors/:id/run", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", ":id", "run" ], "query": [ { "key": "data_files[]", "value": "array of integers", "description": "array of integers - associated with data files uploaded. Defaults to the most recently updated if not specified.\n", "disabled": true } ], "variable": [ { "key": "id", "value": "int32 above", "type": "string", "description": "Connector id can be found in Kenna platform in URL when selected from connector tab" } ] }, "description": "Schedules a run of a connector. If file based, it will use the \"data_files\" parameter if present, or else the most recently uploaded data file." }, "response": [] } ] }, { "name": "Users", "item": [ { "name": "List Users", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/users", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users" ] }, "description": "Returns a list of all of your users." }, "response": [] }, { "name": "Show User", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/users/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "Kenna ID for user found in the Kenna Platform when user is selected" } ] }, "description": "Returns a single user by ID." }, "response": [] }, { "name": "Create User", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"user\": {\r\n \"email\": \"\",\r\n \"firstname\": \"\",\r\n \"lastname\": \"\",\r\n \"roles\": [\"normal user\", \"custom_user\"],\r\n \"role_ids\": [4422, 4433], \"phone\": \"\",\r\n \"current_password\": \"\",\r\n \"password\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/users", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users" ], "query": [ { "key": "{{BODY PARAMS BELOW}}", "value": null, "disabled": true }, { "key": "**user ", "value": "object", "disabled": true }, { "key": "**email", "value": "string", "description": "string - The user will need an email address in order to login to Kenna.", "disabled": true }, { "key": "**firstname", "value": "string", "description": "sring - first nameof the user", "disabled": true }, { "key": "**lastname", "value": "string", "description": "string - last name of the user", "disabled": true }, { "key": "**role", "value": "string", "description": "string - role assigned to a user", "disabled": true }, { "key": "**phone", "value": "string", "description": "string - The user's phone number", "disabled": true }, { "key": "**current_password", "value": "string", "description": "string - Existing password, if you wish to update the user's password", "disabled": true }, { "key": "**password", "value": "string", "description": "string - New password, if you wish to update the user's password. current_password must be provided correctly, or this operation will fail.", "disabled": true } ] }, "description": "Creates a single user and returns the record." }, "response": [] }, { "name": "Update User", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"user\":\r\n {\r\n \"firstname\": \"Steve\",\r\n \"lastname\": \"Allen\",\r\n \"roles\": [\"normal user\", \"custom_user\"],\r\n \"role_ids\": [4422, 4433], \"phone\": \"\",\r\n \"current_password\": \"\", \"password\": \"\" }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/users/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", ":id" ], "query": [ { "key": "{{BODY PARAMS BELOW}}", "value": null, "disabled": true }, { "key": "**See all options in \"Create User\"", "value": "string", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - found in Kenna Platform when user is selected" } ] }, "description": "Update a single user's attributes by ID." }, "response": [] }, { "name": "Delete User", "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/users/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", ":id" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - found in Kenna Platform when user is selected" } ] }, "description": "Delete a user using their ID." }, "response": [] } ] }, { "name": "Roles", "item": [ { "name": "List Roles", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/roles", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles" ] }, "description": "Returns a list of all of your roles." }, "response": [] }, { "name": "Show Role", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/roles/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - id of the role found in Kenna when it is selected" } ] }, "description": "Returns a single role by ID." }, "response": [] }, { "name": "Create Role", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"name\":\"Demo1234\",\r\n \"access_level\":\"read\",\r\n \"asset_groups\":[\"All Linux\"],\r\n \"applications\":[\"Bookstore\"]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", "" ], "query": [ { "key": "**All Params updated in Body Tab", "value": null, "description": "role - object\nname - string - The name of the role.\naccess_level - string - The access level assigned to the role. This must be either \"read\" or \"write\"\nasset_groups - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned.\nasset_groups - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned.\napplications - array of strings - An array of application names to add to a role's set of applications.", "disabled": true } ] }, "description": "Creates a single role and returns the record." }, "response": [] }, { "name": "Update Role", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"name\" : \"new role\",\r\n \"applications\" : [\"Test PHP\", \"Aziz Test\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id" ], "query": [ { "key": "**All other Params updated in Body Tab", "value": null, "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - id of the role found in Kenna when selected" } ] }, "description": "Update a single role's attributes by ID.\r\n\r\nWhen updating asset groups for a role, all current asset groups for a role will be over written by the array passed in the update params. To add asset groups to a role without overwriting a role's current asset groups use the add_asset_groups endpoint. If you would like to update custom role permissions, please use the custom_permissions endpoint." }, "response": [] }, { "name": "Add Asset Group(s) to Role", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"asset_groups\" : [\"new group\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id/add_asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id", "add_asset_groups" ], "query": [ { "key": "**asset_groups - updated in body tab", "value": "array of strings", "description": "array of strings - An array of asset group names to add to a role's existing set of asset groups.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - ID of role found in the Kenna platform when selected" } ] }, "description": "Update a single role's attributes by ID." }, "response": [] }, { "name": "Add Application(s) to Role", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"applications\" : [\"Valid application name\", \"Another application name\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id/add_applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id", "add_applications" ], "query": [ { "key": "**All other Params updated in Body Tab", "value": null, "description": "role - object\nname - string - The name of the role.\naccess_level - string - The access level assigned to the role. This must be either \"read\" or \"write\"\nasset_groups - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned.\nasset_groups - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned.\napplications - array of strings - An array of application names to add to a role's set of applications.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - ID of role found in Kenna platform after it is selected" } ] }, "description": "Update a single role's attributes by ID." }, "response": [] }, { "name": "Delete Role", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/roles/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "ID of role that needs to be deleted" } ] }, "description": "Delete a role using its ID. A role cannot be deleted if it is connected to a user." }, "response": [] }, { "name": "Update Role Custom Permissions", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"permissions\": {\r\n \t \"edit_asset_status\": \"false\",\r\n \"edit_asset_notes\": \"true\"\r\n }\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id/custom_permissions", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id", "custom_permissions" ], "query": [ { "key": "**Body Params only", "value": "doc >>>>>>", "description": "role\nobject\n\npermissions\nobject\npermissions\nedit_asset_groups\nboolean\n\ncreate_service_ticket\nboolean\n\nshare_fixes\nboolean\n\nexport_data\nboolean\n\nedit_asset_status\nboolean\n\nedit_asset_locators\nboolean\n\nedit_asset_priority\nboolean\n\nedit_asset_notes\nboolean\n\nedit_asset_tags\nboolean\n\nedit_asset_owner\nboolean\n\nedit_asset_operating_system\nboolean\n\nedit_vulnerability_notes\nboolean\n\nedit_vulnerability_status\nboolean\n\nedit_vulnerability_custom_fields\nboolean\n\nedit_vulnerability_score_override\nboolean\n\nedit_vulnerability_due_date\nboolean\n", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - found for role in UI" } ] }, "description": "Update custom role permissions." }, "response": [] } ] }, { "name": "Fixes", "item": [ { "name": "List Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes" ], "query": [ { "key": "page", "value": "int32", "description": "which page to list", "disabled": true }, { "key": "per_page", "value": "int32", "description": "number to display per page", "disabled": true } ] }, "description": "Returns a paginated list of fixes that are related to all of your open vulnerabilities that have active assets. The default page size is 25 and the maximum page size is 100. The total number of fixes, page number, and total number of pages are available in the meta data.\r\n\r\nNote: this request may take longer to complete depending on the number of assets and vulnerabilities associated with your fixes." }, "response": [] }, { "name": "Search Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes", "search" ], "query": [ { "key": "active_internet_breach[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that have seen tranding breach activity.", "disabled": true }, { "key": "id[]", "value": "int32", "description": "array of integers - Search for all fixes related to vulnerabilities that are connected to a set of assets.\n\nid\n\n", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - By default, only fixes for vulnerabilities with active assets are returned. To override this default specify the status param for an asset as shown. Status choices are active and inactive.", "disabled": true }, { "key": "connector_names[]", "value": "array of strings", "description": "array of strings - An array of connector names related to your vulnerabilities.", "disabled": true }, { "key": "connector_types[]", "value": "array of strings", "description": "array of strings - An array of connector types related to your vulnerabilities.", "disabled": true }, { "key": "custom_field:CUSTOM_FIELD_NAME[]", "value": "array of strings", "description": "array of strings - Search for all fixes for vulnerabilities that have a specific custom field value. The proper format for a custom field query is 'custom_fields:' then the name of the custom_field you are searching on, then the value you are searching for.\n\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/fixes/search?custom_field:test_score[]=1&custom_field:test_date[]=10/1/2015\" -X GET", "disabled": true }, { "key": "easily_exploitable[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that have seen high levels of exploitation recently.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of vulnerability ids", "disabled": true }, { "key": "malware_exploitable[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that have had pieces of malware identified.", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32 - Find all fixes for vulnerabilities with risk scores less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Find all fixes for vulnerabilities with risk scores greater than this value.", "disabled": true }, { "key": "pci_related[]", "value": "array of booleans", "description": "array of booleans - An array of booleans to filter for PCI related vulnerabilities.", "disabled": true }, { "key": "popular_target[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that are popular targets.", "disabled": true }, { "key": "port[]", "value": "array of integers", "description": "array of integers - An array of ports associated with your vulnerabilities.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32 - The ID of a risk meter group to retrieve fixes for. Other parameters are ignored if search_id is provided.", "disabled": true }, { "key": "service_ticket_status", "value": "array of strings", "description": "array of strings - An array of strings that represent the statuses of all service tickets connected to your vulnerabilities.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for vulnerabilities.", "disabled": true }, { "key": "top_priority[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that Kenna recommends should be a top priority to fix.", "disabled": true }, { "key": "vulnerability_class[]", "value": "array of strings", "description": "array of strings - An array of strings describing the class of your vulnerabilities.", "disabled": true }, { "key": "wasc_classification[]", "value": "array of strings", "description": "array of strings - An array of WASC classifications related to your vulnerabilities.", "disabled": true }, { "key": "zero_day[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that are classified as zero days.", "disabled": true } ] }, "description": "Filters fixes by a given set of vulnerability and asset parameters and returns the filtered fixes as well as the total number of fixes. By default, only fixes for open vulnerabilities with active assets are returned. Results are paginated in pages of 100. Each unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all fixes belonging to vulnerabilities with status=[\"open\"] and port=[\"443\", \"80\"] you will receive all fixes for open vulnerabilities that have either port 443 or port 80. This is shown in the CURL example below." }, "response": [] }, { "name": "Show Fix", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - found in Kenna when fix is selected" } ] }, "description": "Returns a single fix by ID." }, "response": [] }, { "name": "List Fix Alternatives", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes/:id/alternatives", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes", ":id", "alternatives" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - found in Kenna when fix is selected" } ] }, "description": "Returns a paginated list of a single fix's alternative fixes by a fix's ID. The default page size is 25, the maximum page size is 100. The total number of alternative fixes, page number, and total number of pages are available in the meta data." }, "response": [] } ] }, { "name": "Applications", "item": [ { "name": "List Applications", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications" ] }, "description": "Returns a list of all of your applications." }, "response": [] }, { "name": "Show Application", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id" ], "query": [ { "key": "doc only>>", "value": "doc only>>", "description": "Response attribute\tDescription\nid\tThe unique identifier in the Kenna system\nname\tName of the application\nrepo_url\tURL of the repository for the application\nhost_name\tHost Name of the application\nowner\tOwner of the application\nteam_name\tTeam Name of the application\nbusiness_units\tBusiness Units of the application\nnotes\tNotes for the application\nrisk_meter_score\tRisk meter score of the application\nvulnerability_count\tNumber of vulnerabilities associated with an application\nasset_count\tNumber of assets associated with the application\ntotal_vulnerability_count\tNumber of vulnerabilities associated with an application including closed vulnerabilities and vulnerabilities on inactive assets\nopen_vulnerability_count_by_risk_level\tNumber of vulnerabilities open vulnerabilities separated by high risk, medium risk, low risk, and total\nidentifiers\tArray of identifiers for the application\nexternal_facing\tTrue if the application is external facing.\npriority\tPriority of application, on a scale of 1 (low) to 10 (high).", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - ID of application found in Kenna when selected" } ] }, "description": "Return a single application by ID." }, "response": [] }, { "name": "Update Application", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"application\": {\r\n \"name\": \"Demo Test 12\",\r\n \"repo_url\": \"Demo repo URL\",\r\n \"host_name\": \"Demo host name\",\r\n \"owner\": \"Demo owner\",\r\n \"team_name\": \"Demo team\",\r\n \"business_units\": \"Demo business units\",\r\n \"notes\": \"Demo notes\",\r\n \"priority\": 10,\r\n \"identifiers\": [\r\n \"demo2\",\"demo3\"\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/applications/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id" ], "query": [ { "key": "{{id}} - ** updated in path above or variable", "value": "int32", "description": "int32 - id of application found in Kenna when selected", "disabled": true }, { "key": "**Items to be updated in Body Tab", "value": "doc only>>", "description": "application\nobject\n\nbusiness_units\nstring\nBusiness units for the application\n\nexternal_facing\nboolean\nSet this to true if your application is external facing.\n\n\ntrue\nidentifiers\narray of strings\nArray of identifiers for the application\n\nidentifiers\n\nhost_name\nstring\nName of the host where the application is deployed\n\nname\nstring\nName of the application\n\nnotes\nstring\nAny notes regarding the application\n\nowner\nstring\nName of the application owner\n\npriority\nint32\nThe priority of your application, on a scale of 1 (low priority) to 10 (high priority).\n\n10\nrepo_url\nstring\nURL to the code repository for the application\n\nteam_name\nstring\nName of the team responsible for the application\n\n", "disabled": true } ], "variable": [ { "key": "id", "value": "245134", "type": "string" } ] }, "description": "Update a single application's attributes by ID." }, "response": [] }, { "name": "Delete Application", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - ID of application found in Kenna when selected" } ] }, "description": "Delete an Application using its ID." }, "response": [] }, { "name": "Create Application", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"application\": {\r\n \"name\": \"Demo app\",\r\n \"repo_url\": \"Demo repo URL\",\r\n \"host_name\": \"Demo host name\",\r\n \"owner\": \"Demo owner\",\r\n \"team_name\": \"Demo team\",\r\n \"business_units\": \"Demo business units\",\r\n \"notes\": \"Demo notes\",\r\n \"priority\": 10,\r\n \"identifiers\": [\r\n \"WA-123\"\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications" ], "query": [ { "key": "**Items to be updated in Body Tab", "value": "doc only>>", "description": "application\nobject\n\nbusiness_units\nstring\nBusiness units for the application\n\nexternal_facing\nboolean\nSet this to true if your application is external facing.\n\n\ntrue\nidentifiers\narray of strings\nArray of identifiers for the application\n\nidentifiers\n\nhost_name\nstring\nName of the host where the application is deployed\n\nname\nstring\nName of the application\n\nnotes\nstring\nAny notes regarding the application\n\nowner\nstring\nName of the application owner\n\npriority\nint32\nThe priority of your application, on a scale of 1 (low priority) to 10 (high priority).\n\n10\nrepo_url\nstring\nURL to the code repository for the application\n\nteam_name\nstring\nName of the team responsible for the application\n\n", "disabled": true } ] }, "description": "Creates a single Application and returns the record." }, "response": [] } ] }, { "name": "Application Reporting", "item": [ { "name": "Historical Mean Time To Remediate by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id/report_query/historical_mean_time_to_remediate_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id", "report_query", "historical_mean_time_to_remediate_by_risk_level" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Kenna when selected" } ] }, "description": "Returns a listing of the historical Mean Time To Remediate by Risk Level (MTTR) for the Application ID provided." }, "response": [] }, { "name": "Historical Vulnerability Risk Category Counts", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id/report_query/historical_open_vulnerability_count_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id", "report_query", "historical_open_vulnerability_count_by_risk_level" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Kenna when selected" } ] }, "description": "Returns a listing of the historical Vulnerability Risk Category (\"High\", \"Medium\", \"Low\") counts for the Application ID provided. This endpoint returns \"all time\" data for the specified Application." }, "response": [] } ] }, { "name": "Dashboard Groups (Views)", "item": [ { "name": "Create Dashboard Group", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups" ], "query": [ { "key": "**Update in Body Tab", "value": "**Doc Only -->>", "description": "dashboard_group\nobject\n\nasset_search_ids\narray of integers\nasset_search_ids\n\nasset_search_order\nstring\nname\nstring\nrole_ids\narray of integers\nCan only by updated by the creator of the Dashboard Group\n\nrole_ids\n\nshare_method\nstring\nCan only by updated by the creator of the Dashboard Group", "disabled": true } ] }, "description": "Creates a single Dashboard Group and returns the record." }, "response": [] }, { "name": "Update Dashboard Group", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups", ":id" ], "query": [ { "key": "**Update in Body Tab", "value": "**Doc Only -->>", "description": "dashboard_group\nobject\n\nasset_search_ids\narray of integers\nasset_search_ids\n\nasset_search_order\nstring\nname\nstring\nrole_ids\narray of integers\nCan only by updated by the creator of the Dashboard Group\n\nrole_ids\n\nshare_method\nstring\nCan only by updated by the creator of the Dashboard Group", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Kenna when selected" } ] }, "description": "Update a single Dashboard Group's attributes by ID. Only the creator of a Dashboard Group can edit its Role IDs or Share Method." }, "response": [] }, { "name": "Show Dashboard Group", "protocolProfileBehavior": { "disableBodyPruning": true }, "request": { "method": "GET", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups", ":id" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of dashboard group found in Kenna when selected" } ] }, "description": "Return a single Dashboard Group by ID." }, "response": [] }, { "name": "List Dashboard Groups", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/dashboard_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups" ] }, "description": "Returns a list of all of your Dashboard Groups." }, "response": [] }, { "name": "Delete Dashboard Group", "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups", ":id" ], "variable": [ { "key": "id", "value": "int32", "description": "int32 - id of dashboard group found in Kenna when selected" } ] }, "description": "Delete a Dashboard Group using its ID." }, "response": [] } ] }, { "name": "Data Export", "item": [ { "name": "Assets", "item": [ { "name": "Request Data Export - Vulnerable Active Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"asset\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] } }, "response": [] }, { "name": "RDE - All Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\n \"status\": [\n \"inactive\",\n \"active\"\n ],\n \"exclude_child_filter\" : [\n \"include all assets\"\n ],\n \"export_settings\" : {\n \"format\": \"json\",\n \"model\": \"asset\"\n }\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ] } }, "response": [] }, { "name": "RDE - Inactive Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\n \"status\": [\n \"inactive\"\n ],\n \"export_settings\" : {\n \"format\": \"json\",\n \"model\": \"asset\"\n }\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ] } }, "response": [] }, { "name": "RDE - Assets Updated in Last Two Weeks", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\n \"status\": [\n \"inactive\",\n \"active\"\n ],\n \"exclude_child_filter\" : [\n \"include all assets\"\n ],\n \"records_updated_since\": \"now-2w\",\n \"export_settings\" : {\n \"format\": \"json\",\n \"model\": \"asset\"\n }\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ] } }, "response": [] } ] }, { "name": "Vulnerabilities", "item": [ { "name": "Request Data Export - Open Vulnerabilities on Active Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"],\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "Filters client data by a given set of parameters the exact same way the search endpoints do. The request is processed in the background.\r\n\r\nUser must specify the format of the data, including the model type (\"asset\", \"vulnerability\", or \"fix\"), and data format (\"json\", \"xml\"). Due to the async nature of the request, a search_id is returned which can be used to get the results of the search once the processing of the request is complete. Search IDs are valid for 30 days after the initial request is made.\r\n\r\nFor a full list of query parameters to search by, see the search parameter section for your chosen model type." }, "response": [] }, { "name": "Request Data Export - All Vulnerabilities on All Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\":{\r\n \"status\":[\r\n \"active\",\r\n \"inactive\"\r\n ]\r\n },\r\n \"status\" : [\r\n \"open\",\r\n \"closed\",\r\n \"risk accepted\",\r\n \"false positive\"\r\n ],\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "Filters client data by a given set of parameters the exact same way the search endpoints do. The request is processed in the background.\r\n\r\nUser must specify the format of the data, including the model type (\"asset\", \"vulnerability\", or \"fix\"), and data format (\"json\", \"xml\"). Due to the async nature of the request, a search_id is returned which can be used to get the results of the search once the processing of the request is complete. Search IDs are valid for 30 days after the initial request is made.\r\n\r\nFor a full list of query parameters to search by, see the search parameter section for your chosen model type." }, "response": [] }, { "name": "Request Data Export - Vulneabilities by Risk Meter ID", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"], \r\n \"search_id\" : \"252539\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] } }, "response": [] }, { "name": "Request Data Export - Vulnerabilities by Vulnerability ID", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"q\":\"vulnerability_id:*1\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "Filters client data by a given set of parameters the exact same way the search endpoints do. The request is processed in the background.\r\n\r\nUser must specify the format of the data, including the model type (\"asset\", \"vulnerability\", or \"fix\"), and data format (\"json\", \"xml\"). Due to the async nature of the request, a search_id is returned which can be used to get the results of the search once the processing of the request is complete. Search IDs are valid for 30 days after the initial request is made.\r\n\r\nFor a full list of query parameters to search by, see the search parameter section for your chosen model type." }, "response": [] }, { "name": "Request Data Export - Vulnerabilities Updated In Last Two Weeks", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"],\r\n \"records_updated_since\" : \"now-2w\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "This endpoint also takes the records_updated_since\r\nparameter to support incremental exports. It will fetch all records updated since that time. This can be added to both asset and vulnerabilities and will work with an offset(\u2018-2d\u2019) or a timestamp(2020-09-09 00:00:00\r\n)\r\nNote: This value is tied to last_indexed_at which means that if your data was reindexed you would get the full data set in the next pull" }, "response": [] }, { "name": "Request Data Export - Vulnerabilities Updated After Timestamp", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"],\r\n \"records_updated_since\" : \"2020-12-01 00:00:00\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "This endpoint also takes the records_updated_since\r\nparameter to support incremental exports. It will fetch all records updated since that time. This can be added to both asset and vulnerabilities and will work with an offset(\u2018-2d\u2019) or a timestamp(2020-09-09 00:00:00\r\n)\r\nNote: This value is tied to last_indexed_at which means that if your data was reindexed you would get the full data set in the next pull" }, "response": [] } ] }, { "name": "Fixes", "item": [ { "name": "Request Data Export - Fixes", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"fix\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] } }, "response": [] } ] }, { "name": "Retrieve Data Export", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/data_exports?search_id=int32", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "search_id", "value": "int32", "description": "Get all results from a previously created asynchronous search from search_id. \nResponse data will be found in local gzip file" } ] }, "description": "Get all results from a previously created asynchronous search using the search_id.\r\n\r\nIf your search has not been completed you will receive an Export Incomplete Response to indicate that we are still processing your search results." }, "response": [] }, { "name": "Check Data Export Status", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/data_exports/status?search_id=int32", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports", "status" ], "query": [ { "key": "search_id", "value": "int32", "description": "Get status of a previously created asynchronous search from search_id." } ] }, "description": "Get all results from a previously created asynchronous search using the search_id. This is useful for checking if a search is already in progress, failed, or expired." }, "response": [] }, { "name": "Kill Running Data Export", "request": { "method": "PUT", "header": [], "url": { "raw": "https://{{API_URL}}/data_exports/kill?export_id=int32", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports", "kill" ], "query": [ { "key": "export_id", "value": "int32", "description": "Get all results from a previously created asynchronous search (only use either export_id or Job_uuid)" }, { "key": "job_uuid", "value": "string", "description": "Get all results from a previously created asynchronous search (only use either export_id or Job_uuid)", "disabled": true } ] }, "description": "Kill a running export by specifying the export ID or the export's job UUID." }, "response": [] } ] }, { "name": "KENNA.VI+", "item": [ { "name": "Show Vulnerability Definition", "event": [ { "listen": "test", "script": { "exec": [ "var template = `\r", "\r", "
\r", "\r", "\r", "\r", "`;\r", "\r", "\r", "// In case you only want a specific property, change it here.\r", "//\r", "// Default: You can set the entire JSON response using pm.response.json()\r", "let tableProps = {\r", " json: pm.response.json()\r", "};\r", "\r", "pm.visualizer.set(template, tableProps);" ], "type": "text/javascript" } } ], "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/:cve_id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", ":cve_id" ], "variable": [ { "key": "cve_id", "value": "cve-2014-3566", "type": "string", "description": "string - CVE id in which you want to query" } ] }, "description": "Returns a single vulnerability definition by CVE ID." }, "response": [] }, { "name": "List CVE Identifiers", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/cve_identifiers?updated_since=\"2020-05-01\"", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "cve_identifiers" ], "query": [ { "key": "updated_since", "value": "\"2020-05-01\"", "description": "A datetime (as an iso8601 timestamp) filtering the returned CVE IDs. Only CVEs created or updated after the timestamp are returned." } ] }, "description": "Returns all known CVE IDs." }, "response": [] }, { "name": "Show Multiple Vulnerability Definitions", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions?cves=string", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions" ], "query": [ { "key": "cves", "value": "string", "description": "Comma-delimited list of CVE identifiers. Maximum number of CVEs specified is 600." }, { "key": "****Doco only on what comes out", "value": null, "description": "id\tThe unique identifier in the Kenna system.\nactive_internet_breach\tA boolean identifying if Kenna sees this vulnerability definition in trending breach activity.\ndescription\tA plain text description of the vulnerability definition.\nrisk_meter_score\tAn integer 0-100 representing the sum of the defined CVSS scores and priority for this vulnerability definition.\nsolution\tA plain text description of a solution for remediating the vulnerability definition.\ncve_description\tA plain text description of the CVE for the vulnerability definition.\ncve_id\t\ncvss_score\tThe base score from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_access_complexity\tThe access complexity from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_access_vector\tThe access vector from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_authentication\tThe authentication from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_availability_impact\tThe availability impact from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_confidentiality_impact\tThe confidentiality impact from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_integrity_impact\tThe integrity impact from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_exploit_subscore\tThe exploit subscore from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_impact_subscore\tThe impact subscore from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_temporal_score\tThe temporal score from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_vector\tThe vector from the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_v3_exploit_subscore\tThe exploit subscore from Version 3 of the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_v3_impact_subscore\tThe impact subscore from Version 3 of the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_v3_vector\tThe vector from Version 3 of the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_v3_score\tThe base score from Version 3 of the Common Vulnerability Scoring System. Complete documentation is available from FIRST\ncvss_v3_temporal_score\tThe temporal score from Version 3 the Common Vulnerability Scoring System. Complete documentation is available from FIRST\npredicted_exploitable\tWhether Kenna's algorithm predicts future exploits to develop that leverage this vulnerability\npredicted_exploitable_confidence\tA number that represents the relative confidence in Kenna's prediction for predicted_exploitable\nvelocity_day\tThe number of individual exploitations identified by Kenna in the last day\nvelocity_week\tThe number of individual exploitations identified by Kenna in the last week\nvelocity_month\tThe number of individual exploitations identified by Kenna in the last week\ndaily_trend\tWhether velocity_day has gone up, down, or is holding compared with the previous day.\neasily_exploitable\tWhether velocity_day has gone up, down, or is holding compared with the previous day.\nmalware_exploitable\tA boolean identifying whether this vulnerability definition has had pieces of malware identified.\ncreated_at\tThe ISO timestamp of when the vulnerability definition was created in the Kenna system.\ncve_id\tThis vulnerability definition's CVE ID, if associated.\nsuccessful_exploitations\tNumber of successful exploitations that Kenna is aware of.\nvulnerable_products\tA list of products this vulnerability definition applies to.\nexploits\tAn array of: external_id (The external id of the exploit from the data provider), created_at (The iso timestamp of when the exploit was created in the Kenna system), name (A string identifier for the exploit from the data provider)\nfixes\tAn array of: external_id (A string identifier for the exploit from the data provider), url (A URL to a web page explaining the fix), product (A string representing the product this fix applies to), published_at (The iso timestamp of when the exploit was published)\nmalware\tAn array of: md5 (The MD5 hash of the malware), sha1 (The SHA-1 hash of the malware), sha256 (The SHA-256 hash of the malware)\nlast_modified\tThe iso timestamp of when the vulnerability definition was last modified on NVD's database.", "disabled": true } ] }, "description": "Return one or more vulnerability definitions by CVE ID." }, "response": [] }, { "name": "Show CVE History", "event": [ { "listen": "test", "script": { "exec": [ "// Access the response data JSON as a JavaScript object\r", "const res = pm.response.json();\r", "\r", "// -----------------------------\r", "// - Structure data for charts -\r", "// -----------------------------\r", "\r", "// EDIT THIS OBJECT TO BIND YOUR DATA\r", "const vizData = {\r", " \r", " // Labels take an array of strings\r", " labels: _.map(Object.values(res.CVE-2019-0708), 'changed_at')\r", " \r", " // Data takes an array of numbers\r", " data: _.map(Object.values(res.CVE-2019-0708), 'to')\r", "};\r", "\r", "// ------------\r", "// - Template -\r", "// ------------\r", "\r", "// Configure the template\r", "var template = `\r", "\r", "\r", " \r", "\r", "`;\r", "\r", "// -------------------------\r", "// - Bind data to template -\r", "// -------------------------\r", "\r", "// Set the visualizer template\r", "pm.visualizer.set(template, vizData);" ], "type": "text/javascript" } } ], "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/history?cves=CVE-2019-0708", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "history" ], "query": [ { "key": "****Doco only on what comes out", "value": null, "description": "CVE Attributes\nid\tThe unique identifier in the Kenna system.\nrisk_meter_score\tA numeric value between 0-100 representing the sum of the defined CVSS scores and priority for this vulnerability.\nrisk_meter_score_history\tA list of changes associated with this CVE ordered by the change time (oldest to newest). An empty list is an indication that no changes have been made to the initial risk_meter_score.\nChange Attributes\nchanged_at\tThe date and time of the change occurrence represented as a string.\nfrom\tThe risk_meter_score prior to this change.\nto\tThe risk_meter_score after to this change.\nWarnings\nCustomers who have purchased the Threat API may access any CVE. Customers who have not purchased the Threat API may only access CVEs that correspond to vulnerabilities within their instance.\n\nAttempting to access CVEs which are not available to your account will return a warning response with the following attributes:\n\ncode\tA unique numerical identifier for this warning.\nmessage\tA description of the warning.\nunavailable_cve_identifiers\tA list of CVE identifiers requested, but which are not available to your account.\nurl\tA url link to the API documentation.\nWarning Codes\n1\tOne or more of the requested CVEs are unavailable to your account.", "disabled": true }, { "key": "cves", "value": "CVE-2019-0708" } ] }, "description": "Returns Kenna's CVE score history for one or more CVE identifiers. Customers who have purchased the Threat API may access any CVE. Customers who have not purchased the Threat API may only access CVEs that correspond to vulnerabilities within their instance." }, "response": [] }, { "name": "Show Chatter Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/:cve_id/chatter", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", ":cve_id", "chatter" ], "variable": [ { "key": "cve_id", "value": "cve-2019-0708", "type": "string", "description": "The CVE_ID to be queried" } ] }, "description": "Returns chatter stats for a single vulnerability definition by CVE ID.\r\n\r\nKenna defines chatter as anytime a given vulnerability is mentioned anywhere on the Internet including dark web." }, "response": [] }, { "name": "Show Malware Family Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/:cve_id/malware_families", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", ":cve_id", "malware_families" ], "variable": [ { "key": "cve_id", "value": "cve-2019-0708", "type": "string", "description": "The CVE_ID to be queried" } ] }, "description": "Displays the known malware variant name and malware classifications (family) that are mentioned with a particular CVE. Family type includes classifications such as Ransomware.\r\n\r\nReturns malware family stats for a single vulnerability definition by CVE ID." }, "response": [] } ] }, { "name": "Granular Search", "item": [ { "name": "Get CVE", "request": { "method": "GET", "header": [], "url": { "raw": "https://services.nvd.nist.gov/rest/json/cve/1.0/:cveid", "protocol": "https", "host": [ "services", "nvd", "nist", "gov" ], "path": [ "rest", "json", "cve", "1.0", ":cveid" ], "variable": [ { "key": "cveid", "value": "cve-2018-10388", "type": "string" } ] } }, "response": [] }, { "name": "Get All CVEs", "request": { "method": "GET", "header": [], "url": { "raw": "https://services.nvd.nist.gov/rest/json/cves/1.0", "protocol": "https", "host": [ "services", "nvd", "nist", "gov" ], "path": [ "rest", "json", "cves", "1.0" ] } }, "response": [] }, { "name": "Search CVEs", "request": { "method": "GET", "header": [], "url": { "raw": "https://services.nvd.nist.gov/rest/json/cves/1.0?keyword=Java", "protocol": "https", "host": [ "services", "nvd", "nist", "gov" ], "path": [ "rest", "json", "cves", "1.0" ], "query": [ { "key": "keyword", "value": "Java" }, { "key": "StartIndex", "value": null, "disabled": true }, { "key": "resultsPerPage", "value": null, "disabled": true }, { "key": "pubStartDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "pubEndDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "modStartDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "modEndDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "includeMatchStringChange", "value": null, "disabled": true }, { "key": "isExactMatch", "value": null, "disabled": true }, { "key": "cweld", "value": null, "disabled": true }, { "key": "cvssV2Severity", "value": null, "disabled": true }, { "key": "cvssV3Severity", "value": null, "disabled": true }, { "key": "cvssV2Metrics", "value": null, "disabled": true }, { "key": "cvssV3Metrics", "value": null, "disabled": true }, { "key": "cpeMatchString", "value": "cpe:2.3:o:microsoft:windows_10", "description": "(check for CPE syntax)", "disabled": true }, { "key": "addOns", "value": null, "disabled": true } ] }, "description": "https://csrc.nist.gov/CSRC/media/Projects/National-Vulnerability-Database/documents/web%20service%20documentation/Automation%20Support%20for%20CVE%20Retrieval.pdf" }, "response": [] } ], "auth": { "type": "noauth" } }, { "name": "Audit Log Search", "item": [ { "name": "Audit Log Search", "request": { "method": "GET", "header": [], "url": { "raw": "https://api.kennasecurity.com/audit_logs?start_date=2020-11-01&end_date=2020-11-28", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "audit_logs" ], "query": [ { "key": "start_date", "value": "2020-11-01", "description": "The start date of the period you wish to receive audit logs from. Must be less than or equal to end_date. The format is 'YYYY-MM-DD'." }, { "key": "end_date", "value": "2020-11-28", "description": "The end date of the period you wish to receive audit logs from. Must be greater than or equal to start_date. The format is 'YYYY-MM-DD'." } ] }, "description": "Returns a compressed (gzip) JSON lines file with all entries for the specified date range. If there are no audit logs for the specified period, the returned file will have no content." }, "response": [] } ] }, { "name": "AppSec Findings", "item": [ { "name": "Search Findings", "request": { "method": "GET", "header": [ { "key": "X-Risk-Token", "value": "", "disabled": true }, { "key": "Content-type", "value": "application/json" } ], "url": { "raw": "https://api.kennasecurity.com/findings?status[]=in_progress&status[]=resolved&sort_by=found_on&sort_direction=desc", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings" ], "query": [ { "key": "status[]", "value": "in_progress" }, { "key": "status[]", "value": "resolved" }, { "key": "sort_by", "value": "found_on" }, { "key": "sort_direction", "value": "desc" } ] }, "description": "Filters findings by a given set of parameters and returns the filtered findings as well as the total number of findings in the filtered set.\r\n\r\nEach unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all findings with status=[\"new\", \"resolved\"] and sort_by=\"score\", you will receive all findings with either status \"new\" or \"resolved,\" sorted by score in the response.\r\n\r\nBy default, 100 results are returned per page. The response includes the current page requested as well as the total number of pages." }, "response": [] }, { "name": "Show Findings", "request": { "method": "GET", "header": [ { "key": "Content-type", "value": "application/json" } ], "url": { "raw": "https://api.kennasecurity.com/findings/:id", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings", ":id" ], "variable": [ { "key": "id", "value": "", "description": "ID of the finding in Kenna" } ] }, "description": "Returns a single finding by ID." }, "response": [] }, { "name": "Create Finding", "request": { "auth": { "type": "apikey", "apikey": [ { "key": "value", "value": "uJPSArehEUbWNDPeGBWggsUUvNUBdKG82vX6Pzt4C1s6451V36cRcYz6tqxcChUg", "type": "string" }, { "key": "key", "value": "X-Risk-Token", "type": "string" } ] }, "method": "POST", "header": [ { "key": "X-Risk-Token", "value": "" }, { "key": "Content-type", "value": "application/json" } ], "body": { "mode": "raw", "raw": "{\n \"finding\": {\n \"additional_fields\": {\n \"fields\": [\n { \"field_name\": \"foo\", \"value\": \"far\" },\n { \"field_name\": \"boo\", \"value\": \"bar\" }\n ]\n },\n \"asset_id\": 123,\n \"closed_at\": \"2020-06-16T17:50:33.000Z\",\n \"due_date\": \"2020-06-17\",\n \"external_unique_id\": \"3287238723\",\n \"found_on\": \"2020-06-11T15:25:43.000Z\",\n \"identifier\": \"CWE-242\",\n \"last_found_on\": \"2020-06-15T12:28:10.000Z\",\n \"prioritized\": true,\n \"remediation\": \"Fix me!\",\n \"scanner_score\": 67,\n \"status\": \"resolved\"\n }\n }" }, "url": { "raw": "https://api.kennasecurity.com/findings", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings" ] }, "description": "Creates a single finding and returns the record." }, "response": [] }, { "name": "Create Finding Copy", "request": { "auth": { "type": "apikey", "apikey": [ { "key": "value", "value": "uJPSArehEUbWNDPeGBWggsUUvNUBdKG82vX6Pzt4C1s6451V36cRcYz6tqxcChUg", "type": "string" }, { "key": "key", "value": "X-Risk-Token", "type": "string" } ] }, "method": "POST", "header": [ { "key": "X-Risk-Token", "value": "" }, { "key": "Content-type", "value": "application/json" } ], "body": { "mode": "raw", "raw": "{\n \"finding\": {\n \"additional_fields\": {\n \"fields\": [\n { \"field_name\": \"foo\", \"value\": \"far\" },\n { \"field_name\": \"boo\", \"value\": \"bar\" }\n ]\n },\n \"asset_id\": 123,\n \"closed_at\": \"2020-06-16T17:50:33.000Z\",\n \"due_date\": \"2020-06-17\",\n \"external_unique_id\": \"3287238723\",\n \"found_on\": \"2020-06-11T15:25:43.000Z\",\n \"identifier\": \"CWE-242\",\n \"last_found_on\": \"2020-06-15T12:28:10.000Z\",\n \"prioritized\": true,\n \"remediation\": \"Fix me!\",\n \"scanner_score\": 67,\n \"status\": \"resolved\"\n }\n }" }, "url": { "raw": "https://api.kennasecurity.com/findings", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings" ] }, "description": "Creates a single finding and returns the record." }, "response": [] } ] }, { "name": "Inference", "item": [ { "name": "Inference for Microsoft Operating Systems", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"arch\":\"64-bit\",\r\n \"os_type\":\"WINDOWS\",\r\n \"os_name\":\"Microsoft Windows Server 2019 Standard\",\r\n \"os_version\":\"10.0.17763\"\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://api.kennasecurity.com/vulnerability_definitions/os_inference", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "vulnerability_definitions", "os_inference" ] }, "description": "Returns a list of known vulnerabilities for a given Windows operating system version.\r\n\r\nRestricted Access: This API endpoint is a premium feature for select partners." }, "response": [] }, { "name": "Vulnerability Inference for Applications", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"arch\": \"64-bit\",\r\n \"os_type\": \"WINDOWS\",\r\n \"os_name\": \"Microsoft Windows Server 2008 R2 Standard \",\r\n \"os_version\": \"6.1.7601\",\r\n \"software\": [\r\n {\r\n \"checksum\": \"8a872ca3412e6ac3554036c6e4d9d6cf738420eec039e0bbc2d7ca61d6a4f9b6\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"Microsoft SQL Server\",\r\n \"version\": \"9.00.4035.00\"\r\n },\r\n {\r\n \"checksum\": \"8c572897b85b1acef2ec502c187e5d08806a625ad6a1093eeb27985cecf75c62\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"Malicious Software Removal Tool\",\r\n \"version\": \"5.81.16832.1\"\r\n },\r\n {\r\n \"checksum\": \"37c9f913da31fbaabb1c7357c5c2dc45b4644536cf8bcc7bf650b87cbfc2217a\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"AdmPwd.UI\",\r\n \"version\": \"6.2.0.0\"\r\n },\r\n {\r\n \"checksum\": \"4f15a985a94bfe2248067afaec6cfcedb79304e2103b0a9dc8fa7a03883e1fac\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"System Center Configuration Manager\",\r\n \"version\": \"5.1906.1035.1000\"\r\n }\r\n ]\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://api.kennasecurity.com/vulnerability_definitions/app_inference", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "vulnerability_definitions", "app_inference" ] }, "description": "Returns a list of known vulnerabilities for a given list of applications. Supported operating systems include CentOS, SUSE Linux Enterprise Server, Redhat Enterprise Linux, Ubuntu and Windows.\r\n\r\nRestricted Access: This API endpoint is a premium feature for select partners." }, "response": [] } ] } ], "auth": { "type": "apikey", "apikey": [ { "key": "value", "value": "", "type": "string" }, { "key": "key", "value": "X-Risk-Token", "type": "string" } ] }, "event": [ { "listen": "prerequest", "script": { "type": "text/javascript", "exec": [ "" ] } }, { "listen": "test", "script": { "type": "text/javascript", "exec": [ "" ] } } ], "variable": [ { "key": "API_URL", "value": "api.kennasecurity.com" } ] }