{ "info": { "_postman_id": "f86db6eb-71f5-442f-8ee5-e9bd6656c459", "name": "Cisco Vulnerability Management Security API", "description": "Use steps: Update authorization tab with your API code and then proceed to the API requests you require which are grouped by function (assets, vulnerabilities, etc)\r\n\r\n*************************************************************************************************************\r\n\r\nThis is a list of API calls that can be leveraged to get the most out of the Kenna Platform. The most current documentation can be found at: https://apidocs.kennasecurity.com/reference#reference-getting-started \r\n\r\n\r\nGetting Started\r\nThis page will help you get started with Kenna Platform API.\r\n\r\n \r\nNo connector available yet for one of your security tools? No problem. You can push vulnerabilities from any external system into Kenna using our simple, secure API. Enterprise integration has never been easier.\r\n\r\nThe API is organized around REST to have predictable, resource-oriented URLs and to use HTTP response codes to indicate errors. We use HTTP verbs, which can be understood by off-the-shelf HTTP clients and libraries. The API utilizes JSON as the data exchange format.\r\n\r\nAll API calls must be made over HTTPS and be accompanied by a valid token parameter.\r\n\r\nYour Kenna API root path depends on your Kenna URL. In most cases the API root path will be https://{{API_URL}}, assuming your Kenna instance url is https://mycompany.kennasecurity.com/.\r\n\r\nIf you have an instance in the EU or in a private environment, your Kenna instance URL will include additional subdomain components, such as https://mycompany.eu.kennasecurity.com. In that case, only the instance specific hostname component (mycompany in the example)\r\nis replaced with api, so an instance with an EU address will use the EU api address of https://api.eu.kennasecurity.com/.\r\n\r\nSUGGEST EDITS\r\nAuthentication\r\n \r\nAccess to the API is controlled using a token. Every account has a token generated when the account is created.\r\n\r\nYou may locate and change your API token by logging in and clicking your company's name in the upper right hand corner. In the dropdown that appears, chose 'API Keys'. Your API token will be listed first in the table found on the applications page. You would replace in the example below with your API token.\r\n\r\nAll API requests must be made over HTTPS. Calls made over plain HTTP will fail. You must authenticate for all requests.\r\n\r\nRequests are limited to a maximum of 5 requests per second. If you exceed this limit, your request will receive a \u201c429: Too Many Requests\" status code response.\r\n\r\nSUGGEST EDITS\r\nParameters\r\n \r\nMany API methods take optional parameters. For GET requests, parameters are specified as a segment in the path. For example if you were requesting data regarding a vulnerability with an id of 100:\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/vulnerabilities/100\" -X GET\r\nFor most POST requests, parameters are encoded as JSON, with a Content-Type of 'application/json':\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" -H \"Content-Type: application/json\"\r\n https://{{API_URL}}/vulnerabilities\r\n -X POST\r\n -d '{\r\n \"vulnerability\":\r\n {\r\n \"wasc_id\" : \"WASC-01\",\r\n \"primary_locator\" : \"url\",\r\n \"url\" : \"http://www.example.com\"\r\n }\r\n }'\r\nNote: The Content-Type parameter should be omitted for specific POST request endpoints, such as the \"Upload Data File\" endpoint.\r\n\r\nLarger record sets are paginated by 500. For example, when requesting your list of vulnerabilities. To page through the record set, you pass a page parameter. Each paginated response includes meta data containing the current page and the total number of pages. Page limit is currently set to 20. Pages are 1-indexed based.\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/vulnerabilities/?page=3\" -X GET\r\nSUGGEST EDITS\r\nData Types\r\n \r\nThe API utilizes JSON as the data exchange format.\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/vulnerabilities/100\" -X GET\r\nSUGGEST EDITS\r\nErrors\r\n \r\nIn the case of an error, the appropriate HTTP status code will be returned in the response header. In addition, the response body will contain a JSON formatted description of what went wrong. The JSON will contain an error attribute, and may contain a more explanatory message attribute as well. It also includes a success attribute with a value of false.\r\n\r\nRequest\r\nResponse\r\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/assets/100\" -X PUT -d {\"priority\":\"-1\"}\r\nSUGGEST EDITS\r\nHTTP Status Codes\r\n \r\nThe following HTTP status codes are returned by the API.\r\n\r\nCode\tMeaning\r\n102\tProcessing\r\n200\tOK\r\n201\tCreated\r\n204\tNo Content\r\n400\tBad Request\r\n401\tUnauthorized\r\n404\tNot Found\r\n409\tConflict\r\n412\tPrecondition Failed\r\n422\tUnprocessable Entity\r\n429\tToo Many Requests (more than 5 per second)\r\n500\tInternal Server Error\r\nSUGGEST EDITS\r\nPagination\r\n \r\nRequests that return multiple items will be paginated to 1000 items at a time, by default. You can request further pages with the page parameter, and/or change the number of items returned with the per_page parameter. Note that page numbering is 1-based and that omitting the page parameter will return the first page.\r\n", "schema": "https://schema.getpostman.com/json/collection/v2.1.0/collection.json" }, "item": [ { "name": "Vulnerabilities ", "item": [ { "name": "List Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities" ], "query": [ { "key": "filter", "value": "string", "description": "integer\nFilter the results based on the filter string", "disabled": true }, { "key": "page", "value": "integer", "description": "integer\nThe page number from 1 to 20.", "disabled": true } ] }, "description": "Returns a list of all of the open vulnerabilities that are associated with active assets. To retrieve closed vulnerabilities, use the `filter` query parameter with the value \"closed\". The default page size is 500, the maximum page size is 500, and the maximum pages allowed is 20." }, "response": [] }, { "name": "Search Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "search" ], "query": [ { "key": "active_internet_breach[]", "value": "array of booleans", "description": "An array of booleans for filtering your vulnerabilities by those that have seen tranding breach activity.", "disabled": true }, { "key": "application_id", "value": "int32", "description": "(int32) The ID of an application to retrieve vulnerabilities for. All other search parameters are ignored if application_id is provided.\n\n", "disabled": true }, { "key": "asset_id[]", "value": "array of integers", "description": "array of integers\nSearch for vulnerabilities related to the specified asset IDs.", "disabled": true }, { "key": "asset[max_priority]", "value": "integer", "description": "integer\nFind vulnerabilities related to assets with priority levels that are less than or equal to this value.", "disabled": true }, { "key": "asset[min_priority]", "value": "integer", "description": "integer\nFind vulnerabilities related to assets with priority levels that are greater than or equal to this value.", "disabled": true }, { "key": "asset[operating_system][]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "asset[primary_locator][]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application.", "disabled": true }, { "key": "asset[service_names][]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "asset[service_ports][]", "value": "array of integers", "description": "array of integers\nAn array of ports relating to your assets.", "disabled": true }, { "key": "asset[service_products][]", "value": "array of strings", "description": "array of strings\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "asset[service_protocols][]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "asset[status][]", "value": "array of strings", "description": "array of strings\nSearch for vulnerabilities related to assets with the specified statuses.", "disabled": true }, { "key": "asset[status_set_manually][]", "value": "array of booleans", "description": "array of booleans\nA boolean to indicate whether an asset's active/inactive status was set automatically by Cisco Vulnerability Management or manually by a human.", "disabled": true }, { "key": "asset[tags][]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "classification[]", "value": "array of strings", "description": "array of strings\nFind all vulnerabilities matching the specified classifications.", "disabled": true }, { "key": "connector_names[]", "value": "array of strings", "description": "array of strings\nAn array of connector names related to your vulnerabilities.", "disabled": true }, { "key": "connector_types[]", "value": "array of strings", "description": "array of strings\nAn array of connector types related to your vulnerabilities.", "disabled": true }, { "key": "custom_fields:CUSTOM_FIELD_NAME[]", "value": "array of strings", "description": "array of strings\nSearch for all vulnerabilities that have a specific custom field and its value. The proper format for a custom field query is 'custom_fields:', the name of the custom field that you are searching on, and the value you are searching for. For example: custom_fields:Category[]=good. Note the following: Testing custom_fields in the \"Try It!\" pane does not work, use the example above as a guide in curl or some other language, to search multiple custom fields, add another query parameter. and search must have a value and there is no wildcarding.", "disabled": true }, { "key": "easily_exploitable[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that have seen high levels of exploitation recently.", "disabled": true }, { "key": "fields", "value": "string", "description": "string\nA comma separated list of fields to be returned in the response.", "disabled": true }, { "key": "has_known_exploits[]", "value": "array of booleans", "description": "array of booleans\nDeprecated: Please use the \"malware_exploitable\" query parameter.", "disabled": true }, { "key": "has_known_malware[]", "value": "array of booleans", "description": "array of booleans\nDeprecated: Please use the \"malware_exploitable\" query parameter.", "disabled": true }, { "key": "id[]", "value": "int32", "description": "array of integers\nArray of vulnerability ids", "disabled": true }, { "key": "malware_exploitable[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that have had pieces of malware identified.", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nFind all vulnerabilities with risk scores that are less than or equal to this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nFind all vulnerabilities with risk scores that are greater than or equal to this value.\n\n", "disabled": true }, { "key": "max_rounded_risk_meter_score", "value": "int32", "description": "int32\nSimilar to max_risk_meter_score, rounded to the nearest integer.\n\n", "disabled": true }, { "key": "min_rounded_risk_meter_score", "value": "int32", "description": "int32\nSimilar to min_risk_meter_score, rounded to the nearest integer.", "disabled": true }, { "key": "max_severity", "value": "int32", "description": "Find all vulnerabilities with severity levels that are less than or equal to this value.", "disabled": true }, { "key": "min_severity", "value": "int32", "description": "int32\nFind all vulnerabilities with severity levels that are greater than or equal to this value.", "disabled": true }, { "key": "max_threat", "value": "int32", "description": "int32\nFind all vulnerabilities with threat levels that are less than or equal to this value.\n\n", "disabled": true }, { "key": "min_threat", "value": "int32", "description": "int32\nFind all vulnerabilities with threat levels that are greater than or equal to this value.\n\n", "disabled": true }, { "key": "no_vulnerability_definition_id[]", "value": "array of integers", "description": "array of integers\nExclude all vulnerabilities for the identified definition IDs.\n\n\n\n", "disabled": true }, { "key": "page", "value": "integer", "description": "integer\nThe page number from 1 to 20.\n\n\n\n", "disabled": true }, { "key": "per_page", "value": "integer", "description": "integer\nThe page size from 1 to 5,000. Default is 500.\n\n\n\n", "disabled": true }, { "key": "pci_related[]", "value": "array of strings", "description": "array of strings\nAn array of booleans for filtering your vulnerabilities by those that are Payment Card Industry related", "disabled": true }, { "key": "popular_target[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that are popular targets.", "disabled": true }, { "key": "port[]", "value": "array of integers", "description": "array of integers\nAn array of ports associated with your vulnerabilities.\n\n\n\n", "disabled": true }, { "key": "predicted_exploitable[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that have been predicted to be exploited.", "disabled": true }, { "key": "prioritized[]", "value": "array of booleans", "description": "array of booleans\nDeprecated: Please use the \"top_priority\" query parameter.\n\n\n\n", "disabled": true }, { "key": "q", "value": "string", "description": "string\nAdditional text search parameters, as documented at: https://help.kennasecurity.com/hc/en-us/articles/206280593. Example q=tag:(mytag+AND+thetag).", "disabled": true }, { "key": "remote_code_execution[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that be executed remotely.\n\n\n\n", "disabled": true }, { "key": "search_id", "value": "int32", "description": "The ID of a risk meter group to retrieve vulnerabilities for. Other parameters are ignored if search_id is provided.\n\n", "disabled": true }, { "key": "service_ticket_status[]", "value": "array of strings", "description": "array of strings\nAn array of strings that represent the statuses of all service tickets connected to your vulnerabilities.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of strings to filter by vulnerability status.\n\n\n\n", "disabled": true }, { "key": "top_exploit[]", "value": "array of strings", "description": "array of strings\nDeprecated: Please use the \"active_internet_breach\" query parameter.", "disabled": true }, { "key": "top_priority[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities by those that Cisco Vulnerability Management recommends should be a top priority to fix.\n\n\n\n", "disabled": true }, { "key": "trending[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering by vulnerabilities that are trending.", "disabled": true }, { "key": "vulnerability_class[]", "value": "array of strings", "description": "array of strings\nAn array of strings for filtering by vulnerability classification.", "disabled": true }, { "key": "vulnerability_definition_id[]", "value": "array of integers", "description": "array of integers\nFind all vulnerabilities for the identified definition IDs.", "disabled": true }, { "key": "wasc_classification[]", "value": "array of strings", "description": "array of strings\nAn array to filter your vulnerabilities by specified WASC classifications.\n\n\n\n", "disabled": true }, { "key": "zero_day[]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering by vulnerabilities that have zero days.", "disabled": true } ] }, "description": "Filters vulnerabilities by a given set of parameters and returns the filtered vulnerabilities as well as the total number of vulnerabilities in the filtered set.\r\n\r\nBy default, only open vulnerabilities with active assets are returned. Each unique parameter is combined using AND while each of the values passed in a single array will be combined using OR. For example, if you search for all vulnerabilities with status=[\"open\"] and port=[\"443\", \"80\"] you will receive all open vulnerabilities that have either port 443 or port 80. The default page size is 500, the maximum page size is 5,000, and the maximum pages allowed is 20." }, "response": [] }, { "name": "Validate Vulnerability Search Query", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/validate_search?q=string", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "validate_search" ], "query": [ { "key": "q", "value": "string", "description": "string\nThis is the q string to be validated. For more detailed documentation on our search syntax visit our Help Center.\n\n" } ] }, "description": "Validate the query string portion of a vulnerability search. If the query is invalid and if the system can determine a suggested replacement, that suggestion will be returned in the response." }, "response": [] }, { "name": "Show Vulnerability", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id" ], "query": [ { "key": "", "value": null, "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "The vulnerability ID." } ] }, "description": "Returns a single vulnerability by ID." }, "response": [] }, { "name": "Show Scanner Vulnerability Details", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id/scanner_vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id", "scanner_vulnerabilities" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "The vulnerability ID." } ] }, "description": "Returns an array of the scanner vulnerability details and solution associated to a vulnerability by ID." }, "response": [] }, { "name": "Create Vulnerability", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability\": {\r\n \"asset_id\": \"\",\r\n \"cve_id\": \"\",\r\n \"cwe_id\": \"\",\r\n \"closed_at\": \"\",\r\n \"custom_fields\": \"\",\r\n \"database\": \"\",\r\n \"due_date\": \"\",\r\n \"file\": \"\",\r\n \"found_on\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"identifier\": \"\",\r\n \"ip_address\": \"\",\r\n \"jira_key\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"mac_address\": \"\",\r\n \"override_score\": \"\",\r\n \"port\": \"\",\r\n \"primary_locator\": \"\",\r\n \"prioritized\": \"false\",\r\n \"severity\": \"\",\r\n \"status\": \"open\",\r\n \"threat\": \"\",\r\n \"url\": \"\",\r\n \"wasc_id\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities" ], "query": [ { "key": "**PARMS BELOW ARE FOR \"BODY REFERENCE\"", "value": null, "description": "*****UPDATE IN BODY ONLY", "disabled": true }, { "key": "asset_id", "value": "int32", "description": "int32\nThe numeric id of an asset", "disabled": true }, { "key": "application", "value": "string", "description": "string\nThe application name. The application can be specified along with file to match an asset with file as primary locator in specified application.", "disabled": true }, { "key": "cve_id", "value": "string", "description": "string\nA National Vulnerability Database CVE identifier, 'CVE-YYYY-NNNN', 'CVE-YYYY-NNNNN', or 'CVE-YYYY-NNNNNNN'. One of the following fields, cve_id, cwe_id, or wasc_id, is required.", "disabled": true }, { "key": "cwe_id", "value": "string", "description": "string\nA CWE - Common Weakness Enumeration identifier, 'CWE-'. One of the following fields, cve_id, cwe_id, or wasc_id, is required.\n\n", "disabled": true }, { "key": "closed_at", "value": "string", "description": "string\nThe datetime (as a UTC timestamp) to mark when a vulnerability was closed in the format (2023-09-01).", "disabled": true }, { "key": "database", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "due_date", "value": "string", "description": "string\nThe date a vulnerability needs to be fixed by.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "found_on", "value": "string", "description": "string\nThe date a vulnerability was found on.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA unique text identifier for this type of vulnerability", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "jira_key", "value": "string", "description": "string\nA JIRA ticket key to associate this vulnerability with.", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string\nThe date a vulnerability was last seen on.", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain English notes on a vulnerability. Maximum 50,000 characters allowed.", "disabled": true }, { "key": "mac_address", "value": "string", "description": "Whichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "port", "value": "int32", "description": "int32\nThe port affected by the vulnerability.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary locator used for the corresponding asset. This is required to associate the vulnerability with the asset it was found on. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, or fqdn", "disabled": true }, { "key": "service_ticket", "value": "object", "description": "object\nA service ticket to associate with a vulnerability. A null service_ ticket value will unassociate the service ticket associated with these vulnerabilities.", "disabled": true }, { "key": "threat", "value": "int32", "description": "int32\nThe threat level of the vulnerability instance; an integer between 1 (low) to 10 (high)", "disabled": true }, { "key": "url", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "wasc_id", "value": "string", "description": "string\nA WASC 2.0 Threat Classification ID. One of the following fields is required: cve_id, cwe_id, or wasc_id.", "disabled": true } ] }, "description": "Creates a single vulnerability and returns the record." }, "response": [] }, { "name": "Update Vulnerability ", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability\": {\r\n \"asset_id\": \"\",\r\n \"cve_id\": \"\",\r\n \"cwe_id\": \"\",\r\n \"closed_at\": \"\",\r\n \"custom_fields\": \"\",\r\n \"database\": \"\",\r\n \"due_date\": \"\",\r\n \"file\": \"\",\r\n \"found_on\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"identifier\": \"\",\r\n \"ip_address\": \"\",\r\n \"jira_key\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"mac_address\": \"\",\r\n \"override_score\": \"\",\r\n \"port\": \"\",\r\n \"primary_locator\": \"\",\r\n \"prioritized\": \"false\",\r\n \"severity\": \"\",\r\n \"status\": \"open\",\r\n \"threat\": \"\",\r\n \"url\": \"\",\r\n \"wasc_id\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id" ], "query": [ { "key": "id ****Update in Path variable below****", "value": null, "disabled": true }, { "key": "**Items below - Update in Body only", "value": "", "description": "**Items below - Update in Body only\n with vuln id found in URL when referencing the vuln \nin the Kenna Platform", "disabled": true }, { "key": "asset_id", "value": "int32", "description": "int32\nThe numeric id of an asset", "disabled": true }, { "key": "cve_id", "value": "string", "description": "string\nA National Vulnerability Database CVE identifier,", "disabled": true }, { "key": "cwe_id", "value": "string", "description": "string\nA CWE - Common Weakness Enumeration identifier\n\n", "disabled": true }, { "key": "closed_at", "value": "string", "description": "string\nThe datetime (as a UTC timestamp) to mark when a vulnerability was closed in the format (2023-09-01)", "disabled": true }, { "key": "custom_fields", "value": "object", "description": "object\nThe custom field ID and value to be updated. The key is the custom field ID, and the value is the desired value of the custom field. For updating a date type custom field, the value must be in ISO-8601 date-time format YYYY-MM-DDTHH:MM:SS.", "disabled": true }, { "key": "database", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "due_date", "value": "string", "description": "string\nThe date a vulnerability needs to be fixed by.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "found_on", "value": "string", "description": "string\nThe date a vulnerability was found on.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA unique text identifier for this type of vulnerability", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "jira_key", "value": "string", "description": "string\nA JIRA ticket key to associate this vulnerability with", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string\nThe date a vulnerability was last seen on", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain English notes on a vulnerability. Maximum 50,000 characters allowed.", "disabled": true }, { "key": "mac_address", "value": "string", "description": "Whichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "override_score", "value": "int32", "description": "int32\nAn integer (0 - 100) representing the risk score for a vulnerability. Cisco Vulnerability Management continuously updates risk scores as the threat landscape changes. If you manually override this score, the vulnerability will no longer be updated dynamically and the change will be logged for audit purposes.", "disabled": true }, { "key": "port", "value": "int32", "description": "int32\nThe port affected by the vulnerability.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary locator used for the corresponding asset. This is required to associate the vulnerability with the asset it was found on. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, or fqdn", "disabled": true }, { "key": "prioritized", "value": "boolean", "description": "boolean\nBoolean that indicates whether the vulnerability is a top priority or not. Default is false.", "disabled": true }, { "key": "service_ticket", "value": "object", "description": "object\nA service ticket to associate with a vulnerability. A null service_ ticket value will unassociate the service ticket associated with these vulnerabilities.", "disabled": true }, { "key": "severity", "value": "int32", "description": "int32\nThe severity of the vulnerability instance; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe status to be updated to for this vulnerability - open, closed, risk_accepted, false_positive.", "disabled": true }, { "key": "threat", "value": "int32", "description": "int32\nThe threat level of the vulnerability instance; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "url", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "wasc_id", "value": "string", "description": "string\nA WASC 2.0 Threat Classification ID", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32: ID of vuln found in URL when selected in Kenna" } ] }, "description": "When updating a vulnerability's custom fields, reference them by their custom_field_definition_id as in the example. Only ids that are present in the UPDATE request will be modified (ie: leaving out custom fields in the UPDATE request will not delete them on the server). To remove a vulnerability's custom field value, UPDATE it with an empty string." }, "response": [] }, { "name": "Bulk Update Vulnerabilities", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability_ids\": [\r\n \"\",\r\n \"\"\r\n ],\r\n \"vulnerability\": {\r\n \"asset_id\": \"\",\r\n \"cve_id\": \"\",\r\n \"cwe_id\": \"\",\r\n \"closed_at\": \"\",\r\n \"custom_fields\": \"\",\r\n \"database\": \"\",\r\n \"due_date\": \"\",\r\n \"file\": \"\",\r\n \"found_on\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"identifier\": \"\",\r\n \"ip_address\": \"\",\r\n \"jira_key\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"mac_address\": \"\",\r\n \"override_score\": \"\",\r\n \"port\": \"\",\r\n \"primary_locator\": \"\",\r\n \"prioritized\": \"false\",\r\n \"severity\": \"\",\r\n \"status\": \"open\",\r\n \"threat\": \"\",\r\n \"url\": \"\",\r\n \"wasc_id\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities/bulk", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "bulk" ], "query": [ { "key": "**Items below - Update in Body only", "value": null, "description": "**Items below - Update in Body only", "disabled": true }, { "key": "vulnerability_ids", "value": "[]", "description": "array of integers\nIDs of all vulnerabilities to be updated.", "disabled": true }, { "key": "asset_id", "value": "int32", "description": "int32\nThe numeric id of an asset", "disabled": true }, { "key": "cve_id", "value": "string", "description": "string\nA National Vulnerability Database CVE identifier,", "disabled": true }, { "key": "cwe_id", "value": "string", "description": "string\nA CWE - Common Weakness Enumeration identifier\n\n", "disabled": true }, { "key": "closed_at", "value": "string", "description": "string\nThe datetime(as a UTC timestamp) to mark when a vulnerability was closed in the format (2023-09-01)", "disabled": true }, { "key": "custom_fields", "value": "object", "description": "object\nCustom Fields are defined by Custom Field Definitions which can be set up in the UI for your account. When updating a vulnerability's custom fields, reference them by their custom_field_definition_id, the key in the CUSTOM_FIELDS OBJECT below. Only IDs that are present in the \"Bulk Update\" request will be modified (ie: leaving out custom fields in the \"Bulk Update\" request will not delete them on the server). To remove a vulnerability's custom field value, use an empty string, { \"777\": \"\" }. For updating a date type custom field, the value must be in ISO-8601 date-time format YYYY-MM-DDTHH:MM:SS.", "disabled": true }, { "key": "database", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "due_date", "value": "string", "description": "string\nThe date a vulnerability needs to be fixed by.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "found_on", "value": "string", "description": "string\nThe date a vulnerability was found on.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA unique text identifier for this type of vulnerability", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "jira_key", "value": "string", "description": "string\nA JIRA ticket key to associate this vulnerability with", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string\nThe date a vulnerability was last seen on", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain English notes on a vulnerability. Maximum 50,000 characters allowed.", "disabled": true }, { "key": "mac_address", "value": "string", "description": "Whichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "override_score", "value": "int32", "description": "int32\nAn integer (0 - 100) representing the risk score for a vulnerability. Cisco Vulnerability Management continuously updates risk scores as the threat landscape changes. If you manually override this score, the vulnerability will no longer be updated dynamically and the change will be logged for audit purposes.", "disabled": true }, { "key": "port", "value": "int32", "description": "int32\nThe port affected by the vulnerability.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary locator used for the corresponding asset. This is required to associate the vulnerability with the asset it was found on. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, or fqdn.", "disabled": true }, { "key": "prioritized", "value": "boolean", "description": "boolean\nBoolean that indicates whether the vulnerability is a top priority or not.", "disabled": true }, { "key": "service_ticket", "value": "object", "description": "object\nA service ticket to associate with a vulnerability. A null service_ ticket value will unassociate the service ticket associated with these vulnerabilities.", "disabled": true }, { "key": "severity", "value": "int32", "description": "int32\nThe severity of the vulnerability instance; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe status to be updated for requested vulnerabilities - open, closed, risk_accepted, false_positive.", "disabled": true }, { "key": "threat", "value": "int32", "description": "int32\nThe threat level of the vulnerability instance; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "url", "value": "string", "description": "string\nWhichever locator was specified as the primary_locator above must have a value set that matches the primary_locator of the associated asset.", "disabled": true }, { "key": "wasc_id", "value": "string", "description": "string\nA WASC 2.0 Threat Classification ID", "disabled": true } ] }, "description": "Update multiple vulnerabilities at a time using the bulk update endpoint. Update limit is 30,000 vulnerabilities at a time. By default we will index the vulnerabilities in the background." }, "response": [] }, { "name": "Delete Vulnerability", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", ":id" ], "query": [ { "key": "Don't Include this line: Ref Description for path update %3D%3D>", "value": "int32", "description": "Update {{id}} in URL path above (or in variable)\n with vuln id found in URL when referencing the vuln \nin the Kenna Platform", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32: The vulnerability ID to be deleted." } ] }, "description": "Delete a single vulnerability by ID." }, "response": [] }, { "name": "Bulk Delete Vulnerabilities", "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"vulnerability_ids\": [123, 456, 789]\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/vulnerabilities/bulk_delete", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "bulk_delete" ], "query": [ { "key": "**Don's include this line - Update Vulns in Body**", "value": null, "description": "An array of vulnerability IDs to be deleted.", "disabled": true } ] }, "description": "Delete multiple vulnerabilities at a time. Delete limit is 2,000 vulnerabilities at a time." }, "response": [] }, { "name": "Download Zipped Vulnerability Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerabilities/download_data_zip", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerabilities", "download_data_zip" ] }, "description": "Will return a gzipped file with the most recent data export of all of your vulnerabilities. In order to arrange for a daily full data export please contact our tech support staff. The format of the uncompressed data, is JSONL, JSON, or XML. This is determined when the technical support staff is contacted." }, "response": [] } ], "event": [ { "listen": "prerequest", "script": { "type": "text/javascript", "exec": [ "" ] } }, { "listen": "test", "script": { "type": "text/javascript", "exec": [ "" ] } } ] }, { "name": "Assets", "item": [ { "name": "List Assets", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets" ] }, "description": "Returns a list of all of your active assets with open vulnerabilities. The default page size is 500, the maximum page size is 500, and the maximum pages allowed is 20. The total number of asset groups, page number, and total number of pages are available in the meta data. To retrieve inactive assets, you pass a \"filter\" parameter with the value \"inactive\" (i.e. ?filter=inactive)." }, "response": [ { "name": "List Assets", "originalRequest": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets" ] } }, "status": "OK", "code": 200, "_postman_previewlanguage": "json", "header": [ { "key": "Cache-Control", "value": "max-age=0, private, must-revalidate" }, { "key": "Content-Encoding", "value": "gzip" }, { "key": "Content-Type", "value": "application/json; charset=utf-8" }, { "key": "Date", "value": "Mon, 25 May 2020 23:29:09 GMT" }, { "key": "ETag", "value": "W/\"470c1b807ea5090d7afaf9bacdac152e\"" }, { "key": "Server", "value": "nginx" }, { "key": "Strict-Transport-Security", "value": "max-age=31556952; includeSubDomains" }, { "key": "X-Content-Type-Options", "value": "nosniff" }, { "key": "X-Frame-Options", "value": "SAMEORIGIN" }, { "key": "X-Rack-Cache", "value": "miss" }, { "key": "X-Request-Id", "value": "336017907214392b7b97716c82c77baa" }, { "key": "X-Runtime", "value": "0.777931" }, { "key": "X-XSS-Protection", "value": "1; mode=block" }, { "key": "transfer-encoding", "value": "chunked" }, { "key": "Connection", "value": "keep-alive" } ], "cookie": [], "body": "{\n \"assets\": [\n {\n \"id\": 9741430,\n \"created_at\": \"2017-03-16T18:59:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/install.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"JavaScript_Medium_Threat\",\n \"JavaScript\",\n \"JavaScript_Low_Visibility\",\n \"app portfolio\",\n \"test1234\",\n \"TEST12345\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741430/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/install.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741422,\n \"created_at\": \"2017-03-16T18:59:20Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/index.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"JavaScript_Medium_Threat\",\n \"JavaScript\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"app portfolio\",\n \"test1234\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741422/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/index.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741421,\n \"created_at\": \"2017-03-16T18:59:19Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/wdip.php\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:19Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741421/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/wdip.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 9741420,\n \"created_at\": \"2017-03-16T18:59:19Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/wcip.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741420/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/wcip.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741419,\n \"created_at\": \"2017-03-16T18:59:19Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/ciph.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741419/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/ciph.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741417,\n \"created_at\": \"2017-03-16T18:59:13Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/_logic.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T19:04:42Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741417/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/_logic.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741415,\n \"created_at\": \"2017-03-16T18:59:12Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/user-profile-exec.php\",\n \"vulnerabilities_count\": 11,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T19:04:55Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741415/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/user-profile-exec.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196122,\n \"name\": \"OWASP 9 (Using Components with Known Vulnerabilities)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741413,\n \"created_at\": \"2017-03-16T18:59:09Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-schemes.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741413/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-schemes.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741410,\n \"created_at\": \"2017-03-16T18:59:07Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-exceptions.php\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\",\n \"TestErie\"\n ],\n \"owner\": \"Aziz Kapadia\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741410/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-exceptions.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 209966,\n \"name\": \"Closed last 90 days\"\n },\n {\n \"id\": 189897,\n \"name\": \"External Assets Scheduled Items\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215254,\n \"name\": \"KRI3 - High Vulns remediated in last 90 days\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189946,\n \"name\": \"Exception Expiration 30 days\"\n }\n ]\n },\n {\n \"id\": 9741409,\n \"created_at\": \"2017-03-16T18:59:06Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-rules.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741409/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-rules.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741408,\n \"created_at\": \"2017-03-16T18:59:06Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-passes.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741408/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-passes.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741405,\n \"created_at\": \"2017-03-16T18:59:05Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-lots.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741405/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-lots.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741404,\n \"created_at\": \"2017-03-16T18:59:04Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/rules.php\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:43Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741404/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/rules.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741402,\n \"created_at\": \"2017-03-16T18:59:02Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/api.php\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:43Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741402/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/api.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741401,\n \"created_at\": \"2017-03-16T18:59:01Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/register.php\",\n \"vulnerabilities_count\": 8,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:47Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741401/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/register.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196122,\n \"name\": \"OWASP 9 (Using Components with Known Vulnerabilities)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 9741400,\n \"created_at\": \"2017-03-16T18:58:58Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/admin-users.php\",\n \"vulnerabilities_count\": 6,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-03-16T18:59:46Z\",\n \"network_ports\": [],\n \"tags\": [\n \"CxServer\",\n \"PHP_High_Risk\",\n \"PHP\",\n \"PHP_Medium_Threat\",\n \"Php_Low_Visibility\",\n \"JavaScript_Low_Visibility\",\n \"JavaScript\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/9741400/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/admin-users.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354674,\n \"created_at\": \"2017-01-20T14:25:39Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Web.config\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_WebConfig\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354674/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Web.config\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354668,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/ShoppingCartRecord.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354668/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/ShoppingCartRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196117,\n \"name\": \"OWASP 5 (Broken Access Control)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354667,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Registration.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354667/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Registration.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354666,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/OrdersRecord.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354666/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/OrdersRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196117,\n \"name\": \"OWASP 5 (Broken Access Control)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354665,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersRecord.cs\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354665/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354664,\n \"created_at\": \"2017-01-20T14:25:32Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MyInfo.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354664/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MyInfo.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354663,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialsRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354663/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialsRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354662,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialCatRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354662/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialCatRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354661,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CategoriesRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354661/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CategoriesRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354660,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/BookMaint.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354660/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/BookMaint.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354659,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CardTypesRecord.cs\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_Medium_Threat\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354659/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CardTypesRecord.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354658,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CCPager.ascx\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354658/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CCPager.ascx\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 8354657,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Books.aspx\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354657/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Books.aspx\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 8354656,\n \"created_at\": \"2017-01-20T14:25:31Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersGrid.aspx\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354656/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersGrid.aspx\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n }\n ]\n },\n {\n \"id\": 8354654,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/BookDetail.cs\",\n \"vulnerabilities_count\": 7,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354654/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/BookDetail.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 196117,\n \"name\": \"OWASP 5 (Broken Access Control)\"\n },\n {\n \"id\": 196118,\n \"name\": \"OWASP 6 (Security Misconfiguration)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354649,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersInfo.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354649/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersInfo.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354648,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/Login.cs\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:39Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354648/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/Login.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354647,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/OrdersGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354647/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/OrdersGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354643,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/MembersGrid.cs\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354643/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/MembersGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354640,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialsGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354640/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialsGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354636,\n \"created_at\": \"2017-01-20T14:25:30Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/EditorialCatGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354636/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/EditorialCatGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354633,\n \"created_at\": \"2017-01-20T14:25:29Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CategoriesGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354633/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CategoriesGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354631,\n \"created_at\": \"2017-01-20T14:25:29Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/CardTypesGrid.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:39Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354631/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/CardTypesGrid.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354626,\n \"created_at\": \"2017-01-20T14:25:27Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/AdminBooks.cs\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"America\",\n \"CSharp\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": \"Simon\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354626/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/AdminBooks.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189983,\n \"name\": \"Tech - Simon\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 8354624,\n \"created_at\": \"2017-01-20T14:25:27Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"/BookStore_NET_17588_lines/App_Code/temp/New Folder/CCUtility.cs\",\n \"vulnerabilities_count\": 7,\n \"status\": \"active\",\n \"last_seen_time\": \"2017-01-20T14:25:41Z\",\n \"network_ports\": [],\n \"tags\": [\n \"America\",\n \"CSharp_High_Risk\",\n \"CSharp\",\n \"CSharp_Medium_Threat\",\n \"CSharp_Low_Visibility\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/8354624/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"/BookStore_NET_17588_lines/App_Code/temp/New Folder/CCUtility.cs\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196113,\n \"name\": \"OWASP 1 (Injection)\"\n },\n {\n \"id\": 196114,\n \"name\": \"OWASP 2 (Broken Authentication)\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 4357679,\n \"created_at\": \"2016-04-12T15:28:51Z\",\n \"priority\": 10,\n \"operating_system\": null,\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"file\",\n \"locator\": \"C:/Program Files/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/Samples/basic/php/sink.php\",\n \"vulnerabilities_count\": 2,\n \"status\": \"active\",\n \"last_seen_time\": \"2016-04-12T15:28:51Z\",\n \"network_ports\": [],\n \"tags\": [\n \"sample-php\",\n \"app test fortify\",\n \"App ABC\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/4357679/vulnerabilities\"\n },\n \"ip_address\": null,\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": \"C:/Program Files/HP_Fortify/HP_Fortify_SCA_and_Apps_4.10/Samples/basic/php/sink.php\",\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 3274193,\n \"created_at\": \"2015-11-03T19:14:23Z\",\n \"priority\": 10,\n \"operating_system\": \"AXIS - Linux - Linux - 2.6)\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"10.10.3.2\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 8243659,\n \"port_number\": 123,\n \"extra_info\": null,\n \"hostname\": null,\n \"name\": null,\n \"ostype\": null,\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024555,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024556,\n \"port_number\": 23,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Telnet\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024557,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024558,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [\n \"PCI\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3274193/vulnerabilities\"\n },\n \"ip_address\": \"10.10.3.2\",\n \"database\": null,\n \"hostname\": \"10.10.3.2\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": \"56394653\",\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 3273443,\n \"created_at\": \"2015-11-03T19:08:01Z\",\n \"priority\": 10,\n \"operating_system\": \"AXIS - Linux - Linux - 2.6)\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"10.10.3.1\",\n \"vulnerabilities_count\": 3,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 8242657,\n \"port_number\": 123,\n \"extra_info\": null,\n \"hostname\": null,\n \"name\": null,\n \"ostype\": null,\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024513,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024514,\n \"port_number\": 23,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Telnet\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024515,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239024516,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [\n \"Not Win\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3273443/vulnerabilities\"\n },\n \"ip_address\": \"10.10.3.1\",\n \"database\": null,\n \"hostname\": \"10.10.3.1\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": \"56362630\",\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189997,\n \"name\": \"Non-Windows\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 3253303,\n \"created_at\": \"2015-11-02T19:10:56Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 R2 (Service Pack 2, Server, SQL Server, [++])\",\n \"notes\": \"\",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"192.46.26.9\",\n \"vulnerabilities_count\": 257,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:10:56Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\",\n \"DMZ Servers\",\n \"Sharepoint\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3253303/vulnerabilities\"\n },\n \"ip_address\": \"192.46.26.9\",\n \"database\": null,\n \"hostname\": \"192.46.26.9\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"http://testphp.vulnweb.com/\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189960,\n \"name\": \"Web Application (testphp)\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189981,\n \"name\": \"zSharepoint Exceptions - Approved\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3251925,\n \"created_at\": \"2015-11-02T19:08:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 (Service Pack 2, Server, [++])\",\n \"notes\": \"\",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.219.51\",\n \"vulnerabilities_count\": 17,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:08:40Z\",\n \"network_ports\": [],\n \"tags\": [\n \"Juniper\",\n \"app portfolio\",\n \"Bitsight\"\n ],\n \"owner\": \"Dave\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3251925/vulnerabilities\"\n },\n \"ip_address\": \"156.81.219.51\",\n \"database\": null,\n \"hostname\": \"156.81.219.51\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"Test PHP\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189973,\n \"name\": \"Bitsight\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3251001,\n \"created_at\": \"2015-11-02T19:07:18Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2008 (Service Pack 2, Server, [++])\",\n \"notes\": \"6/7/18 RJE Test Note \",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.217.141\",\n \"vulnerabilities_count\": 487,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:07:18Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\",\n \"DMZ Servers\",\n \"Bitsight\",\n \"Sharepoint\"\n ],\n \"owner\": \"Rich Eicher\",\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3251001/vulnerabilities\"\n },\n \"ip_address\": \"156.81.217.141\",\n \"database\": null,\n \"hostname\": \"156.81.217.141\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"WebGoat\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189973,\n \"name\": \"Bitsight\"\n },\n {\n \"id\": 189981,\n \"name\": \"zSharepoint Exceptions - Approved\"\n },\n {\n \"id\": 189984,\n \"name\": \"WebGoat Systems\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 190013,\n \"name\": \"Web Goat\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3250991,\n \"created_at\": \"2015-11-02T19:07:17Z\",\n \"priority\": 9,\n \"operating_system\": \"Windows Server 2008 (Service Pack 1, Server, SQL Server, [++])\",\n \"notes\": \"this is a version test - notes - RJE\\r\\ntest two - overwritten? \",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.219.54\",\n \"vulnerabilities_count\": 515,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:07:17Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3250991/vulnerabilities\"\n },\n \"ip_address\": \"156.81.219.54\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3249506,\n \"created_at\": \"2015-11-02T19:05:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2008 (Service Pack 2, Server, [++])\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"156.81.249.197\",\n \"vulnerabilities_count\": 538,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:05:21Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"app portfolio\",\n \"DMZ Servers\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3249506/vulnerabilities\"\n },\n \"ip_address\": \"156.81.249.197\",\n \"database\": null,\n \"hostname\": \"156.81.249.197\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3248899,\n \"created_at\": \"2015-11-02T19:04:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 (Service Pack 2, Server, [++])\",\n \"notes\": \"Test ABC App\",\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"169.225.178.56\",\n \"vulnerabilities_count\": 642,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:04:35Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"Bank\",\n \"app portfolio\",\n \"DMZ Servers\",\n \"Office 3\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3248899/vulnerabilities\"\n },\n \"ip_address\": \"169.225.178.56\",\n \"database\": null,\n \"hostname\": \"169.225.178.56\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": \"Webgoat\",\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 3248853,\n \"created_at\": \"2015-11-02T19:04:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows Server 2003 (Service Pack 2, Server, [++])\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"169.225.176.34\",\n \"vulnerabilities_count\": 579,\n \"status\": \"active\",\n \"last_seen_time\": \"2015-11-02T19:04:31Z\",\n \"network_ports\": [],\n \"tags\": [\n \"servers DMZ\",\n \"Juniper\",\n \"Bank\",\n \"app portfolio\",\n \"DMZ Servers\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/3248853/vulnerabilities\"\n },\n \"ip_address\": \"169.225.176.34\",\n \"database\": null,\n \"hostname\": \"169.225.176.34\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189911,\n \"name\": \"Full Stack Application\"\n },\n {\n \"id\": 189914,\n \"name\": \"App Portfolio\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189918,\n \"name\": \"DMZ Server\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189993,\n \"name\": \"Windows tp/ab/ee/pt\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 197021,\n \"name\": \"fullstack + app group\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 218864,\n \"name\": \"juniper vuln exploit in the wild\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 18323888,\n \"created_at\": \"2020-03-08T03:36:08Z\",\n \"priority\": 10,\n \"operating_system\": \"Windows 10 Pro 64 bit Edition Version 1903\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"netbios\",\n \"locator\": \"DENDESKTOP\",\n \"vulnerabilities_count\": 17,\n \"status\": \"active\",\n \"last_seen_time\": \"2020-05-23T19:42:48Z\",\n \"network_ports\": [],\n \"tags\": [\n \"Cloud Agent\",\n \"\",\n \"Test_vh\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323888/vulnerabilities\"\n },\n \"ip_address\": \"192.168.1.121\",\n \"database\": null,\n \"hostname\": \"dendesktop\",\n \"fqdn\": null,\n \"netbios\": \"DENDESKTOP\",\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": \"89091038\",\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189909,\n \"name\": \"Fix Category Local\"\n },\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 189939,\n \"name\": \"QG- Force\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 209966,\n \"name\": \"Closed last 90 days\"\n },\n {\n \"id\": 189933,\n \"name\": \"No Patch Available\"\n },\n {\n \"id\": 189934,\n \"name\": \"No Patch Available - Windows\"\n },\n {\n \"id\": 214834,\n \"name\": \"qualys\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215254,\n \"name\": \"KRI3 - High Vulns remediated in last 90 days\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215422,\n \"name\": \"Cloud Agent Test - SB\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189901,\n \"name\": \"PCI Network Vulns\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221524,\n \"name\": \"Cloud Agents\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n }\n ]\n },\n {\n \"id\": 18323886,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Debian - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.28\",\n \"vulnerabilities_count\": 75,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042983,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Symantec Mail Security for SMTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042984,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042985,\n \"port_number\": 143,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAP\",\n \"ostype\": \"\",\n \"product\": \"Dovecot\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042986,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042987,\n \"port_number\": 465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042988,\n \"port_number\": 995,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"POPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042989,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.16\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323886/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.28\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323885,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Debian - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.29\",\n \"vulnerabilities_count\": 59,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042971,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.5p1\"\n },\n {\n \"id\": 239042972,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.4.1\"\n },\n {\n \"id\": 239042973,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n },\n {\n \"id\": 239042974,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323885/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.29\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323884,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Debian - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.27\",\n \"vulnerabilities_count\": 75,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042975,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042976,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042977,\n \"port_number\": 143,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAP\",\n \"ostype\": \"\",\n \"product\": \"Dovecot\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042978,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0.10\"\n },\n {\n \"id\": 239042979,\n \"port_number\": 465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042980,\n \"port_number\": 993,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042981,\n \"port_number\": 995,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"POPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042982,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.16\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323884/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.27\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323883,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.26\",\n \"vulnerabilities_count\": 28,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042963,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Symantec Mail Security for SMTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042964,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042965,\n \"port_number\": 143,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042966,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042967,\n \"port_number\": 465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042968,\n \"port_number\": 993,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IMAPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042969,\n \"port_number\": 995,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"POPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042970,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323883/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.26\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323880,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.21\",\n \"vulnerabilities_count\": 28,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042960,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042961,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.1.19\"\n },\n {\n \"id\": 239042962,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323880/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.21\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323875,\n \"created_at\": \"2019-11-05T15:39:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"223.202.6.22\",\n \"vulnerabilities_count\": 28,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042957,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.4.2\"\n },\n {\n \"id\": 239042958,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.4.2\"\n },\n {\n \"id\": 239042959,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323875/vulnerabilities\"\n },\n \"ip_address\": \"223.202.6.22\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189992,\n \"name\": \"Web Ports (8000 OR 8080) Critical (80+)\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323858,\n \"created_at\": \"2019-11-05T15:38:59Z\",\n \"priority\": 10,\n \"operating_system\": \"HP - embedded - embedded\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.223.32\",\n \"vulnerabilities_count\": 10,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042874,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323858/vulnerabilities\"\n },\n \"ip_address\": \"63.245.223.32\",\n \"database\": null,\n \"hostname\": \"api-dev.community.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18323840,\n \"created_at\": \"2019-11-05T15:38:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.221.128\",\n \"vulnerabilities_count\": 84,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042848,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042849,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323840/vulnerabilities\"\n },\n \"ip_address\": \"63.245.221.128\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323832,\n \"created_at\": \"2019-11-05T15:38:58Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D48564584838\",\n \"vulnerabilities_count\": 359,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042831,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042832,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": \"BIND\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6\"\n },\n {\n \"id\": 239042833,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042834,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042835,\n \"port_number\": 41740,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042836,\n \"port_number\": 41967,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323832/vulnerabilities\"\n },\n \"ip_address\": \"63.245.218.9\",\n \"database\": null,\n \"hostname\": \"ns2b.pubdmz.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D48564584838\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323829,\n \"created_at\": \"2019-11-05T15:38:58Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D48564560438\",\n \"vulnerabilities_count\": 359,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042816,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042817,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": \"BIND\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6\"\n },\n {\n \"id\": 239042818,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042819,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042820,\n \"port_number\": 46441,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042821,\n \"port_number\": 53697,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323829/vulnerabilities\"\n },\n \"ip_address\": \"63.245.218.8\",\n \"database\": null,\n \"hostname\": \"ns2a.pubdmz.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D48564560438\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323828,\n \"created_at\": \"2019-11-05T15:38:58Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.218.7\",\n \"vulnerabilities_count\": 359,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042822,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042823,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": \"BIND\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6\"\n },\n {\n \"id\": 239042824,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042825,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042826,\n \"port_number\": 46441,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042827,\n \"port_number\": 53697,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323828/vulnerabilities\"\n },\n \"ip_address\": \"63.245.218.7\",\n \"database\": null,\n \"hostname\": \"ns2.acmeinc.org\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323827,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CFC\",\n \"vulnerabilities_count\": 90,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042798,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042799,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042800,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042801,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042802,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323827/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.223\",\n \"database\": null,\n \"hostname\": \"zlb5.ops.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CFC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323825,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CF6\",\n \"vulnerabilities_count\": 90,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042793,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042794,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042795,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042796,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042797,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323825/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.222\",\n \"database\": null,\n \"hostname\": \"zlb4.ops.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CF6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323823,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CDA\",\n \"vulnerabilities_count\": 90,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042783,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042784,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042785,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042786,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042787,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323823/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.221\",\n \"database\": null,\n \"hostname\": \"zlb3.ops.phx1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CDA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323822,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD4513A2\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042780,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042781,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042782,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323822/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.218\",\n \"database\": null,\n \"hostname\": \"pp-zlb12.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD4513A2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323821,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CC8\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042788,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042789,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042790,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042791,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042792,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323821/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.217\",\n \"database\": null,\n \"hostname\": \"pp-zlb11.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CC8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323820,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CF0\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042775,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042776,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042777,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042778,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042779,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323820/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.215\",\n \"database\": null,\n \"hostname\": \"pp-zlb09.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CF0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323819,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CA4\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042770,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042771,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042772,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042773,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042774,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323819/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.216\",\n \"database\": null,\n \"hostname\": \"pp-zlb10.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CA4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323818,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0060DD450CA6\",\n \"vulnerabilities_count\": 92,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042744,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239042745,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042746,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042747,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042748,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323818/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.214\",\n \"database\": null,\n \"hostname\": \"pp-zlb08.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0060DD450CA6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323817,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.7\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"3C4A92DD0CB0\",\n \"vulnerabilities_count\": 168,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042759,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239042760,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042761,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042762,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042763,\n \"port_number\": 742,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042764,\n \"port_number\": 745,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323817/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.210\",\n \"database\": null,\n \"hostname\": \"pp-zlb06.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"3C4A92DD0CB0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323814,\n \"created_at\": \"2019-11-05T15:38:57Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.7\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"F4CE467EDFD0\",\n \"vulnerabilities_count\": 168,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042749,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239042750,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042751,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042752,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042753,\n \"port_number\": 871,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239042754,\n \"port_number\": 874,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323814/vulnerabilities\"\n },\n \"ip_address\": \"63.245.217.204\",\n \"database\": null,\n \"hostname\": \"pp-zlb05.phx.acmeinc.net\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"F4CE467EDFD0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323659,\n \"created_at\": \"2019-11-05T15:38:55Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.215.85\",\n \"vulnerabilities_count\": 32,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042144,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323659/vulnerabilities\"\n },\n \"ip_address\": \"63.245.215.85\",\n \"database\": null,\n \"hostname\": \"tableau-portal-zlb.vips.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18323616,\n \"created_at\": \"2019-11-05T15:38:54Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.8\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.215.43\",\n \"vulnerabilities_count\": 96,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042062,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323616/vulnerabilities\"\n },\n \"ip_address\": \"63.245.215.43\",\n \"database\": null,\n \"hostname\": \"cvs-rw-zlb.vips.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323588,\n \"created_at\": \"2019-11-05T15:38:54Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"63.245.214.124\",\n \"vulnerabilities_count\": 240,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239042068,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323588/vulnerabilities\"\n },\n \"ip_address\": \"63.245.214.124\",\n \"database\": null,\n \"hostname\": \"vpn1.releng.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323561,\n \"created_at\": \"2019-11-05T15:38:52Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"001321AED2D8\",\n \"vulnerabilities_count\": 27,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239041938,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239041939,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041940,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041941,\n \"port_number\": 793,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041942,\n \"port_number\": 796,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041943,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323561/vulnerabilities\"\n },\n \"ip_address\": \"63.245.208.5\",\n \"database\": null,\n \"hostname\": \"boris.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"001321AED2D8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189887,\n \"name\": \"DMZ\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189900,\n \"name\": \"External Assets Past Due Items\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323421,\n \"created_at\": \"2019-11-05T15:38:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"000C297B283C\",\n \"vulnerabilities_count\": 273,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239041233,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239041234,\n \"port_number\": 53,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DNS-TCP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041235,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239041236,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239041237,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323421/vulnerabilities\"\n },\n \"ip_address\": \"10.24.75.42\",\n \"database\": null,\n \"hostname\": \"nagios1.private.pek1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"000C297B283C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323368,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04D5\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040742,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323368/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.202\",\n \"database\": null,\n \"hostname\": \"logstash1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04D5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323365,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04CB\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040736,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040737,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040738,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323365/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.189\",\n \"database\": null,\n \"hostname\": \"nuxeo1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04CB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323364,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04D1\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040727,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323364/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.198\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04D1\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323360,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04C6\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040721,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323360/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.170\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04C6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323359,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04CA\",\n \"vulnerabilities_count\": 60,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040716,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040717,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040718,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323359/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.188\",\n \"database\": null,\n \"hostname\": \"razuna2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04CA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323358,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04F5\",\n \"vulnerabilities_count\": 67,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040709,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040710,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323358/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.190\",\n \"database\": null,\n \"hostname\": \"study1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04F5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323355,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04C1\",\n \"vulnerabilities_count\": 69,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040714,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040715,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323355/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.166\",\n \"database\": null,\n \"hostname\": \"assets2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04C1\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323350,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04BA\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040696,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323350/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.161\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04BA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323349,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04BD\",\n \"vulnerabilities_count\": 119,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040707,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040708,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323349/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.163\",\n \"database\": null,\n \"hostname\": \"festival3.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04BD\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323348,\n \"created_at\": \"2019-11-05T15:38:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04F8\",\n \"vulnerabilities_count\": 119,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040698,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040699,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323348/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.164\",\n \"database\": null,\n \"hostname\": \"festival4.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04F8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323346,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04B2\",\n \"vulnerabilities_count\": 164,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040705,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040706,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323346/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.154\",\n \"database\": null,\n \"hostname\": \"source-prod1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04B2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323345,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04B6\",\n \"vulnerabilities_count\": 268,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040694,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323345/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.158\",\n \"database\": null,\n \"hostname\": \"rhipe-build-centos6-1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04B6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18323343,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04B0\",\n \"vulnerabilities_count\": 197,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040690,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040691,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323343/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.152\",\n \"database\": null,\n \"hostname\": \"source-dev1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04B0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323335,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"linkdrop1.vm.labs.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 49,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040671,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239040672,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239040673,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040674,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040675,\n \"port_number\": 837,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040676,\n \"port_number\": 840,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040677,\n \"port_number\": 873,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Rsync\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323335/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.145\",\n \"database\": null,\n \"hostname\": \"linkdrop1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18323332,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04A4\",\n \"vulnerabilities_count\": 68,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040660,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040661,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [\n \"test1234\"\n ],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323332/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.140\",\n \"database\": null,\n \"hostname\": \"static-www1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04A4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323331,\n \"created_at\": \"2019-11-05T15:38:47Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04A2\",\n \"vulnerabilities_count\": 102,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040680,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040681,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323331/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.138\",\n \"database\": null,\n \"hostname\": \"sumomo-web1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04A2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323329,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E046F\",\n \"vulnerabilities_count\": 201,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040657,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040658,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239040659,\n \"port_number\": 12345,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Thin\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2.11\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323329/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.136\",\n \"database\": null,\n \"hostname\": \"vcap-dea1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E046F\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323319,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0481\",\n \"vulnerabilities_count\": 71,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040625,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040626,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040627,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Winstone Servlet Engine v0.9.10\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323319/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.117\",\n \"database\": null,\n \"hostname\": \"butler1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0481\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323313,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0475\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040613,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040614,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323313/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.105\",\n \"database\": null,\n \"hostname\": \"teachwebmaking-prod1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0475\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323307,\n \"created_at\": \"2019-11-05T15:38:46Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E046D\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040608,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040609,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323307/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.97\",\n \"database\": null,\n \"hostname\": \"vidly.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E046D\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323304,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E045B\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040610,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040611,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323304/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.79\",\n \"database\": null,\n \"hostname\": \"webfwd2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E045B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323293,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E044D\",\n \"vulnerabilities_count\": 122,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040591,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040592,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323293/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.65\",\n \"database\": null,\n \"hostname\": \"festival2.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E044D\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323292,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0448\",\n \"vulnerabilities_count\": 123,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040598,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040599,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323292/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.60\",\n \"database\": null,\n \"hostname\": \"festival1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0448\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323291,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E044B\",\n \"vulnerabilities_count\": 118,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040596,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040597,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323291/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.63\",\n \"database\": null,\n \"hostname\": \"webfwd-stage1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E044B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323284,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0424\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040574,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n },\n {\n \"id\": 239040575,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239040576,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323284/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.36\",\n \"database\": null,\n \"hostname\": \"resourcespace1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0424\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323282,\n \"created_at\": \"2019-11-05T15:38:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 10.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E0423\",\n \"vulnerabilities_count\": 177,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040558,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3p1\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323282/vulnerabilities\"\n },\n \"ip_address\": \"10.22.112.35\",\n \"database\": null,\n \"hostname\": \"razuna1.vm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E0423\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323235,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04EB\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040449,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040450,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040451,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040452,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323235/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.97\",\n \"database\": null,\n \"hostname\": \"gradient3.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04EB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323233,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04E9\",\n \"vulnerabilities_count\": 52,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040422,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040423,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323233/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.95\",\n \"database\": null,\n \"hostname\": \"gradient1.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04E9\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323232,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04BF\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040417,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040418,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323232/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.90\",\n \"database\": null,\n \"hostname\": \"tiffin1.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04BF\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323229,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04E5\",\n \"vulnerabilities_count\": 54,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040411,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323229/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.69\",\n \"database\": null,\n \"hostname\": \"logstash1.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04E5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323228,\n \"created_at\": \"2019-11-05T15:38:44Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00123E6E04EA\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040412,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040413,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040414,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239040415,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323228/vulnerabilities\"\n },\n \"ip_address\": \"10.22.110.96\",\n \"database\": null,\n \"hostname\": \"gradient2.adm.labs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00123E6E04EA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323196,\n \"created_at\": \"2019-11-05T15:38:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2917\",\n \"vulnerabilities_count\": 285,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040371,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239040372,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Winstone Servlet Engine v0.9.10\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323196/vulnerabilities\"\n },\n \"ip_address\": \"10.22.92.150\",\n \"database\": null,\n \"hostname\": \"jenkins1.sec.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2917\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323193,\n \"created_at\": \"2019-11-05T15:38:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D741018\",\n \"vulnerabilities_count\": 91,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040308,\n \"port_number\": 21,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"FTP\",\n \"ostype\": \"\",\n \"product\": \"vsFTPd\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.3.5\"\n },\n {\n \"id\": 239040309,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n },\n {\n \"id\": 239040310,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Postfix\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040311,\n \"port_number\": 5432,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Postgres\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040312,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040313,\n \"port_number\": 6000,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"XWindows\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040314,\n \"port_number\": 8081,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"SimpleHTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"0.6\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323193/vulnerabilities\"\n },\n \"ip_address\": \"10.22.92.147\",\n \"database\": null,\n \"hostname\": \"fuzzer-linux4.sec.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D741018\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323190,\n \"created_at\": \"2019-11-05T15:38:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D73FC80\",\n \"vulnerabilities_count\": 65,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239040280,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n },\n {\n \"id\": 239040281,\n \"port_number\": 25,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SMTP\",\n \"ostype\": \"\",\n \"product\": \"Postfix\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040282,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040283,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040284,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040285,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040286,\n \"port_number\": 2200,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"6.1p1\"\n },\n {\n \"id\": 239040287,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239040288,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239040289,\n \"port_number\": 35343,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040290,\n \"port_number\": 37522,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040291,\n \"port_number\": 38615,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040292,\n \"port_number\": 47144,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040293,\n \"port_number\": 50153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040294,\n \"port_number\": 52070,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040295,\n \"port_number\": 53336,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040296,\n \"port_number\": 57181,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040297,\n \"port_number\": 57923,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239040298,\n \"port_number\": 58333,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323190/vulnerabilities\"\n },\n \"ip_address\": \"10.22.92.145\",\n \"database\": null,\n \"hostname\": \"fuzzer-linux2.sec.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D73FC80\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323134,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299370012\",\n \"vulnerabilities_count\": 184,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039949,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039950,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039951,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323134/vulnerabilities\"\n },\n \"ip_address\": \"10.22.83.41\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.builder.addons.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299370012\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323129,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299368103\",\n \"vulnerabilities_count\": 153,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039931,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039932,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039933,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323129/vulnerabilities\"\n },\n \"ip_address\": \"10.22.83.40\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.builder.addons.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299368103\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323125,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26BE\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039928,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039929,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039930,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323125/vulnerabilities\"\n },\n \"ip_address\": \"10.22.82.44\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.bugs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26BE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323124,\n \"created_at\": \"2019-11-05T15:38:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26BF\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039883,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039884,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039885,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323124/vulnerabilities\"\n },\n \"ip_address\": \"10.22.82.45\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.bugs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26BF\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323123,\n \"created_at\": \"2019-11-05T15:38:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26BD\",\n \"vulnerabilities_count\": 120,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039905,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039906,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039907,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323123/vulnerabilities\"\n },\n \"ip_address\": \"10.22.82.43\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.bugs.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26BD\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323116,\n \"created_at\": \"2019-11-05T15:38:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.6\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DBC\",\n \"vulnerabilities_count\": 276,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039934,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039935,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039936,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039937,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039938,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039939,\n \"port_number\": 926,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039940,\n \"port_number\": 929,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039941,\n \"port_number\": 964,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039942,\n \"port_number\": 967,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039943,\n \"port_number\": 996,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039944,\n \"port_number\": 999,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039945,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039946,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039947,\n \"port_number\": 32957,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039948,\n \"port_number\": 43696,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323116/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DBC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18323092,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB631B\",\n \"vulnerabilities_count\": 143,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039644,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239039645,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039646,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039647,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039648,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039649,\n \"port_number\": 797,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039650,\n \"port_number\": 800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039651,\n \"port_number\": 803,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039652,\n \"port_number\": 806,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039653,\n \"port_number\": 843,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039654,\n \"port_number\": 846,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039655,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039656,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039657,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239039658,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239039659,\n \"port_number\": 35074,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039660,\n \"port_number\": 54465,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323092/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.140\",\n \"database\": null,\n \"hostname\": \"oldstage2.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB631B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323087,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056971EF7\",\n \"vulnerabilities_count\": 511,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039805,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039806,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039807,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039808,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039809,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039810,\n \"port_number\": 933,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039811,\n \"port_number\": 936,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039812,\n \"port_number\": 961,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039813,\n \"port_number\": 964,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039814,\n \"port_number\": 1004,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039815,\n \"port_number\": 1007,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039816,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039817,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039818,\n \"port_number\": 35064,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039819,\n \"port_number\": 38153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323087/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.135\",\n \"database\": null,\n \"hostname\": \"acmeinc-eu.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056971EF7\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323082,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E04\",\n \"vulnerabilities_count\": 331,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039698,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039699,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039700,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039701,\n \"port_number\": 893,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039702,\n \"port_number\": 896,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039703,\n \"port_number\": 988,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039704,\n \"port_number\": 991,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039705,\n \"port_number\": 1016,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039706,\n \"port_number\": 1019,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039707,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039708,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039709,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039710,\n \"port_number\": 44975,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039711,\n \"port_number\": 48722,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323082/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.132\",\n \"database\": null,\n \"hostname\": \"amoforums1.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E04\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323081,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E1C\",\n \"vulnerabilities_count\": 53,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039557,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239039558,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039559,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n },\n {\n \"id\": 239039560,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039561,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039562,\n \"port_number\": 760,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039563,\n \"port_number\": 763,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039564,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323081/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.134\",\n \"database\": null,\n \"hostname\": \"verbatim1.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E1C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18323077,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"80C16E7959E0\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039584,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039585,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039586,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323077/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.100\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"80C16E7959E0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323075,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAF5518\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039524,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039525,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039526,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323075/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.104\",\n \"database\": null,\n \"hostname\": \"elasticsearch5.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAF5518\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323073,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAF0520\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039544,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039545,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039546,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323073/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.102\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAF0520\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323072,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAE2B70\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039547,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039548,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039549,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323072/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.101\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAE2B70\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323070,\n \"created_at\": \"2019-11-05T15:38:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162DAF5568\",\n \"vulnerabilities_count\": 125,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039446,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039447,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039448,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323070/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.103\",\n \"database\": null,\n \"hostname\": \"elasticsearch4.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162DAF5568\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323046,\n \"created_at\": \"2019-11-05T15:38:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.6\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DBB\",\n \"vulnerabilities_count\": 276,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039295,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239039296,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039297,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239039298,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039299,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039300,\n \"port_number\": 926,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039301,\n \"port_number\": 929,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039302,\n \"port_number\": 964,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039303,\n \"port_number\": 967,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039304,\n \"port_number\": 996,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039305,\n \"port_number\": 999,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039306,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039307,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039308,\n \"port_number\": 32957,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239039309,\n \"port_number\": 43696,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323046/vulnerabilities\"\n },\n \"ip_address\": \"10.22.81.35\",\n \"database\": null,\n \"hostname\": \"mrapp4.stage.webapp.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DBB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18323030,\n \"created_at\": \"2019-11-05T15:38:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490772\",\n \"vulnerabilities_count\": 182,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039038,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039039,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239039040,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323030/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.127\",\n \"database\": null,\n \"hostname\": \"node63.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490772\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323029,\n \"created_at\": \"2019-11-05T15:38:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490762\",\n \"vulnerabilities_count\": 182,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039041,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239039042,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239039043,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323029/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.126\",\n \"database\": null,\n \"hostname\": \"node62.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490762\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323022,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490702\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039011,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323022/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.120\",\n \"database\": null,\n \"hostname\": \"node56.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490702\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323021,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490672\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039014,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323021/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.119\",\n \"database\": null,\n \"hostname\": \"node55.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490672\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323020,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490722\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039007,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323020/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.122\",\n \"database\": null,\n \"hostname\": \"node58.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490722\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323019,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490712\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039002,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323019/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.121\",\n \"database\": null,\n \"hostname\": \"node57.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490712\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323018,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490662\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039004,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323018/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.118\",\n \"database\": null,\n \"hostname\": \"node54.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490662\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323015,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490622\",\n \"vulnerabilities_count\": 207,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239039001,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323015/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.114\",\n \"database\": null,\n \"hostname\": \"node50.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490622\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323014,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490632\",\n \"vulnerabilities_count\": 207,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038999,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323014/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.115\",\n \"database\": null,\n \"hostname\": \"node51.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490632\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323013,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490612\",\n \"vulnerabilities_count\": 178,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038998,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323013/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.113\",\n \"database\": null,\n \"hostname\": \"node49.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490612\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323010,\n \"created_at\": \"2019-11-05T15:38:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490602\",\n \"vulnerabilities_count\": 178,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038996,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323010/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.112\",\n \"database\": null,\n \"hostname\": \"node48.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490602\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323005,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490512\",\n \"vulnerabilities_count\": 180,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038989,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038990,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323005/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.105\",\n \"database\": null,\n \"hostname\": \"node41.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490512\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323004,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490502\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038988,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323004/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.104\",\n \"database\": null,\n \"hostname\": \"node40.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490502\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323003,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490472\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038987,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323003/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.103\",\n \"database\": null,\n \"hostname\": \"node39.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490472\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323002,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490462\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038986,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323002/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.102\",\n \"database\": null,\n \"hostname\": \"node38.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490462\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323001,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490452\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038985,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323001/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.101\",\n \"database\": null,\n \"hostname\": \"node37.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490452\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18323000,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490442\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038983,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18323000/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.100\",\n \"database\": null,\n \"hostname\": \"node36.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490442\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322999,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490432\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038981,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322999/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.99\",\n \"database\": null,\n \"hostname\": \"node35.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490432\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322998,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490422\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038982,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322998/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.98\",\n \"database\": null,\n \"hostname\": \"node34.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490422\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322997,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490412\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038984,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322997/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.97\",\n \"database\": null,\n \"hostname\": \"node33.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490412\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322996,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490402\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038978,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322996/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.96\",\n \"database\": null,\n \"hostname\": \"node32.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490402\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322995,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490372\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038980,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322995/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.95\",\n \"database\": null,\n \"hostname\": \"node31.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490372\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322994,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490362\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038979,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322994/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.94\",\n \"database\": null,\n \"hostname\": \"node30.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490362\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322993,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490352\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038976,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322993/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.93\",\n \"database\": null,\n \"hostname\": \"node29.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490352\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322992,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490342\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038977,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322992/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.92\",\n \"database\": null,\n \"hostname\": \"node28.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490342\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322991,\n \"created_at\": \"2019-11-05T15:38:33Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490332\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038975,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322991/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.91\",\n \"database\": null,\n \"hostname\": \"node27.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490332\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322990,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490322\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038973,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322990/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.90\",\n \"database\": null,\n \"hostname\": \"node26.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490322\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322989,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490312\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038972,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322989/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.89\",\n \"database\": null,\n \"hostname\": \"node25.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490312\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322988,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490272\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038974,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322988/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.87\",\n \"database\": null,\n \"hostname\": \"node23.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490272\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322987,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490302\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038971,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322987/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.88\",\n \"database\": null,\n \"hostname\": \"node24.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490302\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322986,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490262\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038968,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322986/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.86\",\n \"database\": null,\n \"hostname\": \"node22.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490262\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322985,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490242\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038969,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322985/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.84\",\n \"database\": null,\n \"hostname\": \"node20.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490242\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322984,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490232\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038970,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322984/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.83\",\n \"database\": null,\n \"hostname\": \"node19.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490232\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322983,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490252\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038967,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322983/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.85\",\n \"database\": null,\n \"hostname\": \"node21.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490252\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322982,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490202\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038966,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322982/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.80\",\n \"database\": null,\n \"hostname\": \"node16.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490202\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322981,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490222\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038963,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322981/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.82\",\n \"database\": null,\n \"hostname\": \"node18.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490222\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322980,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490212\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038965,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322980/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.81\",\n \"database\": null,\n \"hostname\": \"node17.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490212\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322979,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490172\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038964,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322979/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.79\",\n \"database\": null,\n \"hostname\": \"node15.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490172\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322978,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490162\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038962,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322978/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.78\",\n \"database\": null,\n \"hostname\": \"node14.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490162\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322977,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490152\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038961,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322977/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.77\",\n \"database\": null,\n \"hostname\": \"node13.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490152\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322976,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490132\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038960,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322976/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.75\",\n \"database\": null,\n \"hostname\": \"node11.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490132\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322975,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490142\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038957,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322975/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.76\",\n \"database\": null,\n \"hostname\": \"node12.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490142\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322974,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490112\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038956,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322974/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.73\",\n \"database\": null,\n \"hostname\": \"node9.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490112\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322973,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490102\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038946,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322973/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.72\",\n \"database\": null,\n \"hostname\": \"node8.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490102\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322972,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490122\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038958,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322972/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.74\",\n \"database\": null,\n \"hostname\": \"node10.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490122\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322971,\n \"created_at\": \"2019-11-05T15:38:32Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490072\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038959,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322971/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.71\",\n \"database\": null,\n \"hostname\": \"node7.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490072\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322970,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490062\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038937,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322970/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.70\",\n \"database\": null,\n \"hostname\": \"node6.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490062\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322969,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490022\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038939,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322969/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.66\",\n \"database\": null,\n \"hostname\": \"node2.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490022\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322968,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490052\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038938,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322968/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.69\",\n \"database\": null,\n \"hostname\": \"node5.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490052\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322967,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490042\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038936,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322967/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.68\",\n \"database\": null,\n \"hostname\": \"node4.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490042\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322966,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490032\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038934,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322966/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.67\",\n \"database\": null,\n \"hostname\": \"node3.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490032\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322965,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490002\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038935,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322965/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.64\",\n \"database\": null,\n \"hostname\": \"node0.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490002\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322964,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002299490012\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038933,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322964/vulnerabilities\"\n },\n \"ip_address\": \"10.22.78.65\",\n \"database\": null,\n \"hostname\": \"node1.bunker.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002299490012\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322963,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"VMware - VMware ESX/ESXi - VMware ESX Server - 4.1.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.22.75.250\",\n \"vulnerabilities_count\": 255,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038940,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038941,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038942,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038943,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239038944,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239038945,\n \"port_number\": 5989,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"sfcb\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322963/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.250\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18322960,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows Server 2008 R2, Standard Edition - SP1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"BYOB-KEYMASTER1\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038919,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038920,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038921,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038922,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038923,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038924,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038925,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038926,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038927,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322960/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.240\",\n \"database\": null,\n \"hostname\": \"BYOB-KEYMASTER1\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18322958,\n \"created_at\": \"2019-11-05T15:38:31Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DC2\",\n \"vulnerabilities_count\": 575,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038947,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038948,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038949,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038950,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038951,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038952,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038953,\n \"port_number\": 873,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Rsync\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038954,\n \"port_number\": 898,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038955,\n \"port_number\": 901,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322958/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.204\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DC2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322944,\n \"created_at\": \"2019-11-05T15:38:30Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00237DA4D29C\",\n \"vulnerabilities_count\": 87,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038842,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038843,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038844,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038845,\n \"port_number\": 769,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038846,\n \"port_number\": 772,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038847,\n \"port_number\": 778,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038848,\n \"port_number\": 781,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038849,\n \"port_number\": 815,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038850,\n \"port_number\": 818,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038851,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038852,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038853,\n \"port_number\": 36535,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038854,\n \"port_number\": 51910,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322944/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.143\",\n \"database\": null,\n \"hostname\": \"backup2.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00237DA4D29C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322941,\n \"created_at\": \"2019-11-05T15:38:30Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB3A27\",\n \"vulnerabilities_count\": 284,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038906,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322941/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.140\",\n \"database\": null,\n \"hostname\": \"gads1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB3A27\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322933,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.6\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"001B78986474\",\n \"vulnerabilities_count\": 368,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038877,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038878,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038879,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038880,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038881,\n \"port_number\": 601,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038882,\n \"port_number\": 873,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Rsync\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038883,\n \"port_number\": 946,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038884,\n \"port_number\": 949,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038885,\n \"port_number\": 985,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038886,\n \"port_number\": 988,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038887,\n \"port_number\": 1022,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038888,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038889,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038890,\n \"port_number\": 9999,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038891,\n \"port_number\": 47888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038892,\n \"port_number\": 57223,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322933/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.130\",\n \"database\": null,\n \"hostname\": \"mradm02.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"001B78986474\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n }\n ]\n },\n {\n \"id\": 18322931,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"AXIS - Linux - Linux - 2.6)\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"as-logger1.private.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038760,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038761,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322931/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.131\",\n \"database\": null,\n \"hostname\": \"as-logger1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322927,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E83935BD0994\",\n \"vulnerabilities_count\": 360,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038765,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038766,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038767,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038768,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038769,\n \"port_number\": 514,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Remote Shell\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038770,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038771,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Jetty\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.0.5.v20130815\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322927/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.126\",\n \"database\": null,\n \"hostname\": \"netops1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E83935BD0994\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322921,\n \"created_at\": \"2019-11-05T15:38:29Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26A0\",\n \"vulnerabilities_count\": 80,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038744,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038745,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038746,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038747,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038748,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038749,\n \"port_number\": 7002,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"afs3-prserver (users & groups database)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322921/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.111\",\n \"database\": null,\n \"hostname\": \"graphite2.dev.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26A0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196116,\n \"name\": \"OWASP 3 (Sensitive Data Exposure)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322918,\n \"created_at\": \"2019-11-05T15:38:28Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB292A\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038719,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n },\n {\n \"id\": 239038720,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.22\"\n },\n {\n \"id\": 239038721,\n \"port_number\": 514,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Remote Shell\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322918/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.99\",\n \"database\": null,\n \"hostname\": \"nsmserver1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB292A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322908,\n \"created_at\": \"2019-11-05T15:38:28Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB62F2\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038704,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038705,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038706,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038707,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038708,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038709,\n \"port_number\": 737,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038710,\n \"port_number\": 740,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038711,\n \"port_number\": 769,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038712,\n \"port_number\": 772,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038713,\n \"port_number\": 777,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038714,\n \"port_number\": 780,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038715,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038716,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038717,\n \"port_number\": 34472,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038718,\n \"port_number\": 52263,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322908/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.77\",\n \"database\": null,\n \"hostname\": \"sentry1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB62F2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322904,\n \"created_at\": \"2019-11-05T15:38:28Z\",\n \"priority\": 10,\n \"operating_system\": \"CentOS - Linux - Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"F4CE4689B708\",\n \"vulnerabilities_count\": 192,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038648,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038649,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038650,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038651,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038652,\n \"port_number\": 788,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038653,\n \"port_number\": 791,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322904/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.74\",\n \"database\": null,\n \"hostname\": \"tufin1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"F4CE4689B708\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 206469,\n \"name\": \"Pradip's Stuff\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322901,\n \"created_at\": \"2019-11-05T15:38:27Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.7\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E43\",\n \"vulnerabilities_count\": 263,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038659,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038660,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239038661,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038662,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038663,\n \"port_number\": 623,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038664,\n \"port_number\": 626,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322901/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.67\",\n \"database\": null,\n \"hostname\": \"virusscan1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E43\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322900,\n \"created_at\": \"2019-11-05T15:38:27Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.8\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DB6\",\n \"vulnerabilities_count\": 266,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038643,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038644,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038645,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038646,\n \"port_number\": 602,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038647,\n \"port_number\": 605,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322900/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.65\",\n \"database\": null,\n \"hostname\": \"rhel5dev32.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DB6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322886,\n \"created_at\": \"2019-11-05T15:38:27Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D8D385B6C880\",\n \"vulnerabilities_count\": 287,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038492,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038493,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322886/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.42\",\n \"database\": null,\n \"hostname\": \"nagios1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D8D385B6C880\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322864,\n \"created_at\": \"2019-11-05T15:38:26Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DFB\",\n \"vulnerabilities_count\": 261,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038457,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038458,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038459,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322864/vulnerabilities\"\n },\n \"ip_address\": \"10.22.75.20\",\n \"database\": null,\n \"hostname\": \"ganglia1.private.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DFB\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322845,\n \"created_at\": \"2019-11-05T15:38:25Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB28F3\",\n \"vulnerabilities_count\": 189,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038252,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038253,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038254,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038255,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038256,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322845/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.163\",\n \"database\": null,\n \"hostname\": \"rhnsat1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB28F3\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322841,\n \"created_at\": \"2019-11-05T15:38:25Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CD74\",\n \"vulnerabilities_count\": 122,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038232,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038233,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038234,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038235,\n \"port_number\": 5901,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038236,\n \"port_number\": 6001,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"XWindows\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322841/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.154\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux4.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CD74\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322839,\n \"created_at\": \"2019-11-05T15:38:25Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CEB8\",\n \"vulnerabilities_count\": 246,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038247,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038248,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.19\"\n },\n {\n \"id\": 239038249,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038250,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322839/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.153\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux3.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CEB8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322838,\n \"created_at\": \"2019-11-05T15:38:24Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CAD8\",\n \"vulnerabilities_count\": 246,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038217,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038218,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.19\"\n },\n {\n \"id\": 239038219,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038220,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322838/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.152\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux2.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CAD8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18322837,\n \"created_at\": \"2019-11-05T15:38:24Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768AD0CE88\",\n \"vulnerabilities_count\": 246,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038226,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038227,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.19\"\n },\n {\n \"id\": 239038228,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038229,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038230,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"nginx\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2.0\"\n },\n {\n \"id\": 239038231,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"WSGIServer\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"0.1\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322837/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.151\",\n \"database\": null,\n \"hostname\": \"stone-ridge-linux1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768AD0CE88\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n }\n ]\n },\n {\n \"id\": 18322825,\n \"created_at\": \"2019-11-05T15:38:24Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E97\",\n \"vulnerabilities_count\": 248,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038165,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239038166,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239038167,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322825/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.138\",\n \"database\": null,\n \"hostname\": \"nagios1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E97\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322802,\n \"created_at\": \"2019-11-05T15:38:22Z\",\n \"priority\": 10,\n \"operating_system\": \"Linux - Linux - Linux - 2.6.27\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"time2.dmz.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 216,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239038024,\n \"port_number\": 13,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"daytime\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038025,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239038026,\n \"port_number\": 37,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"timeserver\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239038027,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.3.33\"\n },\n {\n \"id\": 239038028,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.3.33\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322802/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.69\",\n \"database\": null,\n \"hostname\": \"time2.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322791,\n \"created_at\": \"2019-11-05T15:38:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows Server 2008 R2, Standard Edition - SP1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"byob-windows-signing1.dmz.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 4,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037809,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037810,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037811,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows Server 2008 R2 Standard 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037812,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037813,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037814,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037815,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037816,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037817,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322791/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.58\",\n \"database\": null,\n \"hostname\": \"byob-windows-signing1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189881,\n \"name\": \"Servers\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189951,\n \"name\": \"Windows Server OS\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189995,\n \"name\": \"Windows DC Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215257,\n \"name\": \"KRI5 - Servers without High Vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18322769,\n \"created_at\": \"2019-11-05T15:38:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.9\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"001CC4D80EE4\",\n \"vulnerabilities_count\": 212,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037818,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239037819,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037820,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037821,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037822,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037823,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037824,\n \"port_number\": 606,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037825,\n \"port_number\": 608,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037826,\n \"port_number\": 609,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037827,\n \"port_number\": 611,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037828,\n \"port_number\": 641,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037829,\n \"port_number\": 644,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037830,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037831,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037832,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037833,\n \"port_number\": 45980,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037834,\n \"port_number\": 47402,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322769/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.21\",\n \"database\": null,\n \"hostname\": \"khan.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"001CC4D80EE4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322765,\n \"created_at\": \"2019-11-05T15:38:21Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2E47\",\n \"vulnerabilities_count\": 257,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037835,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239037836,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239037837,\n \"port_number\": 81,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322765/vulnerabilities\"\n },\n \"ip_address\": \"10.22.74.22\",\n \"database\": null,\n \"hostname\": \"ganglia1.dmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2E47\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322716,\n \"created_at\": \"2019-11-05T15:38:20Z\",\n \"priority\": 10,\n \"operating_system\": \"Ubuntu - Linux - Linux - 12.04\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"vidyodashboard.corpdmz.scl3.acmeinc.com\",\n \"vulnerabilities_count\": 1,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037237,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n },\n {\n \"id\": 239037238,\n \"port_number\": 2222,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.9p1\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322716/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.141\",\n \"database\": null,\n \"hostname\": \"vidyodashboard.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n }\n ]\n },\n {\n \"id\": 18322713,\n \"created_at\": \"2019-11-05T15:38:20Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB290D\",\n \"vulnerabilities_count\": 346,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037320,\n \"port_number\": 21,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"FTP\",\n \"ostype\": \"\",\n \"product\": \"vsFTPd\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.2\"\n },\n {\n \"id\": 239037321,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239037322,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"Jetty\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.1.15\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322713/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.138\",\n \"database\": null,\n \"hostname\": \"wifimgr1.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB290D\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322706,\n \"created_at\": \"2019-11-05T15:38:19Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DD5\",\n \"vulnerabilities_count\": 310,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037252,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239037253,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037254,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037255,\n \"port_number\": 947,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037256,\n \"port_number\": 950,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322706/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.129\",\n \"database\": null,\n \"hostname\": \"sectest2.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DD5\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322705,\n \"created_at\": \"2019-11-05T15:38:19Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB2DD4\",\n \"vulnerabilities_count\": 468,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239037208,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"4.3\"\n },\n {\n \"id\": 239037209,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037210,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037211,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037212,\n \"port_number\": 443,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239037213,\n \"port_number\": 748,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037214,\n \"port_number\": 751,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037215,\n \"port_number\": 773,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037216,\n \"port_number\": 776,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037217,\n \"port_number\": 801,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037218,\n \"port_number\": 804,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037219,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037220,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037221,\n \"port_number\": 40013,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239037222,\n \"port_number\": 51627,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322705/vulnerabilities\"\n },\n \"ip_address\": \"10.22.72.128\",\n \"database\": null,\n \"hostname\": \"sectest1.corpdmz.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB2DD4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322640,\n \"created_at\": \"2019-11-05T15:38:16Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA15C3018\",\n \"vulnerabilities_count\": 109,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036980,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036981,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322640/vulnerabilities\"\n },\n \"ip_address\": \"10.22.70.36\",\n \"database\": null,\n \"hostname\": \"bugzilla4.db.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA15C3018\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322611,\n \"created_at\": \"2019-11-05T15:38:15Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048F6D9A6\",\n \"vulnerabilities_count\": 462,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036891,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322611/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.215\",\n \"database\": null,\n \"hostname\": \"node8.testing.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048F6D9A6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322610,\n \"created_at\": \"2019-11-05T15:38:14Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048F6DF2A\",\n \"vulnerabilities_count\": 462,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036879,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036880,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036881,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036882,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322610/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.214\",\n \"database\": null,\n \"hostname\": \"node7.testing.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048F6DF2A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322609,\n \"created_at\": \"2019-11-05T15:38:14Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"0025901AA566\",\n \"vulnerabilities_count\": 474,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036884,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036885,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036886,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036887,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322609/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.213\",\n \"database\": null,\n \"hostname\": \"node6.testing.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"0025901AA566\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322598,\n \"created_at\": \"2019-11-05T15:38:13Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"F4CE46BBC378\",\n \"vulnerabilities_count\": 170,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036725,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322598/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.163\",\n \"database\": null,\n \"hostname\": \"webapp2.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"F4CE46BBC378\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322597,\n \"created_at\": \"2019-11-05T15:38:13Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D8D385619050\",\n \"vulnerabilities_count\": 172,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036722,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036723,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Tomcat\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.2b7\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322597/vulnerabilities\"\n },\n \"ip_address\": \"10.22.31.162\",\n \"database\": null,\n \"hostname\": \"webapp1.stage.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D8D385619050\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189905,\n \"name\": \"Web Ports (8000 OR 8080)\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322579,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D7688A0\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036711,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036712,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036713,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322579/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.252\",\n \"database\": null,\n \"hostname\": \"node2.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D7688A0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322577,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768A4FB5A0\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036717,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036718,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036719,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322577/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.253\",\n \"database\": null,\n \"hostname\": \"node1.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768A4FB5A0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322574,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D787E20\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036643,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036644,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036645,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322574/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.250\",\n \"database\": null,\n \"hostname\": \"node4.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D787E20\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322573,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D76D2FC\",\n \"vulnerabilities_count\": 300,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036646,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036647,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036648,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322573/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.251\",\n \"database\": null,\n \"hostname\": \"node3.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D76D2FC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322572,\n \"created_at\": \"2019-11-05T15:38:12Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D78B398\",\n \"vulnerabilities_count\": 299,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036641,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036642,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322572/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.249\",\n \"database\": null,\n \"hostname\": \"node5.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D78B398\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322571,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"2C768A56D828\",\n \"vulnerabilities_count\": 299,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036622,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036623,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322571/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.247\",\n \"database\": null,\n \"hostname\": \"node7.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"2C768A56D828\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322570,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D708914\",\n \"vulnerabilities_count\": 299,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036605,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036606,\n \"port_number\": 8082,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"MX4J-HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"1.0\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322570/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.248\",\n \"database\": null,\n \"hostname\": \"node6.bagheera.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D708914\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322569,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB26A2\",\n \"vulnerabilities_count\": 123,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036583,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036584,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036585,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322569/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.138\",\n \"database\": null,\n \"hostname\": \"bamboo1.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB26A2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322568,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048F52E94\",\n \"vulnerabilities_count\": 583,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036655,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036656,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239036657,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036658,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036659,\n \"port_number\": 5432,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Postgres\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322568/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.91\",\n \"database\": null,\n \"hostname\": \"node24.generic.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048F52E94\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189954,\n \"name\": \"Kenna High CVSS Score Low\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322564,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"00259069ED26\",\n \"vulnerabilities_count\": 191,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036517,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036518,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036519,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322564/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.73\",\n \"database\": null,\n \"hostname\": \"elasticsearch6.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"00259069ED26\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322562,\n \"created_at\": \"2019-11-05T15:38:11Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048DCA8F6\",\n \"vulnerabilities_count\": 662,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036589,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036590,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036591,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036592,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036593,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036594,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036595,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036596,\n \"port_number\": 35801,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036597,\n \"port_number\": 38784,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036598,\n \"port_number\": 40237,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036599,\n \"port_number\": 41428,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036600,\n \"port_number\": 44815,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036601,\n \"port_number\": 60757,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322562/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.70\",\n \"database\": null,\n \"hostname\": \"elasticsearch3.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048DCA8F6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322561,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048DCA93C\",\n \"vulnerabilities_count\": 650,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036660,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036661,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036662,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036663,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036664,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036665,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036666,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036667,\n \"port_number\": 34558,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036668,\n \"port_number\": 35957,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036669,\n \"port_number\": 36013,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036670,\n \"port_number\": 55458,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036671,\n \"port_number\": 58459,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036672,\n \"port_number\": 58706,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322561/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.68\",\n \"database\": null,\n \"hostname\": \"elasticsearch1.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048DCA93C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322559,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.0\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"003048DCA800\",\n \"vulnerabilities_count\": 664,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036609,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036610,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036611,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036612,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036613,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036614,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036615,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036616,\n \"port_number\": 38548,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036617,\n \"port_number\": 38607,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036618,\n \"port_number\": 39558,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036619,\n \"port_number\": 42555,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036620,\n \"port_number\": 44971,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036621,\n \"port_number\": 58887,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322559/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.69\",\n \"database\": null,\n \"hostname\": \"elasticsearch2.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"003048DCA800\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322553,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.2\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E83935BCD160\",\n \"vulnerabilities_count\": 456,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036563,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036564,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036565,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036566,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036567,\n \"port_number\": 875,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036568,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036569,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"nfs_acl\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036570,\n \"port_number\": 33797,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036571,\n \"port_number\": 34239,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036572,\n \"port_number\": 34271,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036573,\n \"port_number\": 41796,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036574,\n \"port_number\": 42283,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036575,\n \"port_number\": 43200,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036576,\n \"port_number\": 49662,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036577,\n \"port_number\": 52667,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036578,\n \"port_number\": 53193,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036579,\n \"port_number\": 57468,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322553/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.21\",\n \"database\": null,\n \"hostname\": \"etl2.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E83935BCD160\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322552,\n \"created_at\": \"2019-11-05T15:38:10Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 5.5\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"D8D3856627E0\",\n \"vulnerabilities_count\": 259,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036526,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.2\"\n },\n {\n \"id\": 239036527,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.3\"\n },\n {\n \"id\": 239036528,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036529,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036530,\n \"port_number\": 723,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036531,\n \"port_number\": 726,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rquotad\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036532,\n \"port_number\": 740,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036533,\n \"port_number\": 743,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036534,\n \"port_number\": 811,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036535,\n \"port_number\": 814,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"mountd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036536,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036537,\n \"port_number\": 2049,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036538,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": \"MySQL\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.5.31\"\n },\n {\n \"id\": 239036539,\n \"port_number\": 33921,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036540,\n \"port_number\": 39831,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322552/vulnerabilities\"\n },\n \"ip_address\": \"10.22.27.36\",\n \"database\": null,\n \"hostname\": \"mysql1.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"D8D3856627E0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n }\n ]\n },\n {\n \"id\": 18322488,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115B98EA80\",\n \"vulnerabilities_count\": 242,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036264,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036265,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.15\"\n },\n {\n \"id\": 239036266,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036267,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036268,\n \"port_number\": 8080,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036269,\n \"port_number\": 33661,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036270,\n \"port_number\": 54353,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036271,\n \"port_number\": 57487,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036272,\n \"port_number\": 59423,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322488/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.149\",\n \"database\": null,\n \"hostname\": \"hala.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115B98EA80\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322487,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AC162D84B53C\",\n \"vulnerabilities_count\": 183,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036240,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036241,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036242,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036243,\n \"port_number\": 8480,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IBM AS400 Ultimedia Services\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322487/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.150\",\n \"database\": null,\n \"hostname\": \"node1.admin.peach.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AC162D84B53C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322486,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA10E\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036256,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036257,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322486/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.104\",\n \"database\": null,\n \"hostname\": \"node56.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA10E\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322484,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91FE\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036262,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036263,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322484/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.102\",\n \"database\": null,\n \"hostname\": \"node54.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91FE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322482,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA116\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036225,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036226,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322482/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.103\",\n \"database\": null,\n \"hostname\": \"node55.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA116\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322481,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA158\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036208,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036209,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322481/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.101\",\n \"database\": null,\n \"hostname\": \"node53.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA158\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322480,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA114\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036210,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036211,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322480/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.99\",\n \"database\": null,\n \"hostname\": \"node51.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA114\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322479,\n \"created_at\": \"2019-11-05T15:38:07Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA15A\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036204,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036205,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322479/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.100\",\n \"database\": null,\n \"hostname\": \"node52.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA15A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322478,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91E4\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036202,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036203,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322478/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.97\",\n \"database\": null,\n \"hostname\": \"node49.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91E4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322477,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158FDDC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036200,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036201,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322477/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.98\",\n \"database\": null,\n \"hostname\": \"node50.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158FDDC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322476,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1584C94\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036206,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036207,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322476/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.96\",\n \"database\": null,\n \"hostname\": \"node48.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1584C94\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322475,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1586D6C\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036194,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036195,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322475/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.95\",\n \"database\": null,\n \"hostname\": \"node47.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1586D6C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322474,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1582D00\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036198,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036199,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322474/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.94\",\n \"database\": null,\n \"hostname\": \"node46.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1582D00\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322473,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1584C84\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036196,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036197,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322473/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.93\",\n \"database\": null,\n \"hostname\": \"node45.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1584C84\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322472,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA11C\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036192,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036193,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322472/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.92\",\n \"database\": null,\n \"hostname\": \"node44.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA11C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322471,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158FDE2\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036190,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036191,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322471/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.91\",\n \"database\": null,\n \"hostname\": \"node43.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158FDE2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322470,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEB0E8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036186,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036187,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322470/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.90\",\n \"database\": null,\n \"hostname\": \"node42.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEB0E8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322469,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158ED66\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036188,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036189,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322469/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.89\",\n \"database\": null,\n \"hostname\": \"node41.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158ED66\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322468,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1583DDC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036184,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036185,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322468/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.88\",\n \"database\": null,\n \"hostname\": \"node40.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1583DDC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322467,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA17A\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036180,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036181,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322467/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.87\",\n \"database\": null,\n \"hostname\": \"node39.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA17A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322466,\n \"created_at\": \"2019-11-05T15:38:06Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA170\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036182,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036183,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322466/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.86\",\n \"database\": null,\n \"hostname\": \"node38.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA170\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322465,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158BDEC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036178,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036179,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322465/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.85\",\n \"database\": null,\n \"hostname\": \"node37.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158BDEC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322464,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91E2\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036174,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036175,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322464/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.84\",\n \"database\": null,\n \"hostname\": \"node36.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91E2\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322463,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91E8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036164,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036165,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322463/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.83\",\n \"database\": null,\n \"hostname\": \"node35.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91E8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322462,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91EA\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036176,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036177,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322462/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.82\",\n \"database\": null,\n \"hostname\": \"node34.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91EA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322461,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA10A\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036170,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036171,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036172,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036173,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322461/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.81\",\n \"database\": null,\n \"hostname\": \"node33.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA10A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322460,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91F6\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036168,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036169,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322460/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.79\",\n \"database\": null,\n \"hostname\": \"node31.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91F6\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322459,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91FC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036166,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036167,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322459/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.80\",\n \"database\": null,\n \"hostname\": \"node32.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91FC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322458,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA146\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036162,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036163,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322458/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.78\",\n \"database\": null,\n \"hostname\": \"node30.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA146\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322457,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA11E\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036160,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036161,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322457/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.77\",\n \"database\": null,\n \"hostname\": \"node29.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA11E\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322456,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158DCC8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036158,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036159,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322456/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.76\",\n \"database\": null,\n \"hostname\": \"node28.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158DCC8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322455,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1583E26\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036156,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036157,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322455/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.75\",\n \"database\": null,\n \"hostname\": \"node27.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1583E26\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322454,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1580EF0\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036154,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036155,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322454/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.74\",\n \"database\": null,\n \"hostname\": \"node26.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1580EF0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322453,\n \"created_at\": \"2019-11-05T15:38:05Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA136\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036152,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036153,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322453/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.73\",\n \"database\": null,\n \"hostname\": \"node25.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA136\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322452,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158AA06\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036137,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036138,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322452/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.72\",\n \"database\": null,\n \"hostname\": \"node24.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158AA06\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322451,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEB1FC\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036117,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036118,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322451/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.71\",\n \"database\": null,\n \"hostname\": \"node23.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEB1FC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322450,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158EE02\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036150,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036151,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322450/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.64\",\n \"database\": null,\n \"hostname\": \"node16.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158EE02\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322449,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA128\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036141,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036142,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036143,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036144,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322449/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.67\",\n \"database\": null,\n \"hostname\": \"node19.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA128\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322448,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEB19C\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036105,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036106,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322448/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.70\",\n \"database\": null,\n \"hostname\": \"node22.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEB19C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322447,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA174\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036135,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036136,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322447/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.68\",\n \"database\": null,\n \"hostname\": \"node20.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA174\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322446,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CEC8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036139,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036140,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322446/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.69\",\n \"database\": null,\n \"hostname\": \"node21.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CEC8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322445,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91B8\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036129,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036130,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322445/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.60\",\n \"database\": null,\n \"hostname\": \"node12.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91B8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322444,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1580EEA\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036131,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036132,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322444/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.63\",\n \"database\": null,\n \"hostname\": \"node15.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1580EEA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322443,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA15C\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036086,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036087,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322443/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.61\",\n \"database\": null,\n \"hostname\": \"node13.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA15C\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322442,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91EE\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036088,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036089,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322442/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.65\",\n \"database\": null,\n \"hostname\": \"node17.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91EE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322441,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE91F8\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036107,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036108,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322441/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.56\",\n \"database\": null,\n \"hostname\": \"node8.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE91F8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322440,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1582EC4\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036121,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036122,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322440/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.49\",\n \"database\": null,\n \"hostname\": \"node1.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1582EC4\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322439,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158FDEE\",\n \"vulnerabilities_count\": 266,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036101,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036102,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036103,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036104,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322439/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.57\",\n \"database\": null,\n \"hostname\": \"node9.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158FDEE\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322438,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA142\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036082,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036083,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322438/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.58\",\n \"database\": null,\n \"hostname\": \"node10.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA142\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322437,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CEF8\",\n \"vulnerabilities_count\": 270,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036109,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036110,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036111,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036112,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322437/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.66\",\n \"database\": null,\n \"hostname\": \"node18.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CEF8\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322436,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1582DDA\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036133,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036134,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322436/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.55\",\n \"database\": null,\n \"hostname\": \"node7.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1582DDA\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322435,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCEA16E\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036113,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036114,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322435/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.62\",\n \"database\": null,\n \"hostname\": \"node14.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCEA16E\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322434,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CC7A\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036115,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036116,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322434/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.52\",\n \"database\": null,\n \"hostname\": \"node4.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CC7A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322433,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158CEC0\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036125,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036126,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036127,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036128,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322433/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.54\",\n \"database\": null,\n \"hostname\": \"node6.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158CEC0\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322432,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"005056BB654B\",\n \"vulnerabilities_count\": 268,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036090,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036091,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036092,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036093,\n \"port_number\": 8100,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"SimpleHTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"0.6\"\n },\n {\n \"id\": 239036094,\n \"port_number\": 10000,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036095,\n \"port_number\": 42575,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036096,\n \"port_number\": 48408,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036097,\n \"port_number\": 48644,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036098,\n \"port_number\": 51149,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"NFS lockd\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322432/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.48\",\n \"database\": null,\n \"hostname\": \"mango-gw.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"005056BB654B\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322431,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1581DAC\",\n \"vulnerabilities_count\": 262,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036099,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036100,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322431/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.59\",\n \"database\": null,\n \"hostname\": \"node11.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1581DAC\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322429,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA158EE00\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036119,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036120,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322429/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.51\",\n \"database\": null,\n \"hostname\": \"node3.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA158EE00\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322427,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"E4115BCE9134\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036123,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036124,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322427/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.50\",\n \"database\": null,\n \"hostname\": \"node2.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"E4115BCE9134\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322426,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.4\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"441EA1580E3A\",\n \"vulnerabilities_count\": 271,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036084,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036085,\n \"port_number\": 9090,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"AIX Web Based Admin\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322426/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.53\",\n \"database\": null,\n \"hostname\": \"node5.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"441EA1580E3A\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322425,\n \"created_at\": \"2019-11-05T15:38:04Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.3\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"002655FFFA30\",\n \"vulnerabilities_count\": 292,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239036075,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239036076,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036077,\n \"port_number\": 111,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"portmapper\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036078,\n \"port_number\": 8480,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"IBM AS400 Ultimedia Services\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036079,\n \"port_number\": 36383,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036080,\n \"port_number\": 59610,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"status\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"udp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239036081,\n \"port_number\": 60000,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Lotus Notes RDEBUG\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322425/vulnerabilities\"\n },\n \"ip_address\": \"10.22.24.36\",\n \"database\": null,\n \"hostname\": \"node1.admin.mango.metrics.scl3.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"002655FFFA30\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322323,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AA00001991DD\",\n \"vulnerabilities_count\": 573,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035207,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035208,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Squid\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"3.1.10\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322323/vulnerabilities\"\n },\n \"ip_address\": \"10.18.74.22\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AA00001991DD\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322322,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"mac_address\",\n \"locator\": \"AA00006A6E66\",\n \"vulnerabilities_count\": 197,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035145,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035146,\n \"port_number\": 8888,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"Squid\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"3.1.10\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322322/vulnerabilities\"\n },\n \"ip_address\": \"10.18.74.21\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": \"AA00006A6E66\",\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322321,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.203\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035142,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035143,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035144,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322321/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322320,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.202\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035116,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035117,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035118,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322320/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.202\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322319,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.201\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035119,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035120,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035121,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322319/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.201\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322318,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.20.200\",\n \"vulnerabilities_count\": 425,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035158,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035159,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035160,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035161,\n \"port_number\": 3306,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"MySQL\",\n \"ostype\": \"\",\n \"product\": \"MySQL\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.1.58\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322318/vulnerabilities\"\n },\n \"ip_address\": \"10.18.20.200\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322314,\n \"created_at\": \"2019-11-05T15:38:00Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.203\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035086,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035087,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035088,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322314/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322313,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.202\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035079,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035080,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035081,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322313/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.202\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322312,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.201\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035074,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035075,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035076,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322312/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.201\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322311,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.18.200\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035082,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035083,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239035084,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035085,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322311/vulnerabilities\"\n },\n \"ip_address\": \"10.18.18.200\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322308,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.203\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035069,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035070,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035071,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322308/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.203\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322307,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.202\",\n \"vulnerabilities_count\": 406,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035065,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035066,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035067,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322307/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.202\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322306,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.201\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035062,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035063,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035064,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322306/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.201\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18322305,\n \"created_at\": \"2019-11-05T15:37:59Z\",\n \"priority\": 10,\n \"operating_system\": \"Red Hat - Linux - Enterprise Linux - 6.1\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"ip_address\",\n \"locator\": \"10.18.16.200\",\n \"vulnerabilities_count\": 407,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239035058,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": \"OpenSSH\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"5.3\"\n },\n {\n \"id\": 239035059,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239035060,\n \"port_number\": 2301,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n },\n {\n \"id\": 239035061,\n \"port_number\": 2381,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTPS\",\n \"ostype\": \"\",\n \"product\": \"HTTP\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"9.9\"\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18322305/vulnerabilities\"\n },\n \"ip_address\": \"10.18.16.200\",\n \"database\": null,\n \"hostname\": null,\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189894,\n \"name\": \"LAMP\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189903,\n \"name\": \"Linux servers\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189917,\n \"name\": \"Linux (Vulns 75+)\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189959,\n \"name\": \"TOP Priority\"\n },\n {\n \"id\": 189964,\n \"name\": \"Oracle +66\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 189999,\n \"name\": \"All Linux\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 222144,\n \"name\": \"RedHat Servers\"\n }\n ]\n },\n {\n \"id\": 18321627,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-110.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033217,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033218,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033219,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033220,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033221,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033222,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033223,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321627/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.236\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-110.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321625,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-109.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033224,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033225,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033226,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033227,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033228,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033229,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033230,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321625/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.235\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-109.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321619,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-108.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033169,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033170,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033171,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033172,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033173,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033174,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033175,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321619/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.234\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-108.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321607,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-ref.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033196,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033197,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033198,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033199,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033200,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033201,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033202,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321607/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.229\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-ref.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321601,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-107.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239033032,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033033,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239033034,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033035,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033036,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033037,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239033038,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321601/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.227\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-107.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321588,\n \"created_at\": \"2019-11-05T15:37:51Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-106.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032963,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032964,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032965,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032966,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032967,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032968,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032969,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321588/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.212\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-106.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321583,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-105.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032956,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032957,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032958,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032959,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032960,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032961,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032962,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321583/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.206\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-105.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321577,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-104.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032921,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032922,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032923,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032924,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032925,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032926,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032927,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321577/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.201\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-104.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321575,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-103.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032903,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032904,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032905,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032906,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032907,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032908,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032909,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321575/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.200\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-103.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321569,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-102.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032879,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032880,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032881,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032882,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032883,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032884,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032885,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321569/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.189\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-102.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321565,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-113.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032827,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032828,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032829,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032830,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032831,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032832,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032833,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032834,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032835,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032836,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032837,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032838,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032839,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032840,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321565/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.186\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-113.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321564,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-114.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 5,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032795,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032796,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032797,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032798,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032799,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032800,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032801,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032802,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032803,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032804,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032805,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032806,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032807,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321564/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.187\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-114.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321563,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-111.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032808,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032809,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032810,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032811,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032812,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032813,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032814,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032815,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032816,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032817,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032818,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032819,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032820,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032821,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321563/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.184\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-111.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321562,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-112.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032781,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032782,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032783,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032784,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032785,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032786,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032787,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032788,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032789,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032790,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032791,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032792,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032793,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032794,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321562/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.185\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-112.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321561,\n \"created_at\": \"2019-11-05T15:37:50Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-110.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032761,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032762,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032763,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032764,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032765,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032766,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032767,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032768,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032769,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032770,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032771,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032772,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032773,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032774,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321561/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.183\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-110.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321534,\n \"created_at\": \"2019-11-05T15:37:49Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-109.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032613,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032614,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032615,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032616,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032617,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032618,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032619,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032620,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032621,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032622,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032623,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032624,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032625,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032626,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321534/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.149\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-109.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321513,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-108.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032483,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032484,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032485,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032486,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032487,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032488,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032489,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032490,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032491,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032492,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032493,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032494,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032495,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032496,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321513/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.126\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-108.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321509,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-107.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032469,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032470,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032471,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032472,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032473,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032474,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032475,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032476,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032477,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032478,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032479,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032480,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032481,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032482,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321509/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.123\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-107.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321506,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-106.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032433,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032434,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032435,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032436,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032437,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032438,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032439,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032440,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032441,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032442,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032443,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032444,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032445,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032446,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321506/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.120\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-106.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321504,\n \"created_at\": \"2019-11-05T15:37:48Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-105.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032415,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032416,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032417,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032418,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032419,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032420,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032421,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032422,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032423,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032424,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032425,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032426,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032427,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321504/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.119\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-105.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321420,\n \"created_at\": \"2019-11-05T15:37:45Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-075.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032033,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032034,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032035,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032036,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032037,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032038,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032039,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321420/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.28\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-075.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321418,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-074.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 20,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032016,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032017,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032018,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032019,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032020,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032021,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321418/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.27\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-074.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321417,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-073.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032022,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032023,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239032024,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032025,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032026,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032027,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032028,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321417/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.26\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-073.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321416,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-072.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 21,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031997,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031998,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031999,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032000,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032001,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032002,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321416/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.25\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-072.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321415,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-092.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031932,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031933,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031934,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031935,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031936,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031937,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031938,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031939,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031940,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031941,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031942,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031943,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031944,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321415/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.24\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-092.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321414,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-090.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031971,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031972,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031973,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031974,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031975,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031976,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031977,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031978,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031979,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031980,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031981,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031982,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031983,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321414/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.22\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-090.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321413,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-091.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031919,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031920,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031921,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031922,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031923,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031924,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031925,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031926,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031927,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031928,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031929,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031930,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031931,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321413/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.23\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-091.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321412,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-089.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031984,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031985,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031986,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031987,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031988,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031989,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031990,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031991,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031992,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031993,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031994,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031995,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031996,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321412/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.21\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-089.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321411,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"TALOS-R3-W7-087\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031945,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031946,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031947,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031948,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031949,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031950,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031951,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031952,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031953,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031954,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031955,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031956,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031957,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321411/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.254\",\n \"database\": null,\n \"hostname\": \"TALOS-R3-W7-087\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321410,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-088.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031958,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031959,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031960,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031961,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031962,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031963,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031964,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031965,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031966,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031967,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031968,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031969,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031970,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321410/vulnerabilities\"\n },\n \"ip_address\": \"10.12.51.20\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-088.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321409,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-062.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239032003,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032004,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239032005,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032006,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032007,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032008,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032009,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032010,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032011,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032012,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032013,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032014,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239032015,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321409/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.251\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-062.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321408,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-064.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031906,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031907,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031908,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031909,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031910,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031911,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031912,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031913,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031914,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031915,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031916,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031917,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031918,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321408/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.253\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-064.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321407,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-063.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031854,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031855,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031856,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031857,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031858,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031859,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031860,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031861,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031862,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031863,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031864,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031865,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031866,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321407/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.252\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-063.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321406,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-060.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031893,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031894,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031895,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031896,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031897,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031898,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031899,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031900,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031901,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031902,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031903,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031904,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031905,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321406/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.249\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-060.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321405,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-059.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031880,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031881,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031882,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031883,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031884,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031885,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031886,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031887,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031888,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031889,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031890,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031891,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031892,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321405/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.248\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-059.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321404,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-061.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031867,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031868,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031869,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031870,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031871,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031872,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031873,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031874,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031875,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031876,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031877,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031878,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031879,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321404/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.250\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-061.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321403,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-058.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031841,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031842,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031843,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031844,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031845,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031846,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031847,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031848,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031849,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031850,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031851,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031852,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031853,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321403/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.247\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-058.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321402,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-057.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031828,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031829,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031830,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031831,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031832,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031833,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031834,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031835,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031836,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031837,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031838,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031839,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031840,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321402/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.246\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-057.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321401,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-055.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031815,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031816,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031817,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031818,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031819,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031820,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031821,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031822,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031823,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031824,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031825,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031826,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031827,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321401/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.244\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-055.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321400,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-056.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031782,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031783,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031784,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031785,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031786,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031787,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031788,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031789,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031790,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031791,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031792,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031793,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031794,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321400/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.245\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-056.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321399,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-040.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031802,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031803,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031804,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031805,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031806,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031807,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031808,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031809,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031810,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031811,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031812,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031813,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031814,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321399/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.242\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-040.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321398,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-054.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031769,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031770,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031771,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031772,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031773,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031774,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031775,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031776,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031777,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031778,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031779,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031780,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031781,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321398/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.243\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-054.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321397,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-062.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031795,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031796,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031797,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031798,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031799,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031800,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031801,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321397/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.241\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-062.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321396,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-061.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031755,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031756,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031757,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031758,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031759,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031760,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031761,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321396/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.240\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-061.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321395,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-060.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031762,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031763,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031764,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031765,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031766,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031767,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031768,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321395/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.239\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-060.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321392,\n \"created_at\": \"2019-11-05T15:37:44Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-057.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031727,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031728,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031729,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031730,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031731,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031732,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031733,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321392/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.236\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-057.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321391,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-056.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031720,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031721,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031722,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031723,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031724,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031725,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031726,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321391/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.235\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-056.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321390,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-055.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031734,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031735,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031736,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031737,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031738,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031739,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031740,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321390/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.234\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-055.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321389,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-054.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031713,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031714,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031715,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031716,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031717,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031718,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031719,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321389/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.233\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-054.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321374,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-053.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031593,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031594,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031595,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031596,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031597,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031598,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031599,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031600,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031601,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031602,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031603,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031604,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031605,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321374/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.213\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-053.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321370,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-051.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031580,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031581,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031582,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031583,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031584,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031585,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031586,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031587,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031588,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031589,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031590,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031591,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031592,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321370/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.211\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-051.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321369,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-048.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031620,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031621,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031622,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031623,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031624,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031625,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031626,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031627,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031628,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031629,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031630,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031631,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031632,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321369/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.208\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-048.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321368,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-052.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031525,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031526,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031527,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031528,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031529,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031530,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031531,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031532,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031533,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031534,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031535,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031536,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031537,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321368/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.212\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-052.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321367,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-050.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031560,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031561,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031562,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031563,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031564,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031565,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031566,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031567,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031568,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031569,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031570,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031571,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031572,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321367/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.210\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-050.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321366,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-046.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031512,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031513,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031514,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031515,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031516,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031517,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031518,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031519,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031520,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031521,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031522,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031523,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031524,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321366/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.206\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-046.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321365,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-049.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031499,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031500,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031501,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031502,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031503,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031504,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031505,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031506,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031507,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031508,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031509,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031510,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031511,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321365/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.209\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-049.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321364,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-047.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031486,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031487,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031488,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031489,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031490,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031491,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031492,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031493,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031494,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031495,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031496,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031497,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031498,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321364/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.207\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-047.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321363,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-045.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031473,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031474,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031475,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031476,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031477,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031478,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031479,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031480,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031481,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031482,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031483,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031484,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031485,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321363/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.205\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-045.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321362,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-044.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031446,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031447,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031448,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031449,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031450,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031451,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031452,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031453,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031454,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031455,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031456,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031457,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031458,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031459,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321362/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.204\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-044.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321361,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-043.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031460,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031461,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031462,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031463,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031464,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031465,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031466,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031467,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031468,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031469,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031470,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031471,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031472,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321361/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.203\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-043.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321360,\n \"created_at\": \"2019-11-05T15:37:43Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-042.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031433,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031434,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031435,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031436,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031437,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031438,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031439,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031440,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031441,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031442,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031443,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031444,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031445,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321360/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.202\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-042.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321359,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-039.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031419,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031420,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031421,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031422,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031423,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031424,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031425,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031426,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031427,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031428,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031429,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031430,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031431,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031432,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321359/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.200\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-039.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321358,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-041.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031393,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031394,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031395,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031396,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031397,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031398,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031399,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031400,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031401,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031402,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031403,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031404,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031405,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321358/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.201\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-041.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321357,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-038.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031406,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031407,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031408,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031409,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031410,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031411,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031412,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031413,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031414,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031415,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031416,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031417,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031418,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321357/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.199\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-038.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321356,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-035.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031380,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031381,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031382,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031383,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031384,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031385,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031386,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031387,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031388,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031389,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031390,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031391,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031392,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321356/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.196\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-035.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321355,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-037.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031353,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031354,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031355,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031356,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031357,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031358,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031359,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031360,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031361,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031362,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031363,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031364,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031365,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031366,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321355/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.198\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-037.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321354,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-036.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031367,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031368,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031369,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031370,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031371,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031372,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031373,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031374,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031375,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031376,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031377,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031378,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031379,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321354/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.197\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-036.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321353,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-034.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031340,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031341,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031342,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031343,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031344,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031345,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031346,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031347,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031348,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031349,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031350,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031351,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031352,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321353/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.195\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-034.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321352,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-033.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031301,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031302,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031303,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031304,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031305,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031306,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031307,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031308,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031309,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031310,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031311,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031312,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031313,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321352/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.194\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-033.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321351,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-031.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031314,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031315,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031316,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031317,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031318,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031319,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031320,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031321,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031322,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031323,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031324,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031325,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031326,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321351/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.192\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-031.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321350,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-030.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031327,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031328,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031329,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031330,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031331,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031332,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031333,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031334,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031335,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031336,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031337,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031338,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031339,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321350/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.191\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-030.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321349,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-032.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031288,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031289,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031290,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031291,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031292,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031293,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031294,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031295,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031296,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031297,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031298,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031299,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031300,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321349/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.193\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-032.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321348,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-026.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031275,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031276,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031277,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031278,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031279,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031280,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031281,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031282,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031283,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031284,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031285,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031286,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031287,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321348/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.187\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-026.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321347,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-029.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031261,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031262,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031263,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031264,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031265,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031266,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031267,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031268,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031269,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031270,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031271,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031272,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031273,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031274,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321347/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.190\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-029.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321346,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-028.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031222,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031223,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031224,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031225,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031226,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031227,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031228,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031229,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031230,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031231,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031232,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031233,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031234,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321346/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.189\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-028.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321345,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-025.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031248,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031249,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031250,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031251,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031252,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031253,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031254,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031255,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031256,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031257,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031258,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031259,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031260,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321345/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.186\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-025.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321344,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-027.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031235,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031236,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031237,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031238,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031239,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031240,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031241,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031242,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031243,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031244,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031245,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031246,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031247,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321344/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.188\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-027.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321343,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-021.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031208,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031209,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031210,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031211,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031212,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031213,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031214,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031215,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031216,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031217,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031218,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031219,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031220,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031221,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321343/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.182\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-021.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321342,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-024.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031195,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031196,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031197,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031198,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031199,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031200,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031201,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031202,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031203,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031204,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031205,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031206,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031207,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321342/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.185\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-024.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321341,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-023.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031181,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031182,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031183,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031184,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031185,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031186,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031187,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031188,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031189,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031190,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031191,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031192,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031193,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031194,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321341/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.184\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-023.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321340,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-022.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031167,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031168,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031169,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031170,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031171,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031172,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031173,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031174,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031175,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031176,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031177,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031178,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031179,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031180,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321340/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.183\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-022.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321339,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-020.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031140,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031141,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031142,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031143,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031144,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031145,\n \"port_number\": 554,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"rtsp (Real Time Stream Control Protocol)\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031146,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031147,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031148,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031149,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031150,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031151,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031152,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031153,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321339/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.181\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-020.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321338,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-018.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031154,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031155,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031156,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031157,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031158,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031159,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031160,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031161,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031162,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031163,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031164,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031165,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031166,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321338/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.179\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-018.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321337,\n \"created_at\": \"2019-11-05T15:37:42Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-019.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031113,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031114,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031115,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031116,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031117,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031118,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031119,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031120,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031121,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031122,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031123,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031124,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031125,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321337/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.180\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-019.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321336,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-016.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031100,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031101,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031102,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031103,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031104,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031105,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031106,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031107,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031108,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031109,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031110,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031111,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031112,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321336/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.177\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-016.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321335,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-015.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031126,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031127,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031128,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031129,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031130,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031131,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031132,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031133,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031134,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031135,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031136,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031137,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031138,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031139,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321335/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.176\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-015.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321334,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-014.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031087,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031088,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031089,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031090,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031091,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031092,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031093,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031094,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031095,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031096,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031097,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031098,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031099,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321334/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.175\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-014.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321333,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-013.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031061,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031062,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031063,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031064,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031065,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031066,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031067,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031068,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031069,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031070,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031071,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031072,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031073,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321333/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.174\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-013.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321332,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-009.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031074,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031075,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031076,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031077,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031078,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031079,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031080,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031081,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031082,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031083,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031084,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031085,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031086,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321332/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.170\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-009.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321331,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-012.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031048,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031049,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031050,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031051,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031052,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031053,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031054,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031055,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031056,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031057,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031058,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031059,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031060,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321331/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.173\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-012.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321330,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-123.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 20,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031009,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031010,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031011,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031012,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031013,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031014,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321330/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.164\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-123.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321329,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-004.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031028,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031029,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031030,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031031,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031032,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031033,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031034,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031035,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031036,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031037,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031038,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031039,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031040,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321329/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.165\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-004.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321328,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-011.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031015,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031016,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239031017,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031018,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031019,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031020,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031021,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031022,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031023,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031024,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031025,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031026,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031027,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321328/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.172\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-011.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321327,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-124.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239031041,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031042,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239031043,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031044,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031045,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031046,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031047,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321327/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.171\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-124.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321326,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-005.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030996,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030997,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030998,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030999,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031000,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031001,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031002,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031003,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031004,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031005,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031006,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031007,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239031008,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321326/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.166\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-005.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321325,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-008.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030983,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030984,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030985,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030986,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030987,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030988,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030989,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030990,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030991,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030992,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030993,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030994,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030995,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321325/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.169\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-008.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321324,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-007.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030970,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030971,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030972,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030973,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030974,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030975,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030976,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030977,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030978,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030979,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030980,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030981,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030982,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321324/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.168\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-007.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321323,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-121.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030963,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030964,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030965,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030966,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030967,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030968,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030969,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321323/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.162\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-121.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321322,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-053.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030956,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030957,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030958,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030959,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030960,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030961,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030962,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321322/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.161\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-053.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321321,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-052.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030942,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030943,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030944,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030945,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030946,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030947,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030948,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321321/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.160\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-052.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321320,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-050.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030949,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030950,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030951,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030952,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030953,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030954,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030955,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321320/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.158\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-050.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321319,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-051.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030935,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030936,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030937,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030938,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030939,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030940,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030941,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321319/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.159\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-051.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321318,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-048.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030928,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030929,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030930,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030931,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030932,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030933,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030934,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321318/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.156\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-048.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321317,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-049.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030914,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030915,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030916,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030917,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030918,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030919,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030920,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321317/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.157\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-049.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321316,\n \"created_at\": \"2019-11-05T15:37:41Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-047.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030921,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030922,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030923,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030924,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030925,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030926,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030927,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321316/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.155\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-047.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321315,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-046.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030907,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030908,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030909,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030910,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030911,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030912,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030913,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321315/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.154\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-046.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321314,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-044.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030900,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030901,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030902,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030903,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030904,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030905,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030906,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321314/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.152\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-044.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321313,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-043.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030893,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030894,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030895,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030896,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030897,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030898,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030899,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321313/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.151\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-043.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321312,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-042.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030886,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030887,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030888,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030889,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030890,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030891,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030892,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321312/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.150\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-042.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321311,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-041.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030879,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030880,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030881,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030882,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030883,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030884,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030885,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321311/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.149\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-041.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321310,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-040.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030872,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030873,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030874,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030875,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030876,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030877,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030878,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321310/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.148\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-040.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321309,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-038.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030865,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030866,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030867,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030868,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030869,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030870,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030871,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321309/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.146\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-038.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321308,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-039.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030851,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030852,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030853,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030854,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030855,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030856,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030857,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321308/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.147\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-039.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321307,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-037.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030858,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030859,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030860,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030861,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030862,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030863,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030864,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321307/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.145\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-037.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321306,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-036.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030844,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030845,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030846,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030847,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030848,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030849,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030850,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321306/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.144\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-036.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321305,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-035.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030837,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030838,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030839,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030840,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030841,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030842,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030843,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321305/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.143\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-035.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321304,\n \"created_at\": \"2019-11-05T15:37:40Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-034.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030830,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030831,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030832,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030833,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030834,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030835,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030836,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321304/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.142\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-034.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321303,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-033.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030823,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030824,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030825,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030826,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030827,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030828,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030829,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321303/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.141\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-033.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321302,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-032.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030816,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030817,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030818,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030819,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030820,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030821,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030822,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321302/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.140\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-032.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321301,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-031.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030809,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030810,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030811,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030812,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030813,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030814,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030815,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321301/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.139\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-031.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321300,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-030.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030802,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030803,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030804,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030805,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030806,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030807,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030808,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321300/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.138\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-030.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321299,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-029.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030788,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030789,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030790,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030791,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030792,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030793,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030794,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321299/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.137\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-029.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321298,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-028.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030795,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030796,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030797,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030798,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030799,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030800,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030801,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321298/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.136\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-028.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321297,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-027.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030781,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030782,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030783,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030784,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030785,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030786,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030787,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321297/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.135\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-027.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321296,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-025.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030774,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030775,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030776,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030777,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030778,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030779,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030780,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321296/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.133\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-025.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321295,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-026.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030760,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030761,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030762,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030763,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030764,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030765,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030766,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321295/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.134\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-026.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321294,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-023.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030767,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030768,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030769,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030770,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030771,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030772,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030773,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321294/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.131\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-023.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321293,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-024.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030753,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030754,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030755,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030756,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030757,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030758,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030759,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321293/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.132\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-024.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321292,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-022.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030746,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030747,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030748,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030749,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030750,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030751,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030752,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321292/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.130\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-022.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321291,\n \"created_at\": \"2019-11-05T15:37:39Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-021.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030739,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030740,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030741,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030742,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030743,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030744,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030745,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321291/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.129\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-021.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321290,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-020.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030711,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030712,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030713,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030714,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030715,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030716,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030717,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321290/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.128\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-020.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321289,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-019.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030718,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030719,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030720,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030721,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030722,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030723,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030724,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321289/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.127\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-019.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321288,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-018.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030732,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030733,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030734,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030735,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030736,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030737,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030738,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321288/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.126\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-018.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321287,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-017.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030725,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030726,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030727,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030728,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030729,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030730,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030731,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321287/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.125\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-017.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321286,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-016.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030690,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030691,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030692,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030693,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030694,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030695,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030696,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321286/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.124\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-016.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321285,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-014.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030704,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030705,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030706,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030707,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030708,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030709,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030710,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321285/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.122\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-014.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321284,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-015.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 58,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030697,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030698,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030699,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030700,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030701,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030702,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030703,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321284/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.123\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-015.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321283,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-013.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030683,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030684,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030685,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030686,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030687,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030688,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030689,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321283/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.121\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-013.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321282,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-011.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030676,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030677,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030678,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030679,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030680,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030681,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030682,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321282/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.119\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-011.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321281,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-012.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 21,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030656,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030657,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030658,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030659,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030660,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030661,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321281/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.120\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-012.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321280,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-009.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030669,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030670,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030671,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030672,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030673,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030674,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030675,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321280/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.117\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-009.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321279,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-010.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030662,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030663,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030664,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030665,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030666,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030667,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030668,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321279/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.118\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-010.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321278,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-007.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030649,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030650,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030651,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030652,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030653,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030654,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030655,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321278/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.115\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-007.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321277,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-008.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030642,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030643,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030644,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030645,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030646,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030647,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030648,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321277/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.116\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-008.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321276,\n \"created_at\": \"2019-11-05T15:37:38Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-006.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030635,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030636,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030637,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030638,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030639,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030640,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030641,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321276/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.114\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-006.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321275,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-005.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030628,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030629,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030630,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030631,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030632,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030633,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030634,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321275/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.113\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-005.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321274,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-002.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030621,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030622,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030623,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030624,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030625,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030626,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030627,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321274/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.110\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-002.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321273,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-003.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 71,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030614,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030615,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030616,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030617,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030618,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030619,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030620,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321273/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.111\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-003.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321272,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-001.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 18,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030601,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030602,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030603,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030604,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030605,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030606,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321272/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.109\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-001.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321271,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-071.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030594,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030595,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030596,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030597,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030598,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030599,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030600,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321271/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.108\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-071.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321270,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-070.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 71,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030607,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030608,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030609,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030610,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030611,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030612,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030613,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321270/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.107\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-070.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321269,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-069.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030587,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030588,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030589,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030590,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030591,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030592,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030593,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321269/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.106\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-069.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321268,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-068.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030580,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030581,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030582,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030583,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030584,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030585,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030586,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321268/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.105\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-068.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321267,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-067.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030573,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030574,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030575,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030576,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030577,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030578,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030579,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321267/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.104\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-067.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321266,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-066.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030566,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030567,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030568,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030569,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030570,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030571,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030572,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321266/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.103\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-066.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321265,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-065.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030559,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030560,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030561,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030562,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030563,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030564,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030565,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321265/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.102\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-065.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321264,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-064.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030552,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030553,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030554,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030555,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030556,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030557,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030558,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321264/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.101\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-064.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321263,\n \"created_at\": \"2019-11-05T15:37:37Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-063.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030545,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030546,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030547,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030548,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030549,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030550,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030551,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321263/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.100\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-063.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321262,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-079.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030493,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030494,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030495,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030496,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030497,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030498,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030499,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030500,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030501,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030502,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030503,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030504,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030505,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321262/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.99\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-079.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321261,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-077.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030402,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030403,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030404,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030405,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030406,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030407,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030408,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030409,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030410,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030411,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030412,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030413,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030414,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321261/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.97\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-077.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321260,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-078.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030376,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030377,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030378,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030379,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030380,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030381,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030382,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030383,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030384,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030385,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030386,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030387,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030388,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321260/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.98\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-078.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321259,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-076.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030363,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030364,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030365,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030366,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030367,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030368,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030369,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030370,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030371,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030372,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030373,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030374,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030375,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321259/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.96\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-076.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321258,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-071.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030454,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030455,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030456,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030457,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030458,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030459,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030460,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030461,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030462,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030463,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030464,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030465,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030466,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321258/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.91\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-071.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321257,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-066.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030519,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030520,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030521,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030522,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030523,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030524,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030525,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030526,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030527,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030528,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030529,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030530,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030531,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321257/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.86\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-066.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321256,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-075.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030350,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030351,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030352,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030353,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030354,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030355,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030356,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030357,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030358,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030359,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030360,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030361,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030362,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321256/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.95\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-075.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321255,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-074.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030389,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030390,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030391,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030392,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030393,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030394,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030395,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030396,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030397,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030398,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030399,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030400,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030401,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321255/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.94\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-074.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321254,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-073.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030532,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030533,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030534,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030535,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030536,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030537,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030538,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030539,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030540,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030541,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030542,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030543,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030544,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321254/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.93\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-073.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321253,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-097.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030467,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030468,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030469,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030470,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030471,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030472,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030473,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030474,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030475,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030476,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030477,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030478,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030479,\n \"port_number\": 49159,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321253/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.83\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-097.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321252,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-099.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030415,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030416,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030417,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030418,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030419,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030420,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030421,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030422,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030423,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030424,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030425,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030426,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030427,\n \"port_number\": 49160,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321252/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.85\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-099.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321251,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-072.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030324,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030325,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030326,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030327,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030328,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030329,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030330,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030331,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030332,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030333,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030334,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030335,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030336,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321251/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.92\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-072.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321250,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-067.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030428,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030429,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030430,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030431,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030432,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030433,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030434,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030435,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030436,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030437,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030438,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030439,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030440,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321250/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.87\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-067.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321249,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-096.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 33,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030506,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030507,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030508,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030509,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030510,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030511,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030512,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030513,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030514,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030515,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030516,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030517,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030518,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321249/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.82\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-096.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321248,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-098.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030441,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030442,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030443,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030444,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030445,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030446,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030447,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030448,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030449,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030450,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030451,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030452,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030453,\n \"port_number\": 49160,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321248/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.84\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-098.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321247,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-068.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030311,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030312,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030313,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030314,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030315,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030316,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030317,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030318,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030319,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030320,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030321,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030322,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030323,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321247/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.88\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-068.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321246,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-070.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030337,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030338,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030339,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030340,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030341,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030342,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030343,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030344,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030345,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030346,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030347,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030348,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030349,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321246/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.90\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-070.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321245,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-069.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030480,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030481,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030482,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030483,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030484,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030485,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030486,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030487,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030488,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030489,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030490,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030491,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030492,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321245/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.89\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-069.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321243,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-095.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030271,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030272,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030273,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030274,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030275,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030276,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030277,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030278,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030279,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030280,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030281,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030282,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030283,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321243/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.81\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-095.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321242,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-094.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030250,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030251,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030252,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030253,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030254,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030255,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030256,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030257,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030258,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030259,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030260,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030261,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030262,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321242/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.80\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-094.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321241,\n \"created_at\": \"2019-11-05T15:37:36Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-093.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030284,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030285,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030286,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030287,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030288,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030289,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030290,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030291,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030292,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030293,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030294,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030295,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030296,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321241/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.79\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-093.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321218,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-086.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030097,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030098,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030099,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030100,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030101,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030102,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030103,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030104,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030105,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030106,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030107,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030108,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030109,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321218/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.53\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-086.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321217,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-085.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030077,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030078,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030079,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030080,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030081,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030082,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030083,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030084,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030085,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030086,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030087,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030088,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030089,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321217/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.52\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-085.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321216,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-084.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030064,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030065,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030066,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030067,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030068,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030069,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030070,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030071,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030072,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030073,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030074,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030075,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030076,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321216/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.51\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-084.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321215,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-083.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030051,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030052,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030053,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030054,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030055,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030056,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030057,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030058,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030059,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030060,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030061,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030062,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030063,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321215/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.50\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-083.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321214,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-082.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030038,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030039,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030040,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030041,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030042,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030043,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030044,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030045,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030046,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030047,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030048,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030049,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030050,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321214/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.49\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-082.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321213,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-081.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030018,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030019,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239030020,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030021,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030022,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030023,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030024,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030025,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030026,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030027,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030028,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030029,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030030,\n \"port_number\": 49158,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321213/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.48\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-081.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321212,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows 7 Ultimate Edition\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-w7-080.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 35,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029997,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029998,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.14\"\n },\n {\n \"id\": 239029999,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030000,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030001,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 7 Ultimate 6.1\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030002,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030003,\n \"port_number\": 5800,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030004,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030005,\n \"port_number\": 49152,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030006,\n \"port_number\": 49153,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030007,\n \"port_number\": 49154,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030008,\n \"port_number\": 49155,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030009,\n \"port_number\": 49156,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030010,\n \"port_number\": 49157,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE RPC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321212/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.47\",\n \"database\": null,\n \"hostname\": \"talos-r3-w7-080.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321211,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-095.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030031,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030032,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030033,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030034,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030035,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030036,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030037,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321211/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.46\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-095.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321210,\n \"created_at\": \"2019-11-05T15:37:35Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-094.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239030011,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030012,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239030013,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030014,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030015,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030016,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239030017,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321210/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.45\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-094.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321209,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-093.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029983,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029984,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029985,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029986,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029987,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029988,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029989,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321209/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.44\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-093.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321208,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-092.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029990,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029991,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029992,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029993,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029994,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029995,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029996,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321208/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.43\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-092.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321207,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-091.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029976,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029977,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029978,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029979,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029980,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029981,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029982,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321207/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.42\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-091.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321206,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-090.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029969,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029970,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029971,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029972,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029973,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029974,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029975,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321206/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.41\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-090.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321205,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-089.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029955,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029956,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029957,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029958,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029959,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029960,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029961,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321205/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.40\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-089.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n },\n {\n \"id\": 18321204,\n \"created_at\": \"2019-11-05T15:37:34Z\",\n \"priority\": 10,\n \"operating_system\": \"Microsoft - Windows - Windows XP\",\n \"notes\": null,\n \"last_booted_at\": null,\n \"primary_locator\": \"hostname\",\n \"locator\": \"talos-r3-xp-088.build.scl1.acmeinc.com\",\n \"vulnerabilities_count\": 72,\n \"status\": \"active\",\n \"last_seen_time\": \"2013-08-23T11:59:42Z\",\n \"network_ports\": [\n {\n \"id\": 239029962,\n \"port_number\": 22,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"SSH\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029963,\n \"port_number\": 80,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"HTTP\",\n \"ostype\": \"\",\n \"product\": \"HTTPD\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": \"2.2.4\"\n },\n {\n \"id\": 239029964,\n \"port_number\": 135,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"DCE Endpoint Resolution\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029965,\n \"port_number\": 139,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029966,\n \"port_number\": 445,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"CIFS\",\n \"ostype\": \"\",\n \"product\": \"Windows 2000 LAN Manager\",\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029967,\n \"port_number\": 3389,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"Microsoft Remote Display Protocol\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n },\n {\n \"id\": 239029968,\n \"port_number\": 5900,\n \"extra_info\": \"\",\n \"hostname\": null,\n \"name\": \"VNC\",\n \"ostype\": \"\",\n \"product\": null,\n \"protocol\": \"tcp\",\n \"state\": \"open\",\n \"version\": null\n }\n ],\n \"tags\": [],\n \"owner\": null,\n \"urls\": {\n \"vulnerabilities\": \"{{API_URL}}/assets/18321204/vulnerabilities\"\n },\n \"ip_address\": \"10.12.50.39\",\n \"database\": null,\n \"hostname\": \"talos-r3-xp-088.build.scl1.acmeinc.com\",\n \"fqdn\": null,\n \"netbios\": null,\n \"application\": null,\n \"file\": null,\n \"mac_address\": null,\n \"ec2\": null,\n \"url\": null,\n \"external_id\": null,\n \"ipv6\": null,\n \"risk_meter_score\": 1000,\n \"asset_groups\": [\n {\n \"id\": 189916,\n \"name\": \"!All Assets All Status\"\n },\n {\n \"id\": 189931,\n \"name\": \"Vulnerability 66+ & Fix Available\"\n },\n {\n \"id\": 189891,\n \"name\": \"RCEs\"\n },\n {\n \"id\": 189896,\n \"name\": \"Web Apps\"\n },\n {\n \"id\": 189902,\n \"name\": \"All Windows\"\n },\n {\n \"id\": 189915,\n \"name\": \"Third Party Apps\"\n },\n {\n \"id\": 189920,\n \"name\": \"Kenna Low Scanner High\"\n },\n {\n \"id\": 189922,\n \"name\": \"Kenna Low CVSS Score High\"\n },\n {\n \"id\": 189924,\n \"name\": \"Port 80\"\n },\n {\n \"id\": 189929,\n \"name\": \"Windows Critical Assets (900+)\"\n },\n {\n \"id\": 189930,\n \"name\": \"Windows Critical Vulnerabilities (+66)\"\n },\n {\n \"id\": 189937,\n \"name\": \"Windows Admin\"\n },\n {\n \"id\": 189940,\n \"name\": \"Windows_Critical\"\n },\n {\n \"id\": 189943,\n \"name\": \"Windows High Assets (665+)\"\n },\n {\n \"id\": 189949,\n \"name\": \"Windows XP\"\n },\n {\n \"id\": 189950,\n \"name\": \"CVSS 7+\"\n },\n {\n \"id\": 189953,\n \"name\": \"Java Vulns\"\n },\n {\n \"id\": 189957,\n \"name\": \"Windows Easily Exploitable\"\n },\n {\n \"id\": 189965,\n \"name\": \"Oracle\"\n },\n {\n \"id\": 189968,\n \"name\": \"Windows Critical - recently discovered\"\n },\n {\n \"id\": 189989,\n \"name\": \"High Risk (90+) Open Vulns\"\n },\n {\n \"id\": 189994,\n \"name\": \"Critical Linux Servers\"\n },\n {\n \"id\": 190003,\n \"name\": \"PCI Scope\"\n },\n {\n \"id\": 190006,\n \"name\": \"CVSS: Conf Comp Int Comp Avail Comp\"\n },\n {\n \"id\": 190009,\n \"name\": \"High Risk Assets\"\n },\n {\n \"id\": 196090,\n \"name\": \"windows-lg\"\n },\n {\n \"id\": 196420,\n \"name\": \"Windows XP (Vuln Score 66+)\"\n },\n {\n \"id\": 201033,\n \"name\": \"HIPAA HITRUST\"\n },\n {\n \"id\": 204958,\n \"name\": \"CVE-2020-0601\"\n },\n {\n \"id\": 210148,\n \"name\": \"SLA Breech\"\n },\n {\n \"id\": 215022,\n \"name\": \"!All Assets Open Vuln's\"\n },\n {\n \"id\": 215259,\n \"name\": \"KRI6 - Workstations without HIGH vulns unpatched > 40 days\"\n },\n {\n \"id\": 215803,\n \"name\": \"Webshell exposure\"\n },\n {\n \"id\": 189936,\n \"name\": \"XP Admin\"\n },\n {\n \"id\": 218861,\n \"name\": \"Payment Systems\"\n },\n {\n \"id\": 218863,\n \"name\": \"PS with priority\"\n },\n {\n \"id\": 221843,\n \"name\": \"AAA Rfal\"\n },\n {\n \"id\": 221890,\n \"name\": \"Windows - Kate\"\n },\n {\n \"id\": 222890,\n \"name\": \"Windows - KW\"\n }\n ]\n }\n ],\n \"meta\": {\n \"page\": 1,\n \"pages\": 10\n }\n}" } ] }, { "name": "Search Assets", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "search" ], "query": [ { "key": "application_id", "value": "int32", "description": "The ID of an application to retrieve assets for. All other search parameters are ignored if application_id is provided.", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings\n\"Include all assets\" includes all assets regardless of the vulnerability filters. \"Assets without Vulnerabilities\" will return only the assets without vulnerabilities. If this parameter is omitted, then the vulnerability filters are used.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of asset IDs", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority less than or equal to this value.", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority greater than or equal to this value", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score less than or equal to this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score greater than or equal to this value.", "disabled": true }, { "key": "page", "value": "integer", "description": "integer\nThe page number from 1 to 20.", "disabled": true }, { "key": "per_page", "value": "integer", "description": "integer\nThe page size from 1 to 50,000. Default page size is 500. A page size of 5,000 is recommended. Larger page sizes can cause performance issues.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string\nAdditional text search parameters, as documented at: Cisco Vulnerability Management Search Terms, section \"Asset Terms\". Example q=tag:(mytag+AND+thetag)", "disabled": true }, { "key": "service_names[]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings\nAn array of ports relating to your assets.", "disabled": true }, { "key": "service_products[]", "value": "array of integers", "description": "array of integers\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your assets which can include active and/or inactive. Note: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "status_set_manually", "value": "array of booleans", "description": "array of booleans\nA boolean to indicate whether an asset's active/inactive status was set automatically by Cisco Vulnerability Management or manually by a human.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32\nSearch values specified in the risk meter group definition will override their respective values provided in this request when search_id is provided.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string\nSet this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "vulnerability[classification][]", "value": "array of strings", "description": "array of strings\nClassification of the vulnerability.", "disabled": true }, { "key": "vulnerability[connector_names][]", "value": "array of strings", "description": "array of strings\nConnector names of the vulnerabilities.", "disabled": true }, { "key": "vulnerability[connector_types][]", "value": "array of strings", "description": "array of strings\nConnector types of the vulnerabilities.", "disabled": true }, { "key": "vulnerability[has_known_exploits][]", "value": "array of strings", "description": "array of strings\nVulnerabilities that have known exploits.", "disabled": true }, { "key": "vulnerability[has_known_malware][]", "value": "array of strings", "description": "array of strings\nVulnerabilities that have known malware.", "disabled": true }, { "key": "vulnerability[id][]", "value": "array of integers", "description": "array of integers\nVulnerability IDs.", "disabled": true }, { "key": "vulnerability[max_risk_meter_score]", "value": "integer", "description": "integer\nVulnerability risk scores that are less than or equal to this value.", "disabled": true }, { "key": "vulnerability[max_rounded_risk_meter_score]", "value": "integer", "description": "integer\nVulnerability risk scores rounded to the integer that is less than or equal to this value.", "disabled": true }, { "key": "vulnerability[max_severity]", "value": "integer", "description": "integer\nVulnerabilities with severity levels that are less than or equal to this value.", "disabled": true }, { "key": "vulnerability[max_threat]", "value": "integer", "description": "integer\nVulnerabilities with threat levels that are less than or equal to this value.", "disabled": true }, { "key": "vulnerability[min_risk_meter_score]", "value": "integer", "description": "integer\nVulnerabilities with threat levels that are less than or equal to this value.", "disabled": true }, { "key": "vulnerability[min_rounded_risk_meter_score]", "value": "integer", "description": "integer\nVulnerability risk scores rounded to the integer that is greater than or equal to this value.", "disabled": true }, { "key": "vulnerability[min_severity]", "value": "integer", "description": "integer\nVulnerabilities with severity levels that are greater than or equal to this value.", "disabled": true }, { "key": "vulnerability[min_threat]", "value": "integer", "description": "integer\nVulnerabilities with threat levels that are greater than or equal to this value.", "disabled": true }, { "key": "vulnerability[no_vulnerability_definition_id][]", "value": "array of integers", "description": "array of integers\nExclude Vulnerability IDs.", "disabled": true }, { "key": "vulnerability[pci_related][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that are Payment Card Industry related.", "disabled": true }, { "key": "vulnerability[port][]", "value": "array of integers", "description": "array of integers\nPorts associated with vulnerabilities.", "disabled": true }, { "key": "vulnerability[predicted_exploitable][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that are predicted to be exploitable.", "disabled": true }, { "key": "vulnerability[prioritized][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that are prioritized.", "disabled": true }, { "key": "vulnerability[q]", "value": "string", "description": "string\nVulnerability query string.", "disabled": true }, { "key": "vulnerability[remote_code_execution][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that can be executed remotely.", "disabled": true }, { "key": "vulnerability[service_ticket_status][]", "value": "array of strings", "description": "array of strings\nVulnerability ticket status.", "disabled": true }, { "key": "vulnerability[status][]", "value": "array of strings", "description": "array of strings\nVulnerability status.", "disabled": true }, { "key": "vulnerability[top_exploit][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that are actively being used for internet breaches.", "disabled": true }, { "key": "vulnerability[top_priority][]", "value": "array of booleans", "description": "array of booleans\nAn array of booleans for filtering your vulnerabilities that Cisco recommends should be a top priority to fix.", "disabled": true }, { "key": "vulnerability[trending][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that are trending.", "disabled": true }, { "key": "vulnerability[vulnerability_class][]", "value": "array of strings", "description": "array of strings\nVulnerability classification.", "disabled": true }, { "key": "vulnerability[vulnerability_definition_id][]", "value": "array of integers", "description": "array of integers\nVulnerability definition IDs.", "disabled": true }, { "key": "vulnerability[wasc_classification][]", "value": "array of strings", "description": "array of strings\nVulnerability WASC classification.", "disabled": true }, { "key": "vulnerability[zer_day][]", "value": "array of booleans", "description": "array of booleans\nVulnerabilities that have zero day exploits.", "disabled": true } ] }, "description": "Filters assets by a given set of input parameters and returns the filtered assets as well as the total number of assets in the filtered set. The default page size is 500, the maximum page size is 50,000, and the maximum pages allowed is 20. The total number of asset groups, page number, and total number of pages are available in the meta data. \r\n\r\nBy default, only active assets with open vulnerabilities are returned. Each unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all assets with status=[\"active\"] and tags=[\"foo\", \"bar\"] you will receive all active assets that have either a \"foo\" tag or a \"bar\" tag." }, "response": [] }, { "name": "Search Assets by Custom Query", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/search?q=asset_created:<2020-12-08", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "search" ], "query": [ { "key": "application_id", "value": "int32", "description": "The ID of an application to retrieve assets for. All other search parameters are ignored if application_id is provided.", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings\nIf you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of asset IDs", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority greater than this value", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "asset_created:<2020-12-08", "description": "string\nThis can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE." }, { "key": "service_names[]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings\nAn array of ports relating to your assets.", "disabled": true }, { "key": "service_products[]", "value": "array of integers", "description": "array of integers\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32\nSearch values specified in the risk meter group definition will override their respective values provided in this request when search_id is provided.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string\nSet this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "vulnerability", "value": "object", "description": "Vulnerability IDs. Search for all assets that have vulnerabilities with these IDs.", "disabled": true } ] } }, "response": [] }, { "name": "Search Assets by Custom Field", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/search?status%5B%5D=open%26custom_fields%3Acustomfield1%5B%5D=JA", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "search" ], "query": [ { "key": "application_id", "value": "int32", "description": "The ID of an application to retrieve assets for. All other search parameters are ignored if application_id is provided.", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings\nIf you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of asset IDs", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32\nSearch for all assets that have a priority greater than this value", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32\nSearch for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings\nAn array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings\nThe primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "service_names[]", "value": "array of strings", "description": "array of strings\nAn array of service names relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings\nAn array of ports relating to your assets.", "disabled": true }, { "key": "service_products[]", "value": "array of integers", "description": "array of integers\nAn array of service products relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings\nAn array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32\nSearch values specified in the risk meter group definition will override their respective values provided in this request when search_id is provided.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string\nSet this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings\nAn array of tag names associated with your assets.", "disabled": true }, { "key": "vulnerability", "value": "object", "description": "Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true }, { "key": "status%5B%5D", "value": "open%26custom_fields%3Acustomfield1%5B%5D=JA" } ] } }, "response": [] }, { "name": "Validate Asset Search Query", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/validate_search?q=string", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "validate_search" ], "query": [ { "key": "q", "value": "string", "description": "string\nThis is the q string to be validated. For more detailed documenation, see the Cisco Vulnerability Management Search Terms article in the Help Center, section \"Asset Terms\"." } ] }, "description": "Validate the query string portion of an asset search. If the query is invalid and if the system can determine a suggested replacement, that suggestion will be returned in the response." }, "response": [] }, { "name": "Show Asset", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id" ], "query": [ { "key": "", "value": null, "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "Asset group ID can be found in the Cisco Vulnerability Management URL when a risk meter is selected." } ] }, "description": "Returns information about a single asset by ID. This endpoint does not return tag source information." }, "response": [] }, { "name": "Create Asset", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\": {\r\n \"application\": \"\",\r\n \"external_id\": \"\",\r\n \"database\": \"\",\r\n \"ec2\": \"\",\r\n \"file\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"inactive\": \"\",\r\n \"ip_address\": \"\",\r\n \"ipv6\": \"\",\r\n \"last_booted_at\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"mac_address\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"operating_system\": \"\",\r\n \"owner\": \"\",\r\n \"primary_locator\": \"\",\r\n \"priority\": \"\",\r\n \"url\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets" ], "query": [ { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "Asset", "value": "Object", "disabled": true }, { "key": "application", "value": "string", "description": "string\nThe application name. Either application or application_id may be specified.\n\n", "disabled": true }, { "key": "application_id", "value": "string", "description": "string\nThe application locator of the asset. Either application_id or application may be specified.", "disabled": true }, { "key": "external_id", "value": "string", "description": "string\nThe external_id of the asset.", "disabled": true }, { "key": "database", "value": "string", "description": "string\nThe database name of the asset.", "disabled": true }, { "key": "ec2", "value": "string", "description": "string\nThe ec2 name of the asset.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nThe Fully Qualified path of the file.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nThe Fully Qualified Domain Name of the asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nThe hostname of the asset.", "disabled": true }, { "key": "inactive", "value": "boolean", "description": "boolean\nA boolean value to set the asset inactive.", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nThe IP address of the asset.", "disabled": true }, { "key": "ipv6", "value": "string", "description": "string\nThe asset's ipv6 address.", "disabled": true }, { "key": "last_booted_at", "value": "string", "description": "string\nA datetime (as an ISO-601 timestamp) identifying when the asset was last booted.\n\n", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string - A datetime (as an ISO-8601 timestamp) identifying when the asset was last seen.", "disabled": true }, { "key": "mac_address", "value": "string", "description": "string\nThe MAC address of the asset.", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nThe NetBIOS address of the asset.", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes about an asset.\n\n", "disabled": true }, { "key": "operating_system", "value": "string", "description": "string\nThe operating system of the asset.", "disabled": true }, { "key": "owner", "value": "string", "description": "string\nThe name of the owner of an asset.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary_locator field is deprecated. It is accepted for backward compatibility, but it's calculated by our back-end system and it is ignored.", "disabled": true }, { "key": "priority", "value": "int32", "description": "int32\nThe priority of the asset; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "url", "value": "string", "description": "string\nThe URL of the asset.", "disabled": true } ] }, "description": "Creates a single asset and returns the record." }, "response": [] }, { "name": "Update Asset ", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\": {\r\n \"application\": \"\",\r\n \"application_id\": \"\",\r\n \"external_id\": \"\",\r\n \"database\": \"\",\r\n \"ec2\": \"\",\r\n \"file\": \"\",\r\n \"fqdn\": \"\",\r\n \"hostname\": \"\",\r\n \"inactive\": \"\",\r\n \"ip_address\": \"\",\r\n \"ipv6\": \"\",\r\n \"last_booted_at\": \"\",\r\n \"last_seen_time\": \"\",\r\n \"mac_address\": \"\",\r\n \"netbios\": \"\",\r\n \"notes\": \"\",\r\n \"operating_system\": \"\",\r\n \"owner\": \"\",\r\n \"primary_locator\": \"\",\r\n \"priority\": \"\",\r\n \"url\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id" ], "query": [ { "key": "**Update {{id}} below in path parm", "value": null, "disabled": true }, { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "Asset", "value": "Object", "disabled": true }, { "key": "application", "value": "string", "description": "string\nThe application name. Either application or application_id may be specified.\n\n", "disabled": true }, { "key": "application_id", "value": "string", "description": "string\nThe application locator of the asset. Either application_id or application may be specified.\n\n", "disabled": true }, { "key": "external_id", "value": "string", "description": "string\nThe external_id of the asset.", "disabled": true }, { "key": "database", "value": "string", "description": "string\nThe database name of the asset.", "disabled": true }, { "key": "ec2", "value": "string", "description": "string\nThe ec2 name of the asset.", "disabled": true }, { "key": "file", "value": "string", "description": "string\nThe Fully Qualified path of the file.", "disabled": true }, { "key": "fqdn", "value": "string", "description": "string\nThe Fully Qualified Domain Name of the asset.", "disabled": true }, { "key": "hostname", "value": "string", "description": "string\nThe hostname of the asset.", "disabled": true }, { "key": "inactive", "value": "boolean", "description": "boolean\nA boolean value to set the asset inactive.", "disabled": true }, { "key": "ip_address", "value": "string", "description": "string\nThe IP address of the asset.", "disabled": true }, { "key": "ipv6", "value": "string", "description": "string\nThe asset's ipv6 address.", "disabled": true }, { "key": "last_booted_at", "value": "string", "description": "string\nA datetime (as an ISO-8601 timestamp) identifying when the asset was last booted.\n\n", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string - A datetime (as an ISO-8601 timestamp) identifying when the asset was last seen.", "disabled": true }, { "key": "mac_address", "value": "string", "description": "string\nThe MAC address of the asset", "disabled": true }, { "key": "netbios", "value": "string", "description": "string\nThe NetBIOS address of the asset", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain English notes about an asset.\n\n", "disabled": true }, { "key": "operating_system", "value": "string", "description": "string\nThe operating system of the asset.", "disabled": true }, { "key": "owner", "value": "string", "description": "string\nThe name of the owner of an asset.", "disabled": true }, { "key": "primary_locator", "value": "string", "description": "string\nThe primary_locator field is deprecated. It is accepted for backward compatibility, but it's calculated by our back-end system and it is ignored.", "disabled": true }, { "key": "priority", "value": "int32", "description": "int32\nThe priority of the asset; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "url", "value": "string", "description": "string\nThe URL of the asset.", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "ID can be found in the Cisco Vulnerability Management URL after selecting the asset." } ] }, "description": "Update a single asset's attributes by ID." }, "response": [] }, { "name": "Bulk Update Assets", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\": {\r\n \"priority\": \"\",\r\n \"notes\": \"\",\r\n \"created_at\": \"\",\r\n \"operating_system\": \"\",\r\n \"last_booted_at\": \"\",\r\n \"ipv6\": \"\",\r\n \"inactive\": \"\",\r\n \"owner\": \"\",\r\n \"reset_tags\": \"\",\r\n \"last_seen_time\": \"\"\r\n },\r\n \"asset_ids\": [\r\n \"\",\r\n \"\"\r\n ],\r\n \"realtime\": \"\"\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/bulk", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "bulk" ], "query": [ { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "asset_ids", "value": "array of integers", "description": "array of integers - IDs of all assets to be updated.", "disabled": true }, { "key": "Asset", "value": "Object", "disabled": true }, { "key": "priority", "value": "int32", "description": "int32\nThe priority of the asset; an integer between 1 (low) to 10 (high).", "disabled": true }, { "key": "notes", "value": "string", "description": "string\nStrings may be used to store plain english notes about an asset.\n\n", "disabled": true }, { "key": "operating_system", "value": "string", "description": "string\nThe operating system of the asset.", "disabled": true }, { "key": "last_booted_at", "value": "string", "description": "string\nA datetime (as an iso8601 timestamp) identifying when the asset was last booted.\n\n", "disabled": true }, { "key": "ipv6", "value": "string", "description": "string\nThe asset's ipv6 address.", "disabled": true }, { "key": "inactive", "value": "boolean", "description": "boolean\nA boolean value to set the asset inactive.", "disabled": true }, { "key": "owner", "value": "string", "description": "string\nThe name of the owner of an asset.", "disabled": true }, { "key": "reset_tags", "value": "boolean", "description": "Boolean - reset tags.", "disabled": true }, { "key": "remove_tags", "value": "[]", "description": "array of strings - specify which ones to remove.", "disabled": true }, { "key": "tags", "value": "[]", "description": "array of strings - add tags.", "disabled": true }, { "key": "last_seen_time", "value": "string", "description": "string - A datetime (as an ISO-8601 timestamp) identifying when the asset was last seen.", "disabled": true }, { "key": "remove_override", "value": "boolean", "description": "boolean - A datetime (as an ISO-8601 timestamp) identifying when the asset was last seen.", "disabled": true }, { "key": "realtime", "value": "boolean", "description": "Boolean - Assets will be updated synchronously if realtime is true. Please note that there is a limit of no more than 100 assets per realtime bulk update request.", "disabled": true } ] }, "description": "Update multiple assets at a time using the bulk update endpoint. Update limit is 30,000 assets at a time.\r\n\r\nBy default we will index the assets in the background. To index your assets synchronously, pass in the realtime parameter and set it to true.\r\n\r\nIn addition to the standard attributes on the \"asset\" parameter, you can also provide a \"remove_tags\" param: an array of strings that represent tags you would like removed, and a \"reset_tags\" param: a boolean value set to true if you would like to completely clear tags for each asset. If \"reset_tags\" is true, all tags will be removed from the assets regardless of source." }, "response": [] }, { "name": "Show Asset Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/:id/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id", "vulnerabilities" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "Asset group ID can be found in the Cisco Vulnerability Management URL when the asset is selected" } ] }, "description": "Returns all vulnerabilities for a single asset." }, "response": [] }, { "name": "Download Zipped Asset Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/download_data_zip", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "download_data_zip" ] }, "description": "Returs a gzipped file with the most recent data export of all of your assets. To arrange for a daily full data export, contact Support. The format of the uncompressed data, is JSONL, JSON, or XML. This is determined when when you contact Support." }, "response": [] } ], "description": "Cisco Vulnerability Management API use cases for Assets in the Cisco Vulnerability Management." }, { "name": "Asset Tagging", "item": [ { "name": "List Tags", "event": [ { "listen": "prerequest", "script": { "exec": [ "\r", "" ], "type": "text/javascript" } } ], "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/assets/:id/tags", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id", "tags" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "The asset ID." } ] }, "description": "Returns a list of tags for a given asset." }, "response": [] }, { "name": "Tag an Asset", "event": [ { "listen": "prerequest", "script": { "exec": [ "\r", "" ], "type": "text/javascript" } } ], "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\":\r\n {\r\n \"tags\" : [\"tcg\",\"123\"]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/:id/tags", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", ":id", "tags" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "The asset ID." }, { "key": "asset", "value": "object", "description": "Asset information.", "disabled": true }, { "key": "tags", "value": "array of strings", "description": "A string array of asset tags.", "disabled": true } ] }, "description": "Update a single asset based on ID by using a tag or tags. Supports either an array of tags, each tag wrapped in single or double quotes, or a single string with a comma separator." }, "response": [] }, { "name": "Untag an Asset", "event": [ { "listen": "prerequest", "script": { "exec": [ "\r", "" ], "type": "text/javascript" } } ], "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\":\r\n {\r\n \"tags\" : [\"123\", \"https\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/assets/{{id}}/tags", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "assets", "{{id}}", "tags" ], "query": [ { "key": "**{{id}} - field to be updated in the variable or URL above**", "value": "int32", "description": "The asset ID.", "disabled": true }, { "key": "asset", "value": "object", "description": "Asset information.", "disabled": true }, { "key": "tags", "value": "array of strings", "description": "A string array of asset tags.", "disabled": true } ] }, "description": "Update a single asset by ID by removing a tag or tags. Supports either an array of tags, each tag wrapped in single or double quotes, or a single string with a comma separator. Requests to this endpoint will only remove taggings created through the UI or API." }, "response": [] } ] }, { "name": "Asset Groups", "item": [ { "name": "List Asset Groups", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups" ], "query": [ { "key": "page", "value": "int32", "description": "int32 - The specific page being requested from 1 to 20.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "int32 - Number of Asset Groups per page. The default is 30 and the maximum page size is 100.", "disabled": true } ] }, "description": "Returns a list of all of your asset groups. The default page size is 30, and the maximum page size is 100. The total number of asset groups, page number, and total number of pages are available in the meta data." }, "response": [] }, { "name": "Show Asset Group", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**Update {{id}} in the URL above to reflect asset group ", "value": "int32", "description": "The asset group or risk meter ID.", "disabled": true } ] }, "description": "Returns a single asset group by ID." }, "response": [] }, { "name": "Show All Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}/fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}", "fixes" ], "query": [ { "key": "**Update {{id}} in the URL above to reflect asset group ", "value": "int32", "description": "The asset group or risk meter ID.", "disabled": true } ] }, "description": "Returns a paginated list of fixes that are related to all of your open vulnerabilities within an asset group. The default and maximum page size is 100. The total number of fixes, page number, and total number of pages are available in the meta data.\r\n\r\nThis request may take longer to complete depending on the number of assets and vulnerabilities associated with your asset group." }, "response": [] }, { "name": "Show Top Fix Groups", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/top_fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "top_fixes" ], "query": [ { "key": "fix_type", "value": "string", "description": "string- The type of fixes you wish to retrieve. Can be either \"infrastructure\" (default) or \"appsec\".", "disabled": true }, { "key": "hide_asset", "value": "boolean", "description": "boolean - Set to \"true\" to hide assets and only return fix data.\n\n", "disabled": true } ], "variable": [ { "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "key": "id", "type": "string", "value": "189999" } ] }, "description": "Returns top fixes for an asset group ID. You can optionally hide assets and only return fix data by passing the hide_asset parameter and setting it equal to true" }, "response": [] }, { "name": "Create Child Asset Group or Risk Meter", "request": { "method": "POST", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{parent_id}}/children", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**{{id}} above in url (or variable) to be updated with asset group ID found in Cisco Vulnerability Management", "value": null, "description": "**Select asset group in Cisco Vulnerability Management and get asset id from the URL", "disabled": true }, { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - Asset Groups and Risk Meters normally require that assets have open vulnerabilities. If you would like to include all assets, including assets without open vulnerabilities, pass an array with the value of [\"Include all assets\"].", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability IDs. Search for all assets that have vulnerabilities with these IDs.", "disabled": true } ] }, "description": "Creates a new child Asset Group or Risk Meter. The Hierarchical Risk Meters feature flag must be enabled to use this endpoint. When the Skip Calculations During Risk Meter Creation feature flag is enabled, asset_count, risk_meter_score, and true_risk_meter_score calculations are skipped on the response payload and the value is returned as null." }, "response": [] }, { "name": "Create Asset Group or Risk Meter", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset_group\":\r\n {\r\n \"name\":\"Test123\",\r\n \"query\":\r\n {\r\n \"status\": [\"active\"],\r\n \"tags\": [\"foo\", \"bar\"],\r\n \"vulnerability\":\r\n { \r\n \"q\":\"vulnerability_found:>now-90d AND closed_at:>now-1d\"\r\n }\r\n } \r\n }\r\n}\r\n", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups" ], "query": [ { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - If you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags. For example, if you want to return all assets the have the tag foo and the tag bar your request would look like this:", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] }, "description": "Creates a new Asset Group and Risk Meter. This API converts all filters into a querystring that can't exceed 8,000 characters. When the Skip Calculations During Risk Meter Creation feature flag is enabled, asset_count, risk_meter_score, and true_risk_meter_score calculations are skipped on the response payload and the value is returned as null." }, "response": [] }, { "name": "Create Risk Meter from Custom Field", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset_group\":\r\n {\r\n \"name\":\"Custom Field Test\",\r\n \"query\":\r\n {\r\n \"status\": [\"active\"],\r\n \"vulnerability\":\r\n { \r\n \"custom_fields\":\"Custom Field Dummy:Example custom field text\"\r\n }\r\n } \r\n }\r\n}\r\n", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups" ], "query": [ { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - If you want to include all assets regardless of vulnerability filters, pass a value of [\"Include all assets\"]; otherwise, omit this parameter.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets. Make sure all letters are lowercase.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags. For example, if you want to return all assets the have the tag foo and the tag bar your request would look like this:", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability ids. Search for all assets that have vulnerabilities with these ids.", "disabled": true } ] } }, "response": [] }, { "name": "Update Asset Group", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset_group\":\r\n {\r\n \"name\" : \"demotcg2\"\r\n }\r\n }\r\n", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**{{id}} above in url (or variable) to be updated with asset group ID found in Cisco Vulnerability Management", "value": null, "description": "**Select asset group in Cisco Vulnerability Management and get asset id from the URL", "disabled": true }, { "key": "**All fields below are to updated in Body Params**", "value": null, "description": "**All fields below are to updated in Body Params**", "disabled": true }, { "key": "exclude_child_filter[]", "value": "array of strings", "description": "array of strings - Asset Groups and Risk Meters normally require that assets have open vulnerabilities. If you would like to include all assets, including assets without open vulnerabilities, pass an array with the value of [\"Include all assets\"].", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of asset ids", "disabled": true }, { "key": "min_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority greater than this value.", "disabled": true }, { "key": "max_priority", "value": "int32", "description": "int32 - Search for all assets that have a priority less than this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Search for all assets that have a risk meter score greater than this value.", "disabled": true }, { "key": "operating_system[]", "value": "array of strings", "description": "array of strings - An array of the names of the operating systems associated with a set of assets.", "disabled": true }, { "key": "primary_locator[]", "value": "array of strings", "description": "array of strings - The primary locator used for an asset. This should be one of the following values: ip_address, hostname, database, url, mac_address, netbios, fqdn, file, or application", "disabled": true }, { "key": "q", "value": "string", "description": "string - This can be any query string you want to search for, including a regex. We also have our own search syntax that enables you to search assets based on specific locators and fields. For more detailed documentation on our search syntax visit our Help Center. Below is an example of our search syntax being used to find all assets with the hostname foobar. As stated in our Help Center, it is also possible to use our search syntax on vulnerability fields. In order to apply a query for a vulnerability field to an asset search you must nest the query string under a vulnerability key. The example below shows how to search for all assets that relate to vulnerabilities that are connected to the Heartbleed CVE.", "disabled": true }, { "key": "service_ports[]", "value": "array of strings", "description": "array of strings - An array of ports relating to your assets.", "disabled": true }, { "key": "service_protocols[]", "value": "array of strings", "description": "array of strings - An array of service protocols relating to your assets.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for your assets which can include active and/or inactive. NOTE: By default, only active assets are returned when searching. You must specify the asset status you want in order to override that default.", "disabled": true }, { "key": "tags[]", "value": "array of strings", "description": "array of strings - An array of tag names associated with your assets.", "disabled": true }, { "key": "tag_boolean_mode", "value": "string", "description": "string - Set this to 'all' if you would like to return assets that contain all of the tags in your query rather than assets that contain any of the tags.", "disabled": true }, { "key": "vulnerability: {id: []}", "value": "array of integers", "description": "array of integers - Vulnerability IDs. Search for all assets that have vulnerabilities with these IDs.", "disabled": true } ] }, "description": "Update a parent asset group or risk meter attributes by ID. This API converts all filters into a querystring that can't exceed 8,000 characters." }, "response": [] }, { "name": "Delete Asset Group", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32", "description": "The asset group or risk meter ID.", "disabled": true } ] }, "description": "Delete an asset group or risk meter using its ID. Note: A child or descendant asset group cannot be deleted via the API. Use the UI to delete the child or descendant asset group." }, "response": [] } ] }, { "name": "Calculate Asset Group Metric", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/{id}/metric_name/{metric_name}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", "{{id}}" ], "query": [ { "key": "**Update {{metric_name}} in the URL above to reflect asset group", "value": "int32", "description": "The asset group or risk meter ID.", "disabled": true }, { "key": "**Update {{id}} in the URL above to reflect asset group", "value": "int32", "description": "The name of the metric used to calculate the new value for the asset group.", "disabled": true } ] }, "description": "Returns a newly calculated metric value for an asset group based on its ID and the specified metric name." }, "response": [] }, { "name": "Asset Group Reporting", "item": [ { "name": "Historical Mean Time To Remediate Findings by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_mean_time_to_remediate_by_risk_level?all_time=true", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_mean_time_to_remediate_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "The asset group identification number.", "disabled": true }, { "key": "all_time", "value": "true", "description": "boolean- Setting this parameter to any value will retrieve the MTTR for the asset group for its whole lifetime. This parameter overrides the start_date and end_date parameters." }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "189941", "description": "ID of Risk Meter requested" } ] }, "description": "Returns a list of Mean Time To Remediate (MTTR) findings in days based on the Risk Level for the provided Asset Group ID." }, "response": [] }, { "name": "Historical Mean Time To Remediate Vulnerabilities by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_mean_time_to_remediate_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_mean_time_to_remediate_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "The asset group identification number.", "disabled": true }, { "key": "all_time", "value": "true", "description": "boolean- Setting this parameter to any value will retrieve the MTTR for the asset group for its whole lifetime. This parameter overrides the start_date and end_date parameters." }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "189941", "description": "The asset group or risk meter ID." } ] }, "description": "Returns a list of Mean Time To Remediate (MTTR) vulnerabilities in days by Risk Level specified by the Asset Group ID." }, "response": [] }, { "name": "Historical Risk Meter Scores", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_risk_meter_scores", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_risk_meter_scores" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group ID can be found in the Cisco Vulnerability Management URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you want to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "description": "Risk meter ID" } ] }, "description": "Returns a list of the historical Risk Meter scores for the Asset Group ID provided. If a start or end date is not provided, this endpoint defaults to returning risk meter scores for all time for the specified Asset Group." }, "response": [] }, { "name": "Historical Vulnerability Risk Category Counts", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_open_vulnerability_count_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_open_vulnerability_count_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or in the variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in the Cisco Vulnerability Management URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you want to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns a list of the historical Vulnerability Risk Category (\"High\", \"Medium\", \"Low\") counts for the Asset Group ID provided. If a start or end date is not provided, this endpoint defaults to returning data for all time for the specified Asset Group." }, "response": [] }, { "name": "Historical Vulnerability Risk Category Counts Copy", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_open_vulnerability_count_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_open_vulnerability_count_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group id can be found in Kenna platform URL when risk meter is selected", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The iso timestamp of the start date of the period you wish to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The iso timestamp of the end date of the period you wish to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "Risk meter ID" } ] }, "description": "Returns a listing of the historical Vulnerability Risk Category (\"High\", \"Medium\", \"Low\") counts for the Asset Group ID provided. If a start or end date is not provided, this endpoint defaults to returning data for all time for the specified Asset Group." }, "response": [] }, { "name": "Total Past Due Vulnerabilities by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/total_past_due_vulnerabilities_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "total_past_due_vulnerabilities_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group ID can be found in the Cisco Vulnerability Management URL when risk meter is selected", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "The asset group or risk meter ID." } ] }, "description": "Returns the count of vulnerabilities for an asset group that are past their assigned due dates, sorted by high, medium and low risk vulnerabilities." }, "response": [] }, { "name": "Vulnerabilities by Due Date", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/vulnerabilities_by_due_date", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "vulnerabilities_by_due_date" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group ID can be found in the Cisco Vulnerability Management URL when risk meter is selected", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "The asset group or risk meter ID." } ] }, "description": "Returns the count of vulnerabilities for a given Asset Group categorized by when they are due." }, "response": [] }, { "name": "Average Days Open by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_avg_days_open_vulnerabilities_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_avg_days_open_vulnerabilities_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "The asset group or risk meter ID.", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you want to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "The asset group or risk meter ID." } ] }, "description": "Returns the average days open of vulnerabilities by risk status in each level (low, medium, and high) for a given Asset Group over time." }, "response": [] }, { "name": "Risk Accepted by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/risk_accepted_over_time", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "risk_accepted_over_time" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "Asset group ID can be found in the Cisco Vulnerability Management URL when risk meter is selected.", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you want to report on. Defaults to 30 ", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "The asset group or risk meter ID." } ] }, "description": "Returns the count of vulnerabilities with risk-accepted status in each level (low, medium, and high) for a given Asset Group over time." }, "response": [] }, { "name": "False Positives by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_false_positives_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_false_positives_by_risk_level" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect asset group ", "value": "int32 (in path)", "description": "The asset group or risk meter ID.", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you want to report on. Defaults to 30 days ago.", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "The asset group or risk meter ID." } ] }, "description": "Returns the count of vulnerabilities manually marked as false positive for a given date range, grouped by risk level." }, "response": [] }, { "name": "Past Due Vulnerabilities by Risk Level Over Time", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/asset_groups/:id/report_query/historical_past_due_vulnerabilities_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "asset_groups", ":id", "report_query", "historical_past_due_vulnerabilities_by_risk_level" ], "query": [ { "key": "", "value": "", "disabled": true }, { "key": "start_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the start date of the period you want to report on. Defaults to 30 ", "disabled": true }, { "key": "end_date", "value": "string", "description": "string - The ISO-8601 timestamp (YYYY-MM-DD) of the end date of the period you want to report on. Defaults to today.", "disabled": true } ], "variable": [ { "key": "id", "value": "integer", "description": "The asset group or risk meter ID." } ] }, "description": "Returns the count of vulnerabilities that are past their due date for a given date range, grouped by risk level." }, "response": [] }, { "name": "Refresh Reporting Data", "request": { "method": "POST", "header": [], "url": { "raw": "https://{{API_URL}}/clients/refresh_reports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "clients", "refresh_reports" ], "query": [ { "key": "", "value": "", "disabled": true } ] }, "description": "Refresh all reporting data. Only one client report refresh can be run at a time. If the scheduled client report refresh or a manual refresh is already running, you will not be able to manually kick off a new one until the one currently running is finished." }, "response": [] }, { "name": "Get Refresh Reporting Status", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/clients/refresh_reports_status", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "clients", "refresh_reports_status" ], "query": [ { "key": "", "value": "", "disabled": true } ] }, "description": "Get status of reporting data refresh. Only one client report refresh can be run at a time. If the scheduled client report refresh or a manual refresh is already running you will not be able to manually kick off a new one until the one currently running is finished." }, "response": [] } ] }, { "name": "Connectors", "item": [ { "name": "List Connectors", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors" ] }, "description": "Returns a list of all of your connectors." }, "response": [] }, { "name": "Update Connector", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"connector\": {\r\n \"name\": \"\",\r\n \"host\": \"\",\r\n \"username\": \"\",\r\n \"password\": \"\",\r\n \"api_key\": \"\",\r\n \"scan_policy\": \"\",\r\n \"scan_list\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/connectors/{{id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", "{{id}}" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect connector identifier", "value": "int32 above", "description": "The Connector ID.", "disabled": true }, { "key": "{{**All items below are to be updated in the body tab -- here only for doc}}", "value": null, "disabled": true }, { "key": "name", "value": "string", "description": "string- The name used to identify this connector in Cisco Vulnerability Management.", "disabled": true }, { "key": "host", "value": "string", "description": "string - The hostname of your vulnerability scanner (if applicable).", "disabled": true }, { "key": "username", "value": "string", "description": "string - The username of an account on your vulnerability scanner (if applicable).\n\n", "disabled": true }, { "key": "password", "value": "string", "description": "string - The password of an account on your vulnerability scanner (if applicable).\n\n", "disabled": true }, { "key": "api_key", "value": "string", "description": "string - The API key used to access your vulnerability scanner (if applicable).", "disabled": true }, { "key": "scan_policy", "value": "string", "description": "string - The stored policy the vulnerability scanner uses for this connector.", "disabled": true }, { "key": "scan_list", "value": "string", "description": "string - The list of scans with this connector (if applicable). List is a comma separated string, or null.", "disabled": true } ] }, "description": "Updates the attributes of a connector by given id." }, "response": [] } ] }, { "name": "Connector Runs", "item": [ { "name": "List Connector Runs", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors/{{id}}/connector_runs/{{connector_run_id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", "{{id}}", "connector_runs", "{{connector_run_id}}" ], "query": [ { "key": "**Update {{id}} in the URL above (or variable) to reflect connector identifier", "value": "int32 above", "description": "The connector ID from the List Connectors API.", "disabled": true } ] }, "description": "Returns a list of connector runs for a connector." }, "response": [] }, { "name": "Show Connector Run", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors/{{id}}/connector_runs/{{connector_run_id}}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", "{{id}}", "connector_runs", "{{connector_run_id}}" ], "query": [ { "key": "**Update connector run {{id}} in the URL above (or variable) to reflect connector run identifier", "value": "int32 above", "description": "The connector ID.", "disabled": true }, { "key": "**Update connector run {{connector_run_id}}} in the URL above (or variable) to reflect connector run identifier", "value": null, "description": "The connector run ID which can be obtained from the List Connectors API or the UI -> Connectors.", "disabled": true } ] }, "description": "Return information about a single connector run by ID." }, "response": [] }, { "name": "Upload Data File", "protocolProfileBehavior": { "disabledSystemHeaders": {} }, "request": { "method": "POST", "header": [], "body": { "mode": "formdata", "formdata": [ { "key": "file", "contentType": "application/xml", "type": "file", "src": "/C:/Users/toby/Downloads/Kenna API.postman_collection_v4.json" }, { "key": "run", "value": "true", "type": "text" } ], "options": { "raw": { "language": "text" } } }, "url": { "raw": "https://{{API_URL}}/connectors/:id/data_file", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", ":id", "data_file" ], "query": [ { "key": "{{**Update params below in body tab - doco only below **}}", "value": null, "description": "The connector ID. The connector ID can found in the List Connectors API endpoint.", "disabled": true }, { "key": "encoding", "value": "string", "description": "string - Compression encoding of the file input. Currently 'deflate' is the only valid value, which implies Python's zlib.compressobj(). Default is null.", "disabled": true }, { "key": "file", "value": "file name", "description": "File name to be uploaded to the associated connector. This is a fully qualifed path name.", "disabled": true }, { "key": "run", "value": "boolean", "description": "boolean \"true\" The value true implies that the connector will run immediately after the file has been uploaded. Default is false.", "disabled": true } ], "variable": [ { "key": "id", "value": "154513", "type": "string", "description": "Connector run id can be found from API \"List Connector Runs\"" } ] }, "description": "Uploads a data file to a file based connector specified by the ID. The ID can be found from the List Connectors API. The file format is dependent on the connector specified by the ID. In most cases, the file format is the Data Importer format. This is a JSON format that specifies assets and vulnerabilities.\r\n\r\n-- Including the parameter \"Content-Type: application/json\" in the header will result in a HTTP status code 400.\r\n-- If including the parameter \"run: true\", refer to the response from the Run Connector endpoint." }, "response": [] }, { "name": "Run Connector", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/connectors/:id/run", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "connectors", ":id", "run" ], "query": [ { "key": "data_files[]", "value": "array of integers", "description": "array of integers - The data file ID from the Upload Data File API.\n", "disabled": true } ], "variable": [ { "key": "id", "value": "int32 above", "type": "string", "description": "The connector ID. This can be obtained from the List Connectors API or the UI -> Connectors." } ] }, "description": "Schedules a run of a connector. If file based, it will use the \"data_files\" parameter if present, or else the most recently uploaded data file." }, "response": [] } ] }, { "name": "Users", "item": [ { "name": "List Users", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/users", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users" ] }, "description": "Returns a list of all of your users." }, "response": [] }, { "name": "Search users", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/users", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", "search" ], "query": [ { "key": "firstname", "value": "string", "description": "string\nSearch for all users that have this first name.", "disabled": true }, { "key": "lastname", "value": "string", "description": "string\nSearch for all users that have this last name.", "disabled": true }, { "key": "email", "value": "string", "description": "string\nSearch for the user that has this email address.", "disabled": true } ] }, "description": "Filters users by a given set of input parameters and returns the filtered users and the total number of users in the filtered set." }, "response": [] }, { "name": "Show User", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/users/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", ":id" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "Cisco Vulnerability Management ID for the user found in Cisco Vulnerability Management when user is selected" } ] }, "description": "Returns information about a single user by ID." }, "response": [] }, { "name": "Create User", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"user\": {\r\n \"email\": \"\",\r\n \"firstname\": \"\",\r\n \"lastname\": \"\",\r\n \"roles\": [\"normal user\", \"custom_user\"],\r\n \"role_ids\": [4422, 4433], \"phone\": \"\",\r\n \"current_password\": \"\",\r\n \"password\": \"\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/users", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users" ], "query": [ { "key": "{{BODY PARAMS BELOW}}", "value": null, "disabled": true }, { "key": "**user ", "value": "object", "disabled": true }, { "key": "**email", "value": "string", "description": "string - The user will need an email address to log in to Cisco Vulnerability Management.", "disabled": true }, { "key": "**firstname", "value": "string", "description": "string - First Name of the user", "disabled": true }, { "key": "**lastname", "value": "string", "description": "string - Last Name of the user", "disabled": true }, { "key": "**roles", "value": "array of strings", "description": "array of strings - The roles assigned to a user, required if role_ids is not provided", "disabled": true }, { "key": "**role_ids", "value": "array of integers", "description": "array of integers - The role IDs assigned to a user, required if roles is not provided", "disabled": true }, { "key": "**external_id", "value": "string", "description": "string - A client defined string; for example, an internal Active Directory account name.", "disabled": true }, { "key": "**phone", "value": "string", "description": "string - The user's phone number", "disabled": true } ] }, "description": "Creates a single user and returns the record. Creates a single user and returns the record. You can assign up to ten roles per user with the new \"Multiple Roles Per User\" feature. Use \"roles\" or \"role_ids\" in the request, \"role\" is no longer supported after Sep 08, 2021." }, "response": [] }, { "name": "Update User", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"user\":\r\n {\r\n \"email\": \"sallen@example.com\",\r\n \"firstname\": \"Steve\",\r\n \"lastname\": \"Allen\",\r\n \"roles\": [\"normal user\", \"custom_user\"],\r\n \"role_ids\": [4422, 4433], \r\n \"external_id\": \"1234567\", \"phone\": \"\",\r\n \"current_password\": \"\", \"password\": \"\" }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/users/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", ":id" ], "query": [ { "key": "{{BODY PARAMS BELOW}}", "value": null, "disabled": true }, { "key": "**See all options in \"Create User\"", "value": "string", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - found in Cisco Vulnerability Management when user is selected" } ] }, "description": "Update a single user's attributes by ID. You can assign up to ten roles per user with the new \"Multiple Roles Per User\" feature. \r\n\r\nUse roles or role_ids in the request, role is no longer supported after Sep 08, 2021.\r\n\r\nImportant: All of the user's roles or role_ids should be provided in the arrays including the existing ones and the new ones, any existing roles or role_ids that are not included in the arrays will be unassigned from the user. For more details, see the Understanding Multiple Roles per User help article (https://help.kennasecurity.com/hc/en-us/articles/4405055529236-Understanding-Multiple-Roles-per-User)." }, "response": [] }, { "name": "Delete User", "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/users/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "users", ":id" ], "variable": [ { "key": "id", "value": "User ID", "type": "int32", "description": "int32 - found in Cisco Vulnerability Management when user is selected" } ] }, "description": "Delete a user using their ID." }, "response": [] } ] }, { "name": "Roles", "item": [ { "name": "List Roles", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/roles", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles" ] }, "description": "Returns a list of all of your roles." }, "response": [] }, { "name": "Show Role", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/roles/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - ID of the role found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Returns information about a single role by ID." }, "response": [] }, { "name": "Create Role", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"name\":\"Demo1234\",\r\n \"access_level\":\"read\",\r\n \"asset_groups\":[\"All Linux\"],\r\n \"applications\":[\"Bookstore\"]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", "" ], "query": [ { "key": "**All Params updated in Body Tab", "value": null, "description": "role - object\nname - string - The name of the role.\ndescription - string - The description of the role\naccess_level - string - The access level assigned to the role. This must be either \"read\" or \"write\"\nasset_group_ids - array of integers - An array of asset group IDs that you want associated with the role. If an asset group cannot cannot be found an error will be returned.\napplications - array of strings - An array of application names to add to a role's set of applications.\nasset_groups [DEPRECATED] - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned. Because name conflicts will cause an error, we suggest using asset_group_ids instead.", "disabled": true } ] }, "description": "Creates a single role and returns the record." }, "response": [] }, { "name": "Bulk Update Permissions", "request": { "method": "PUT", "header": [], "url": { "raw": "https://{{API_URL}}/roles/update_permissions_in_bulk", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "update_permissions_in_bulk" ], "query": [ { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "roles", "value": "array of objects", "description": "array of objects - Roles to be updated.", "disabled": true }, { "key": "realtime", "value": "boolean", "description": "boolean - Roles' permissions will be updated synchronously if \"realtime\" is true. Note that there is a limit of no more than 1000 roles per realtime bulk update request.", "disabled": true } ] }, "description": "Allow admins to bulk update permissions of custom roles. Currently the end point supports enabling/disabling home page and AppSec reporting page access for custom roles. Update limit is 10,000 permissions at a time. By default we will index the permissions in the background and it responds with {\"result\":\"Your request to update permissions in bulk is being processed in the background.\"} after receiving the request, updated changes can be seen in the UI under \"Roles\" or by invoking the \"List Roles\" API. In order to index your permissions synchronously, pass in the \"realtime\" parameter and set it to true." }, "response": [] }, { "name": "Update Role", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"name\" : \"new role\",\r\n \"applications\" : [\"Test PHP\", \"Aziz Test\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id" ], "query": [ { "key": "**All other Params updated in Body Tab", "value": null, "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - ID of the role found in Cisco Vulnerability Management when selected." } ] }, "description": "Update a single role's attributes by ID.\r\n\r\nWhen updating asset groups for a role, all current asset groups for a role will be over written by the array passed in the update params. To add asset groups to a role without overwriting a role's current asset groups, use the add_asset_groups endpoint. If you would like to update custom role permissions, use the custom_permissions endpoint." }, "response": [] }, { "name": "Add Asset Group(s) to Role", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"asset_groups\" : [\"new group\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id/add_asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id", "add_asset_groups" ], "query": [ { "key": "**asset_group_ids - updated in body tab", "value": "array of strings", "description": "array of strings - An array of asset group ids that you want associated with the role. If an asset group cannot cannot be found an error will be returned.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - ID of role found in Cisco Vulnerability Management when selected." } ] }, "description": "Add asset groups to a role by ID." }, "response": [] }, { "name": "Add Application(s) to Role", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"applications\" : [\"Valid application name\", \"Another application name\"]\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id/add_applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id", "add_applications" ], "query": [ { "key": "**All other Params updated in Body Tab", "value": null, "description": "role - object\nname - string - The name of the role.\naccess_level - string - The access level assigned to the role. This must be either \"read\" or \"write\"\nasset_groups - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned.\nasset_groups - array of strings - An array of asset group names that you want associated with the role. If an asset group name cannot be found an error will be returned.\napplications - array of strings - An array of application names to add to a role's set of applications.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - ID of role found in Cisco Vulnerability Management after it is selected." } ] }, "description": "Add applications to a role by ID." }, "response": [] }, { "name": "Delete Role", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/roles/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "ID of role that needs to be deleted" } ] }, "description": "Delete a role using its ID. A role cannot be deleted if it is connected to a user." }, "response": [] }, { "name": "Update Role Custom Permissions", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"role\":\r\n {\r\n \"permissions\": {\r\n \t \"edit_asset_status\": \"false\",\r\n \"edit_asset_notes\": \"true\"\r\n }\r\n }\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/roles/:id/custom_permissions", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "roles", ":id", "custom_permissions" ], "query": [ { "key": "**Body Params only", "value": "doc >>>>>>", "description": "role\nobject\n\npermissions\nobject\npermissions\nedit_asset_groups\nboolean\n\ncreate_service_ticket\nboolean\n\nshare_fixes\nboolean\n\nexport_data\nboolean\n\nedit_asset_status\nboolean\n\nedit_asset_locators\nboolean\n\nedit_asset_priority\nboolean\n\nedit_asset_notes\nboolean\n\nedit_asset_tags\nboolean\n\nedit_asset_owner\nboolean\n\nedit_asset_operating_system\nboolean\n\nedit_vulnerability_notes\nboolean\n\nedit_vulnerability_status\nboolean\n\nedit_vulnerability_custom_fields\nboolean\n\nedit_vulnerability_score_override\nboolean\n\nedit_vulnerability_due_date\nboolean\n", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - The role to update, the ID can be found in the UI." } ] }, "description": "Update custom role permissions by role ID." }, "response": [] } ] }, { "name": "Stacks", "item": [ { "name": "Show Stack", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/stacks/{id}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks", ":id" ], "variable": [ { "key": "id", "value": "Stack ID", "type": "int32", "description": "int32 - ID of the stack found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Return information about a stack by ID." }, "response": [] }, { "name": "Delete Stack", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/stacks/{id}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks", ":id" ], "variable": [ { "key": "id", "value": "Stack ID", "type": "int32", "description": "int32 - ID of the stack found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Delete a Stack using its ID." }, "response": [] }, { "name": "Update Stack", "request": { "method": "PUT", "header": [], "url": { "raw": "https://{{API_URL}}/stacks/{id}", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks", ":id" ], "query": [ { "key": "**Update in Body Tab", "value": "**Doc Only -->>", "description": "stack\nobject\n\nname\nstring\nThe new name of the stack\n\napplication_ids\narray of integers\napplication_ids\n\nAn array containing application IDs that will replace the current IDs in the stack\n\nasset_search_ids\narray of integers\nasset_search_ids\n\nAn array containing asset IDs that will replace the current IDs the stack", "disabled": true } ], "variable": [ { "key": "id", "value": "Stack ID", "type": "int32", "description": "int32 - ID of the stack found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Update a stack by its ID." }, "response": [] }, { "name": "Stack's Application statistics", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/stacks/{id}/stats/applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks", ":id", "stats", "applications" ], "variable": [ { "key": "id", "value": "Stack ID", "type": "int32", "description": "int32 - ID of the stack found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Return the application statistics about a stack by ID." }, "response": [] }, { "name": "Stack's Asset Groups statistics", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/stacks/{id}/stats/asset_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks", ":id", "stats", "asset_groups" ], "variable": [ { "key": "id", "value": "Stack ID", "type": "int32", "description": "int32 - ID of the stack found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Return the asset groups statistics about a stack by ID." }, "response": [] }, { "name": "List Stacks", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/stacks", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks" ], "query": [ { "key": "page", "value": "int32", "description": "int32 - The specific page being requested from 1 to the total number of pages returned in the meta object.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "int32 - The page size from 1 to 5,000. Default page size is 100.", "disabled": true } ] }, "description": "Returns a list of all of your stacks. The default page size is 100, and the maximum page size is 100." }, "response": [] }, { "name": "Create Stack", "request": { "method": "POST", "header": [], "url": { "raw": "https://{{API_URL}}/stacks", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "stacks" ], "query": [ { "key": "**Update in Body Tab", "value": "**Doc Only -->>", "description": "stack\nobject\n\nname\nstring\nThe name of the stack\n\napplication_ids\narray of integers\napplication_ids\n\nasset_search_ids\narray of integers\nasset_search_ids", "disabled": true } ], "variable": [ { "key": "id", "value": "Stack ID", "type": "int32", "description": "int32 - ID of the stack found in Cisco Vulnerability Management when it is selected." } ] }, "description": "Creates a Stack and returns the created stack details." }, "response": [] } ] }, { "name": "Fixes", "item": [ { "name": "List Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes" ], "query": [ { "key": "page", "value": "int32", "description": "The specific page being requested from 1 to the total number of pages returned in the meta object.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "Number of Fixes per page. The default is 25 and the maximum page size is 100.", "disabled": true } ] }, "description": "Returns a paginated list of fixes that are related to all of your open vulnerabilities that have active assets. The default page size is 25 and the maximum page size is 100. The total number of fixes, page number, and total number of pages are available in the meta data.\r\n\r\nNote: this request may take longer to complete depending on the number of assets and vulnerabilities associated with your fixes." }, "response": [] }, { "name": "Search Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes", "search" ], "query": [ { "key": "active_internet_breach[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that have seen tranding breach activity.", "disabled": true }, { "key": "id[]", "value": "string", "description": "string - Search for all fixes related to vulnerabilities that are connected to a set of assets.\n\nid\n\n", "disabled": true }, { "key": "status[]", "value": "string", "description": "string - By default, only fixes for vulnerabilities with active assets are returned. To override this default, specify the status parameter for an asset as shown. Status choices are active and inactive.", "disabled": true }, { "key": "connector_names[]", "value": "array of strings", "description": "array of strings - An array of connector names related to your vulnerabilities.", "disabled": true }, { "key": "connector_types[]", "value": "array of strings", "description": "array of strings - An array of connector types related to your vulnerabilities.", "disabled": true }, { "key": "custom_field:CUSTOM_FIELD_NAME[]", "value": "array of strings", "description": "array of strings - Search for all fixes for vulnerabilities that have a specific custom field value. The proper format for a custom field query is 'custom_fields:' then the name of the custom_field you are searching on, then the value you are searching for.\n\ncurl -H \"X-Risk-Token: \" \"https://{{API_URL}}/fixes/search?custom_field:test_score[]=1&custom_field:test_date[]=10/1/2015\" -X GET", "disabled": true }, { "key": "easily_exploitable[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that have seen high levels of exploitation recently.", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers - Array of vulnerability ids", "disabled": true }, { "key": "malware_exploitable[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that have had pieces of malware identified.", "disabled": true }, { "key": "max_risk_meter_score", "value": "int32", "description": "int32 - Find all fixes for vulnerabilities with risk scores less than or equal to this value.", "disabled": true }, { "key": "min_risk_meter_score", "value": "int32", "description": "int32 - Find all fixes for vulnerabilities with risk scores greater than or equal to this value.", "disabled": true }, { "key": "page", "value": "int32", "description": "int32 - The specific page being requested from 1 to the total number of pages returned in the meta object.", "disabled": true }, { "key": "pci_related[]", "value": "array of booleans", "description": "array of booleans - An array of booleans to filter for Payment Card Industry related vulnerabilities", "disabled": true }, { "key": "popular_target[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that are popular targets.", "disabled": true }, { "key": "port[]", "value": "array of integers", "description": "array of integers - An array of ports associated with your vulnerabilities.", "disabled": true }, { "key": "service_ticket_status", "value": "array of strings", "description": "array of strings - An array of strings that represent the statuses of all service tickets connected to your vulnerabilities.", "disabled": true }, { "key": "status[]", "value": "array of strings", "description": "array of strings - An array of statuses for vulnerabilities.", "disabled": true }, { "key": "top_priority[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that Cisco Vulnerability Management recommends should be a top priority to fix.", "disabled": true }, { "key": "vulnerability_class[]", "value": "array of strings", "description": "array of strings - An array of strings describing the class of your vulnerabilities.", "disabled": true }, { "key": "wasc_classification[]", "value": "array of strings", "description": "array of strings - An array of WASC classifications related to your vulnerabilities.", "disabled": true }, { "key": "zero_day[]", "value": "array of booleans", "description": "array of booleans - An array of booleans for filtering your vulnerabilities by those that are classified as zero days.", "disabled": true } ] }, "description": "Filters fixes by a given set of vulnerability and asset parameters and returns the filtered fixes as well as the total number of fixes. By default, only fixes for open vulnerabilities with active assets are returned. The default page size is 25, the maximum page size is 5,000. The total number of alternative fixes, page number, and total number of pages are available in the meta data. \r\n\r\nEach unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all fixes belonging to vulnerabilities with status=[\"open\"] and port=[\"443\", \"80\"] you will receive all fixes for open vulnerabilities that have either port 443 or port 80." }, "response": [] }, { "name": "Show Fix", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes", ":id" ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - The fix ID." } ] }, "description": "Returns information about a single fix by ID." }, "response": [] }, { "name": "List Fix Alternatives", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/fixes/:id/alternatives", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "fixes", ":id", "alternatives" ], "query": [ { "key": "page", "value": "int32", "description": "The specific page being requested from 1 to the total number of pages returned in the meta object.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "Number of Fixes per page. The default is 25 and the maximum page size is 100.", "disabled": true } ], "variable": [ { "key": "id", "value": "", "type": "string", "description": "int32 - The fix ID." } ] }, "description": "Returns a paginated list of a single fix's alternative fixes by a fix's ID. The default page size is 25, the maximum page size is 100. The total number of alternative fixes, page number, and total number of pages are available in the meta data." }, "response": [] } ] }, { "name": "Integrations", "item": [ { "name": "ServiceNow List Fixes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/integrations/service_now/fixes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "service_now", "fixes" ], "query": [ { "key": "page", "value": "int32", "description": "int32 - The specific page being requested from 1 to 20.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "int32 - Number of Asset Groups per page. The default is 30 and the maximum page size is 100.", "disabled": true } ] }, "description": "List fixes in a ServiceNow format. The default page size is 1,000, the maximum page size is 1,000. The total number of asset groups, page number, and total number of pages are available in the meta data. Note: The functionality of this ServiceNow fix endpoint is intended to be migrated in the future. Updates and instructions on new endpoint will be provided in advance of any migration." }, "response": [] } ] }, { "name": "ServiceNow Search Vulnerabilities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/integrations/service_now/vulnerabilities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "service_now", "vulnerabilites" ], "query": [ { "key": "classification[]", "value": "array of strings", "description": "array of strings - Find all vulnerabilities matching the specified classifications.", "disabled": true }, { "key": "page", "value": "int32", "description": "int32 - The page number starting from 1. Pages must be requested sequentially, in serial, for accurate results.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "int32 - The page size from 500 to 10,000. Default is 10,000.", "disabled": true }, { "key": "q", "value": "string", "description": "string - Additional text search parameters are documented in the Cisco Vulnerability Management Search Terms article on the help site (https://help.kennasecurity.com/hc/en-us/articles/206280593-Cisco-Vulnerability-Management-Search-Terms), in the section \"Vulnerability Terms\". Example q=tag:(mytag+AND+thetag).", "disabled": true }, { "key": "search_id", "value": "int32", "description": "int32 - The ID of a risk meter group to retrieve vulnerabilities for. Other parameters are ignored if search_id is provided.", "disabled": true } ] }, "description": "Filters vulnerabilities by a given set of parameters and returns the filtered vulnerabilities as well as the total number of vulnerabilities in the filtered set. The default page size is 10,000, the maximum page size is 10,000.\r\n\r\nBy default, only open vulnerabilities with active assets are returned. Each unique parameter is combined using AND while each of values passed in a single array will be combined using OR. For example, if you search for all vulnerabilities with status=[\"open\"] and classification[]=CVE you will receive all open vulnerabilities that have CVEs.\r\n\r\nNote: The functionality of this ServiceNow fix endpoint is intended to be migrated in the future. Updates and instructions on new endpoint will be provided in advance of any migration." }, "response": [] }, { "name": "Remediation Score", "item": [ { "name": "Show Remediation Score", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/reports/remediation_score", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "reports", "remediation_score" ] }, "description": "Returns Remediation Score, which is a measurement of how well an organization is addressing the risk on a group of assets. This is different than the Risk Score, which is not performance based, but the point-in-time level of risk on a group of assets. Remediation Score is calculated through four metrics on an organization's vulnerabilities (both open and closed) related to the organization's assets. The four metrics of a Remediation Score are: Coverage, Efficiency, Velocity, and Capacity. This API endpoint is a premium feature, depending on your subscription you may not have access." }, "response": [] } ] }, { "name": "SLA Adherence", "item": [ { "name": "Show SLA Adherence", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/reports/sla_adherences", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "reports", "sla_adherences" ] }, "description": "Returns Service Level Agreement (SLA) adherence metrics from up to the last 60 days. Note: If vulnerability metric (low, medium, high) does not have data, it will not be shown." }, "response": [] } ] }, { "name": "High Risk Vulnerability Densities", "item": [ { "name": "Show High Risk Vulnerability Densities", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/reports/vulnerability_densities", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "reports", "vulnerability_densities" ] }, "description": "Returns high risk vulnerability densities metrics, which are open high priority vulnerabilities by Kenna Risk score, grouped by asset priority buckets, from up to the last 180 days. The response will contain your metrics as well as your industry metrics. Note: If vulnerability densities metric (low, medium, critical) does not have data, it will not be shown." }, "response": [] } ] }, { "name": "Applications", "item": [ { "name": "List Applications", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications" ], "query": [ { "key": "page", "value": "int32", "description": "int32 - The specific page being requested.", "disabled": true }, { "key": "per_page", "value": "int32", "description": "int32 - Number of Applications per page. The default is 100 and the maximum page size is 100.", "disabled": true } ] }, "description": "Returns a list of all of your applications. The default page size is 100, and the maximum page size is 100." }, "response": [] }, { "name": "Show Application", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id" ], "query": [ { "key": "doc only>>", "value": "doc only>>", "description": "Response attribute\tDescription\nid\tThe unique identifier in Cisco Vulnerability Management\nname\tName of the application\nrepo_url\tURL of the repository for the application\nhost_name\tHost Name of the application\nowner\tOwner of the application\nteam_name\tTeam Name of the application\nbusiness_units\tBusiness Units of the application\nnotes\tNotes for the application\nrisk_meter_score\tRisk meter score of the application\nvulnerability_count\tNumber of vulnerabilities associated with an application\nasset_count\tNumber of assets associated with the application\ntotal_vulnerability_count\tNumber of vulnerabilities associated with an application including closed vulnerabilities and vulnerabilities on inactive assets\nopen_vulnerability_count_by_risk_level\tNumber of vulnerabilities open vulnerabilities separated by high risk, medium risk, low risk, and total\nidentifiers\tArray of identifiers for the application\nexternal_facing\tTrue if the application is external facing.\npriority\tPriority of application, on a scale of 1 (low) to 10 (high).", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - ID of application found in Cisco Vulnerability Management when selected" } ] }, "description": "Returns information about a single application by ID." }, "response": [] }, { "name": "Update Application", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"application\": {\r\n \"name\": \"Demo Test 12\",\r\n \"repo_url\": \"Demo repo URL\",\r\n \"host_name\": \"Demo host name\",\r\n \"owner\": \"Demo owner\",\r\n \"team_name\": \"Demo team\",\r\n \"business_units\": \"Demo business units\",\r\n \"notes\": \"Demo notes\",\r\n \"priority\": 10,\r\n \"identifiers\": [\r\n \"demo2\",\"demo3\"\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/applications/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id" ], "query": [ { "key": "{{id}} - ** updated in path above or variable", "value": "int32", "description": "int32 - id of application found in Cisco Vulnerability Management when selected", "disabled": true }, { "key": "**Items to be updated in Body Tab", "value": "doc only>>", "description": "application\nobject\n\nbusiness_units\nstring\nBusiness units for the application\n\nexternal_facing\nboolean\nSet this to true if your application is external facing\n\n\ntrue\nidentifiers\narray of strings\nArray of identifiers for the application\n\nidentifiers\n\nhost_name\nstring\nName of the host where the application is deployed\n\nname\nstring\nName of the application\n\nnotes\nstring\nAny notes regarding the application\n\nowner\nstring\nName of the application owner\n\npriority\nint32\nThe priority of your application, on a scale of 1 (low priority) to 10 (high priority).\n\n10\nrepo_url\nstring\nURL to the code repository for the application\n\nteam_name\nstring\nName of the team responsible for the application\n\n", "disabled": true } ], "variable": [ { "key": "id", "value": "245134", "type": "string" } ] }, "description": "Update a single application's attributes by ID." }, "response": [] }, { "name": "Delete Application", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - ID of application found in Cisco Vulnerability Management when selected" } ] }, "description": "Delete an application using its ID." }, "response": [] }, { "name": "Create Application", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"application\": {\r\n \"name\": \"Demo app\",\r\n \"repo_url\": \"Demo repo URL\",\r\n \"host_name\": \"Demo host name\",\r\n \"owner\": \"Demo owner\",\r\n \"team_name\": \"Demo team\",\r\n \"business_units\": \"Demo business units\",\r\n \"notes\": \"Demo notes\",\r\n \"priority\": 10,\r\n \"identifiers\": [\r\n \"WA-123\"\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/applications", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications" ], "query": [ { "key": "**Items to be updated in Body Tab", "value": "doc only>>", "description": "application\nobject\n\nbusiness_units\nstring\nBusiness units for the application\n\nexternal_facing\nboolean\nSet this to true if your application is external facing.\n\n\ntrue\nidentifiers\narray of strings\nArray of identifiers for the application\n\nidentifiers\n\nhost_name\nstring\nName of the host where the application is deployed\n\nname\nstring\nName of the application\n\nnotes\nstring\nAny notes regarding the application\n\nowner\nstring\nName of the application owner\n\npriority\nint32\nThe priority of your application, on a scale of 1 (low priority) to 10 (high priority).\n\n10\nrepo_url\nstring\nURL to the code repository for the application\n\nteam_name\nstring\nName of the team responsible for the application\n\n", "disabled": true } ] }, "description": "Creates a single Application and returns the record." }, "response": [] } ] }, { "name": "Application Reporting", "item": [ { "name": "Historical Mean Time To Remediate Findings by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id/report_query/findings/historical_mean_time_to_remediate_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id", "report_query", "historical_mean_time_to_remediate_by_risk_level" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Cisco Vulnerability Management when selected." } ] }, "description": "Returns a list of the Mean Time To Remediate (MTTR) findings in days based on the Risk Level for the provided Asset Group ID." }, "response": [] }, { "name": "Historical Mean Time To Remediate Vulnerabilities by Risk Level", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id/report_query/historical_mean_time_to_remediate_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id", "report_query", "historical_mean_time_to_remediate_by_risk_level" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Cisco Vulnerability Management when selected." } ] }, "description": "Returns a list of the historical Mean Time To Remediate (MTTR) vulnerabilities by Risk Level for the application ID provided." }, "response": [] }, { "name": "Historical Vulnerability Risk Category Counts", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/applications/:id/report_query/historical_open_vulnerability_count_by_risk_level", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "applications", ":id", "report_query", "historical_open_vulnerability_count_by_risk_level" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Cisco Vulnerability Management when selected." } ] }, "description": "Returns a list of the historical Vulnerability Risk Category (\"High\", \"Medium\", \"Low\") counts for the Application ID provided. This endpoint returns \"all time\" data for the specified Application. The return data is in floating point, for example, 16.0." }, "response": [] } ] }, { "name": "Dashboard Groups", "item": [ { "name": "Create Dashboard Group", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups" ], "query": [ { "key": "**Update in Body Tab", "value": "**Doc Only -->>", "description": "dashboard_group\nobject\n\nasset_search_ids\narray of integers\nasset_search_ids\n\nasset_search_order\nstring\nname\nstring\nrole_ids\narray of integers\nCan only be updated by the creator of the Dashboard Group\n\nrole_ids\n\nshare_method\nstring\nCan only be updated by the creator of the Dashboard Group", "disabled": true } ] }, "description": "Creates a single Dashboard Group and returns the record." }, "response": [] }, { "name": "Update Dashboard Group", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups", ":id" ], "query": [ { "key": "**Update in Body Tab", "value": "**Doc Only -->>", "description": "dashboard_group\nobject\n\nasset_search_ids\narray of integers\nasset_search_ids\n\nasset_search_order\nstring\nname\nstring\nrole_ids\narray of integers\nCan only be updated by the creator of the Dashboard Group\n\nrole_ids\n\nshare_method\nstring\nCan only be updated by the creator of the Dashboard Group", "disabled": true } ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - id of application found in Kenna when selected" } ] }, "description": "Update a single Dashboard Group's attributes by ID. Only the creator of a Dashboard Group can edit its Role IDs or Share Method." }, "response": [] }, { "name": "Show Dashboard Group", "protocolProfileBehavior": { "disableBodyPruning": true }, "request": { "method": "GET", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups", ":id" ], "variable": [ { "key": "id", "value": "int32", "type": "string", "description": "int32 - ID of dashboard group found in Cisco Vulnerabilty Management when selected." } ] }, "description": "Return information about a single Dashboard Group by ID." }, "response": [] }, { "name": "List Dashboard Groups", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/dashboard_groups", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups" ] }, "description": "Returns a list of all of your Dashboard Groups." }, "response": [] }, { "name": "Delete Dashboard Group", "request": { "method": "DELETE", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"dashboard_group\": {\r\n \"name\": \"api test 1\",\r\n \"asset_search_ids\": [\r\n 112112\r\n ],\r\n \"share_method\": \"roles\",\r\n \"role_ids\": [\r\n 12014\r\n ]\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/dashboard_groups/:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "dashboard_groups", ":id" ], "variable": [ { "key": "id", "value": "int32", "description": "int32 - id of dashboard group found in Cisco Vulnerability Management when selected." } ] }, "description": "Delete a Dashboard Group using a given ID." }, "response": [] } ] }, { "name": "Data Export", "item": [ { "name": "Assets", "item": [ { "name": "Request Data Export - Vulnerable Active Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"asset\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] } }, "response": [] }, { "name": "RDE - All Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\n \"status\": [\n \"inactive\",\n \"active\"\n ],\n \"exclude_child_filter\" : [\n \"include all assets\"\n ],\n \"export_settings\" : {\n \"format\": \"json\",\n \"model\": \"asset\"\n }\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ] } }, "response": [] }, { "name": "RDE - Inactive Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\n \"status\": [\n \"inactive\"\n ],\n \"export_settings\" : {\n \"format\": \"json\",\n \"model\": \"asset\"\n }\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ] } }, "response": [] }, { "name": "RDE - Assets Updated in Last Two Weeks", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\n \"status\": [\n \"inactive\",\n \"active\"\n ],\n \"exclude_child_filter\" : [\n \"include all assets\"\n ],\n \"records_updated_since\": \"now-2w\",\n \"export_settings\" : {\n \"format\": \"json\",\n \"model\": \"asset\"\n }\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ] } }, "response": [] } ] }, { "name": "Vulnerabilities", "item": [ { "name": "Request Data Export - Open Vulnerabilities on Active Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"],\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "Filters client data by a given set of parameters the exact same way the search endpoints do. The request is processed in the background.\r\n\r\nUser must specify the format of the data, including the model type (\"asset\", \"vulnerability\", or \"fix\"), and data format (\"json\", \"xml\"). Due to the async nature of the request, a search_id is returned which can be used to get the results of the search once the processing of the request is complete. Search IDs are valid for 30 days after the initial request is made.\r\n\r\nFor a full list of query parameters to search by, see the search parameter section for your chosen model type." }, "response": [] }, { "name": "Request Data Export - All Vulnerabilities on All Assets", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"asset\":{\r\n \"status\":[\r\n \"active\",\r\n \"inactive\"\r\n ]\r\n },\r\n \"status\" : [\r\n \"open\",\r\n \"closed\",\r\n \"risk accepted\",\r\n \"false positive\"\r\n ],\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "Filters client data by a given set of parameters the exact same way the search endpoints do. The request is processed in the background.\r\n\r\nUser must specify the format of the data, including the model type (\"asset\", \"vulnerability\", or \"fix\"), and data format (\"json\", \"xml\"). Due to the async nature of the request, a search_id is returned which can be used to get the results of the search once the processing of the request is complete. Search IDs are valid for 30 days after the initial request is made.\r\n\r\nFor a full list of query parameters to search by, see the search parameter section for your chosen model type." }, "response": [] }, { "name": "Request Data Export - Vulneabilities by Risk Meter ID", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"], \r\n \"search_id\" : \"252539\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] } }, "response": [] }, { "name": "Request Data Export - Vulnerabilities by Vulnerability ID", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"q\":\"vulnerability_id:*1\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "Filters client data by a given set of parameters the exact same way the search endpoints do. The request is processed in the background.\r\n\r\nUser must specify the format of the data, including the model type (\"asset\", \"vulnerability\", or \"fix\"), and data format (\"json\", \"xml\"). Due to the async nature of the request, a search_id is returned which can be used to get the results of the search once the processing of the request is complete. Search IDs are valid for 30 days after the initial request is made.\r\n\r\nFor a full list of query parameters to search by, see the search parameter section for your chosen model type." }, "response": [] }, { "name": "Request Data Export - Vulnerabilities Updated In Last Two Weeks", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"],\r\n \"records_updated_since\" : \"now-2w\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "This endpoint also takes the records_updated_since\r\nparameter to support incremental exports. It will fetch all records updated since that time. This can be added to both asset and vulnerabilities and will work with an offset(\u2018-2d\u2019) or a timestamp(2020-09-09 00:00:00\r\n)\r\nNote: This value is tied to last_indexed_at which means that if your data was reindexed you would get the full data set in the next pull" }, "response": [] }, { "name": "Request Data Export - Vulnerabilities Updated After Timestamp", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"status\" : [\"open\"],\r\n \"records_updated_since\" : \"2020-12-01 00:00:00\",\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"vulnerability\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] }, "description": "This endpoint also takes the records_updated_since\r\nparameter to support incremental exports. It will fetch all records updated since that time. This can be added to both asset and vulnerabilities and will work with an offset(\u2018-2d\u2019) or a timestamp(2020-09-09 00:00:00\r\n)\r\nNote: This value is tied to last_indexed_at which means that if your data was reindexed you would get the full data set in the next pull" }, "response": [] } ] }, { "name": "Fixes", "item": [ { "name": "Request Data Export - Fixes", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"export_settings\" : {\r\n \"format\": \"json\",\r\n \"model\": \"fix\"\r\n }\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://{{API_URL}}/data_exports", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "**Update in Body Tab", "value": "See doc in Postman above for this call", "disabled": true } ] } }, "response": [] } ] }, { "name": "Retrieve Data Export", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/data_exports?search_id=int32", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports" ], "query": [ { "key": "search_id", "value": "int32", "description": "An ID returned by Request Data Export that identifies the data_export to be retrieved." } ] }, "description": "Get all results from a previously created export using the search_id returned in the Request Data Export API response.\r\n\r\nThe response is gzipped and the content of the response data is determined by the model field in export_settings in the Request Data Export API body parameters. Usually, the response is stored in a file and gzipped.\r\n\r\nIf your search has not been completed you will receive an Export Incomplete Response to indicate that we are still processing your search results.The response example shows an uncompressed response for asset exports; whereas, the response schema shows the options of returning asset, fix, or vulnerability information in its uncompressed format. For more details, refer to Downloading Export Files guide, \"Acquiring the Download File\" section." }, "response": [] }, { "name": "Check Data Export Status", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/data_exports/status?search_id=int32", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports", "status" ], "query": [ { "key": "search_id", "value": "int32", "description": "An ID returned by Request Data Export that identifies the data_export." } ] }, "description": "Get the status message from a previously created asynchronous search using the search_id. The following messages are currently returned with the appropriate HTTP response status code: 200: Export ready for download, 206: The export is currently enqueued. Try again later, 206: The export is currently processing. Try again later, 404: No search found, 410: The search has expired and is no longer available, and 500: There was an error getting your search data. Please contact tech support for more details.\r\n\r\nError handling in client code should be based on the HTTP status code." }, "response": [] }, { "name": "Kill Running Data Export", "request": { "method": "PUT", "header": [], "url": { "raw": "https://{{API_URL}}/data_exports/kill?export_id=int32", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "data_exports", "kill" ], "query": [ { "key": "export_id", "value": "int32", "description": "The search_id returned by Request Data Export that identifies the data_export to terminate." } ] }, "description": "Kill a running export by specifying the export ID. The following messages are currently returned with the appropriate HTTP response status code: 200: Terminating client data export, 400: Export not found, 400: Cannot kill an already cancelled, failed, or completed export, and 500: There was an error while killing the export. Please contact tech support for more details." }, "response": [] } ] }, { "name": "Entitlements", "item": [ { "name": "Get Overage Status", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/entitlements/overage", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "overage" ], "query": [ { "key": "doc only>>", "value": "doc only>>", "description": "Response attribute\noverage_status\tIndicates if the client is in overage.", "disabled": true } ] }, "description": "Returns the client entitlements overage status." }, "response": [] } ] }, { "name": "Vulnerability Intelligene+", "item": [ { "name": "Show Vulnerability Definition", "event": [ { "listen": "test", "script": { "exec": [ "var template = `\r", "\r", "
\r", "\r", "\r", "\r", "`;\r", "\r", "\r", "// In case you only want a specific property, change it here.\r", "//\r", "// Default: You can set the entire JSON response using pm.response.json()\r", "let tableProps = {\r", " json: pm.response.json()\r", "};\r", "\r", "pm.visualizer.set(template, tableProps);" ], "type": "text/javascript" } } ], "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/:cve_id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", ":cve_id" ], "query": [ { "key": "fields", "value": "string", "description": "string\nComma delimited list of optional fields for the result set that can be returned.The cve_id value is always returned regardless whether it is added to \"fields\". The following is a list of available fields:exploits, fixes, threat_actors, created_at, daily_trend, predicted_exploitable, predicted_exploitable_confidence, successful_exploitations, velocity_day, velocity_month, velocity_week, cve_id, cvss_score, cvss_exploit_subscore, cvss_impact_subscore, cvss_vector, cvss_temporal_score, cvss_v3_score, cvss_v3_exploit_subscore, cvss_v3_impact_subscore, cvss_v3_vector, cvss_v3_temporal_score, last_modified, published, vulnerable_products, state, id, cve_description, cvss_access_complexity, cvss_access_vector, cvss_authentication, description, risk_meter_score, cvss_availability_impact, cvss_confidentiality_impact, cvss_integrity_impact, easily_exploitable, malware_exploitable, active_internet_breach, malware_count, chatter_count, popular_target, remote_code_execution, pre_nvd_chatter.", "disabled": true } ], "variable": [ { "key": "cve_id", "value": "cve-2014-3566", "type": "string", "description": "string - A CVE in the form of CVE-YYYY-nnnnn." } ] }, "description": "Returns a single vulnerability definition by CVE ID." }, "response": [] }, { "name": "List CVE Identifiers", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/cve_identifiers", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "cve_identifiers" ], "query": [ { "key": "updated_since", "value": "string", "description": "string\nA datetime (as an ISO-8601 timestamp) filtering the returned CVE IDs. Only CVEs created or updated after the timestamp are returned." }, { "key": "minimal_risk_score", "value": "number", "description": "number\nA number filtering the returned CVE IDs. Only CVEs that have risk meter score equal or higher than the specified minimal_risk_score are returned." }, { "key": "active_internet_breach", "value": "boolean", "description": "boolean\nA boolean filtering the returned CVE IDs. If active_internet_breach is true, only CVE IDs with active internet breach are returned. Likewise, if active_internet_breach is false, only CVE IDs without active internet breach are returned." }, { "key": "rce", "value": "boolean", "description": "boolean\nA boolean filtering the returned CVE IDs. RCE is remote code execution. If RCE is true, only CVE IDs with RCE are returned.Likewise, if RCE is false, only CVE IDs without RCE are returned." }, { "key": "easily_exploitable", "value": "boolean", "description": "boolean\nA boolean filtering the returned CVE IDs. If easily_exploitable is true, only easily exploitable CVE IDs are returned.Likewise, if easily_exploitable is false, only CVE IDs that is not easily_exploitable are returned." } ] }, "description": "Returns all known CVE IDs." }, "response": [] }, { "name": "Search for Vulnerability Definitions", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/search", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "search" ], "query": [ { "key": "qids", "value": "string", "description": "string\nA comma separated list of Qualys vulnerability QIDs." }, { "key": "rce", "value": "boolean", "description": "boolean\nRCE is remote code execution. If RCE is true, only vulnerability definitions with true RCE are returned, similarly, if RCE is false, only vulnerability definitions with false RCE are returned. If RCE is not specified, all vulnerability definitions are returned." }, { "key": "state", "value": "string", "description": "string\nCVE state filter. If \"state\" filter is not provided, CVEs with all states are returned." } ] }, "description": "Returns vulnerability definitions that match given search criteria for only Qualys customers." }, "response": [] }, { "name": "Get Vulnerability Trends", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/trends", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "trends" ], "query": [ { "key": "trend", "value": "string", "description": "string\nThe type of the trend." }, { "key": "sort_by", "value": "string", "description": "string\nSorting option: day, week, or month." } ] }, "description": "Returns top 20 Vulnerability Trends defined by the `trend` and `sort_by` parameters. For example: \r\n\r\n1. Requesting with `trend=risk_score` and `sort_by=week` will return the top 20 Vulnerabilities that had the most `risk_score` difference changes in the last week. \r\n\r\n2. Requesting with `trend=chatter` and `sort_by=month` will return the top 20 Vulnerabilites that had the most chatter (mentions all over the internet) over the last month" }, "response": [] }, { "name": "List Vulnerability Definitions", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions" ], "query": [ { "key": "cves", "value": "string", "description": "Comma-delimited list of CVE identifiers. Maximum number of CVEs specified is 600." }, { "key": "fields", "value": "string", "description": "Comma delimited list of optional fields for the result set that can be returned.The cve_id value is always returned regardless whether it is added to \"fields\". The following is a list of available fields:exploits, fixes, threat_actors, created_at, daily_trend, predicted_exploitable, predicted_exploitable_confidence, successful_exploitations, velocity_day, velocity_month, velocity_week, cve_id, cvss_score, cvss_exploit_subscore, cvss_impact_subscore, cvss_vector, cvss_temporal_score, cvss_v3_score, cvss_v3_exploit_subscore, cvss_v3_impact_subscore, cvss_v3_vector, cvss_v3_temporal_score, last_modified, published, vulnerable_products, state, id, cve_description, cvss_access_complexity, cvss_access_vector, cvss_authentication, description, risk_meter_score, cvss_availability_impact, cvss_confidentiality_impact, cvss_integrity_impact, easily_exploitable, malware_exploitable, active_internet_breach, malware_count, chatter_count, popular_target, remote_code_execution, pre_nvd_chatter." }, { "key": "rce", "value": "boolean", "description": "RCE is remote code execution. If RCE is true, only vulnerability definitions with true RCE are returned, similarly, if RCE is false, only vulnerability definitions with false RCE are returned. If RCE is not specified, all vulnerability definitions are returned." }, { "key": "state", "value": "string", "description": "CVE state filter. If \"state\" filter is not provided, CVEs with all states are returned." } ] }, "description": "Return one or more vulnerability definitions by CVE ID." }, "response": [] }, { "name": "Vulnerability Definitions With Significant Score Changes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/with_significant_score_changes", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "with_significant_score_changes" ], "query": [ { "key": "fields", "value": "string", "description": "Comma delimited list of optional fields for the result set that can be returned. The cve_id, realtime_score, and risk_meter_score values are always returned regardless whether it is added to \"fields\". The following is a list of available fields: exploits, fixes, threat_actors, created_at, daily_trend, predicted_exploitable, predicted_exploitable_confidence, successful_exploitations, velocity_day, velocity_month, velocity_week, cve_id, cvss_score, cvss_exploit_subscore, cvss_impact_subscore, cvss_vector, cvss_temporal_score, cvss_v3_score, cvss_v3_exploit_subscore, cvss_v3_impact_subscore, cvss_v3_vector, cvss_v3_temporal_score, last_modified, published, vulnerable_products, state, id, cve_description, cvss_access_complexity, cvss_access_vector, cvss_authentication, description, risk_meter_score, cvss_availability_impact, cvss_confidentiality_impact, cvss_integrity_impact, easily_exploitable, malware_exploitable, active_internet_breach, malware_count, chatter_count, popular_target, remote_code_execution, pre_nvd_chatter.." }, { "key": "rce", "value": "boolean", "description": "RCE is remote code execution. If RCE is true, only vulnerability definitions with true RCE are returned, similarly, if RCE is false, only vulnerability definitions with false RCE are returned. If RCE is not specified, all vulnerability definitions are returned" }, { "key": "state", "value": "string", "description": "CVE state filter. If \"state\" filter is not provided, CVEs with all states are returned." } ] }, "description": "Returns vulnerability definitions with significant score changes (more than 1 point of change up or down) by CVE ID. An empty array is returned if there are no vulnerability defintions with significant score changes.The `realtime_score` field is included and reflects the current score change, which can be compared to the less frequently more stable `risk_meter_score` field." }, "response": [] }, { "name": "Show Chatter Data", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/:cve_id/chatter", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", ":cve_id", "chatter" ], "variable": [ { "key": "cve_id", "value": "cve-2019-0708", "type": "string", "description": "A CVE in the form of CVE-YYYY-nnnnn." } ] }, "description": "Cisco Vulnerability Management defines chatter as anytime a given vulnerability is mentioned anywhere on the Internet including the dark web. Returns chatter information for a single vulnerability definition specified by CVE ID." }, "response": [] }, { "name": "Show Malware Hashes", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/:cve_id/malware", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", ":cve_id", "malware" ], "variable": [ { "key": "cve_id", "value": "cve-2019-0708", "type": "string", "description": "A CVE in the form of CVE-YYYY-nnnnn." } ] }, "description": "Returns a list of known malware hashes (MD5, SHA1 and SHA256) for a single vulnerability definition by CVE ID." }, "response": [] }, { "name": "Download VI+ Data Snapshot File", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/vulnerability_definitions/vi_data_snapshot", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "vulnerability_definitions", "vi_data_snapshot" ] }, "description": "Provides the location to obtain the download of the VI+ data snapshot.\r\n\rA HTTP 302 status code indicates redirection and to use the URL value of the Locaton key in the HTTP response header in a HTTP GET. The response of the HTTP GET will return gzip data. \r\n\rHowever some libraries and applications due to options or default behavior, perform the redirect and return a HTTP 200 status code along with gzipped response data. \r\n\rNo matter which way the gzipped data is obtained, it is the responsibility of the client to ungzip the response data. The unzipped data is in the JSONL format. \r\n\rThe response schema and example shows one line of ungzipped data in JSONL format." }, "response": [] }, { "name": "Get All CVEs", "request": { "method": "GET", "header": [], "url": { "raw": "https://services.nvd.nist.gov/rest/json/cves/1.0", "protocol": "https", "host": [ "services", "nvd", "nist", "gov" ], "path": [ "rest", "json", "cves", "1.0" ] } }, "response": [] }, { "name": "Search CVEs", "request": { "method": "GET", "header": [], "url": { "raw": "https://services.nvd.nist.gov/rest/json/cves/1.0?keyword=Java", "protocol": "https", "host": [ "services", "nvd", "nist", "gov" ], "path": [ "rest", "json", "cves", "1.0" ], "query": [ { "key": "keyword", "value": "Java" }, { "key": "StartIndex", "value": null, "disabled": true }, { "key": "resultsPerPage", "value": null, "disabled": true }, { "key": "pubStartDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "pubEndDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "modStartDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "modEndDate", "value": null, "description": "yyyy-MM-dd'T'HH:mm:ss:SSS z", "disabled": true }, { "key": "includeMatchStringChange", "value": null, "disabled": true }, { "key": "isExactMatch", "value": null, "disabled": true }, { "key": "cweld", "value": null, "disabled": true }, { "key": "cvssV2Severity", "value": null, "disabled": true }, { "key": "cvssV3Severity", "value": null, "disabled": true }, { "key": "cvssV2Metrics", "value": null, "disabled": true }, { "key": "cvssV3Metrics", "value": null, "disabled": true }, { "key": "cpeMatchString", "value": "cpe:2.3:o:microsoft:windows_10", "description": "(check for CPE syntax)", "disabled": true }, { "key": "addOns", "value": null, "disabled": true } ] }, "description": "https://csrc.nist.gov/CSRC/media/Projects/National-Vulnerability-Database/documents/web%20service%20documentation/Automation%20Support%20for%20CVE%20Retrieval.pdf" }, "response": [] } ], "auth": { "type": "noauth" } }, { "name": "CVEs", "item": [ { "name": "Show CVE History", "event": [ { "listen": "test", "script": { "exec": [ "// Access the response data JSON as a JavaScript object\r", "const res = pm.response.json();\r", "\r", "// -----------------------------\r", "// - Structure data for charts -\r", "// -----------------------------\r", "\r", "// EDIT THIS OBJECT TO BIND YOUR DATA\r", "const vizData = {\r", " \r", " // Labels take an array of strings\r", " labels: _.map(Object.values(res.CVE-2019-0708), 'changed_at')\r", " \r", " // Data takes an array of numbers\r", " data: _.map(Object.values(res.CVE-2019-0708), 'to')\r", "};\r", "\r", "// ------------\r", "// - Template -\r", "// ------------\r", "\r", "// Configure the template\r", "var template = `\r", "\r", "\r", " \r", "\r", "`;\r", "\r", "// -------------------------\r", "// - Bind data to template -\r", "// -------------------------\r", "\r", "// Set the visualizer template\r", "pm.visualizer.set(template, vizData);" ], "type": "text/javascript" } } ], "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/audit_logs", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "audit_logs" ], "query": [ { "key": "cves", "value": "string", "description": "Comma-delimited list of CVE identifiers. The maximum number of CVEs per request is 250.." } ] }, "description": "Returns Cisco Vulnerability Management's CVE score history for one or more CVE identifiers. Customers who have purchased the Vulnerability Intelligence+ API may access any CVE. Customers who have not purchased Vulnerability Intelligence+ API may only access CVEs that correspond to vulnerabilities within their instance." }, "response": [] } ] }, { "name": "Audit Log Search", "item": [ { "name": "Audit Log Search", "request": { "method": "GET", "header": [], "url": { "raw": "https://{{API_URL}}/audit_logs", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "audit_logs" ], "query": [ { "key": "start_date", "value": "string", "description": "The start date of the period you want to receive audit logs from. Must be less than or equal to end_date. This is a required field. The format is 'YYYY-MM-DD'." }, { "key": "end_date", "value": "string", "description": "The end date of the period you want to receive audit logs from. Must be greater than or equal to start_date. The date must be a full day before the current date. This is a required field. The format is 'YYYY-MM-DD'." } ] }, "description": "Returns a compressed (gzip) JSON lines file with all entries for the specified date range. If there are no audit logs for the specified period, the returned file will have no content. The date is in an ISO-8601 format. Only the day portion (YYYY-MM-DD) is used for both start_date and end_date." }, "response": [] } ] }, { "name": "Findings", "item": [ { "name": "Search Findings", "request": { "method": "GET", "header": [ { "key": "X-Risk-Token", "value": "", "disabled": true }, { "key": "Content-type", "value": "application/json" } ], "url": { "raw": "https://api.kennasecurity.com/findings?status[]=in_progress&status[]=resolved&sort_by=found_on&sort_direction=desc", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings" ], "query": [ { "key": "status[]", "value": "array of strings", "description": "array of strings\nAn array of statuses. Default: [open, in_progress, new, triaged].\n\n", "disabled": true }, { "key": "identifier[]", "value": "array of strings", "description": "array of strings\nAn array of CVE, CWE, or WASCs. Example: [CWE-242, CVE=2020-9524].\n\n", "disabled": true }, { "key": "id[]", "value": "array of integers", "description": "array of integers\nArray of finding IDs.\n\n", "disabled": true }, { "key": "page", "value": "integer", "description": "integer\nThe specific page being requested from 1 to the total number of pages returned in the meta object.\n\n", "disabled": true }, { "key": "per_page", "value": "integer", "description": "integer\nThe number of findings being requested for the current page. The default page size is 100. Any other page size will return an error.\n\n", "disabled": true }, { "key": "sort_by", "value": "string", "description": "string\nThe results will be sorted by this field. Default: score.\n\n", "disabled": true }, { "key": "sort_direction", "value": "string", "description": "string\nThe sort direction of the field specified in \"sort_by\". Default: desc.\n\n", "disabled": true }, { "key": "earliest_closed_at", "value": "string", "description": "string\nSearches for findings with a 'closed at' on or after a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "latest_closed_at", "value": "string", "description": "string\nSearches for findings with a 'closed_at' on or before a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "earliest_due_date", "value": "string", "description": "string\nSearches for findings with a 'due_date' on or after a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "latest_due_date", "value": "string", "description": "string\nSearches for findings with a 'due_date' on or before a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "earliest_last_found_on", "value": "string", "description": "string\nSearches for findings with a 'last_found_on' on or after a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "latest_last_found_on", "value": "string", "description": "string\nSearches for findings with a 'last_found_on' on or before a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "earliest_created_at", "value": "string", "description": "string\nSearches for findings with a 'created_at' on or after a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "latest_created_at", "value": "string", "description": "string\nSearches for findings with a 'created_at' on or before a date in ISO 8601 format.\n\n", "disabled": true }, { "key": "earliest_updated_at", "value": "string", "description": "string\nSearches for findings with a 'updated_at' on or after a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "latest_updated_at", "value": "string", "description": "string\nSearches for findings with a 'updated_at' on or before a date in ISO-8601 format.\n\n", "disabled": true }, { "key": "min_score", "value": "integer", "description": "integer\nSearches for findings with a 'score' greater than or equal to this value.\n\n", "disabled": true }, { "key": "max_score", "value": "integer", "description": "integer\nSearches for findings with a 'score' less than or equal to this value.\n\n", "disabled": true } ] }, "description": "Filters findings by a given set of parameters and returns the filtered findings as well as the total number of findings in the filtered set.\r\n\r\nIf no filters are specified, then \"Search Findings\" is \"List Findings\".\r\n\r\nEach unique parameter is combined using AND while each of the values passed in a single array will be combined using OR. For example, if you search for all findings with status=[\"new\", \"resolved\"] and sort_by=\"score\", you will receive all findings with either status \"new\" or \"resolved,\" sorted by score in the response.\r\n\r\nThe default page size is 100, the maximum page size is 100, and the maximum pages allowed is 2,000. The total number of asset groups, page number, and total number of pages are available in the meta data.\r\n\r\nTo avoid ambiguity with regards to dates, this endpoint accepts strings formatted according to a stricter version of ISO-8601: \"YYYY-MM-DDThh:mm:ss.sssTZD\". All fields besides nanoseconds and timezone are required. If time is omitted, UTC is used." }, "response": [] }, { "name": "Show Finding", "request": { "method": "GET", "header": [ { "key": "Content-type", "value": "application/json" } ], "url": { "raw": "https://api.kennasecurity.com/findings/:id", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings", ":id" ], "variable": [ { "key": "id", "value": "integer", "description": "ID of the finding in Cisco Vulnerability Management." } ] }, "description": "Returns a single finding by ID." }, "response": [] }, { "name": "Update Finding", "request": { "method": "PUT", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"finding\": {\r\n \"asset_id\": \"\",\r\n \"external_unique_id\": \"\",\r\n \"identifier\": \"\",\r\n \"closed_at\": \"\",\r\n \"due_date\": \"\",\r\n \"found_on\": \"\",\r\n \"last_found_on\": \"\",\r\n \"additional_fields\": \"\",\r\n \"remediation\": \"\",\r\n \"scanner_score\": \"\",\r\n \"status\": \"\"\r\n }\r\n}" }, "url": { "raw": "https://{{API_URL}}/findings:id", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "findings", ":id" ], "query": [ { "key": "**Update {{id}} below in path parm", "value": null, "disabled": true }, { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "asset_id", "value": "integer", "description": "integer\nThe ID of the Asset associated with the Finding.\n\n", "disabled": true }, { "key": "external_unique_id", "value": "string", "description": "string\nA unique ID, created by a Scanner or client.\n\n", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA CVE, CWE, or WASC. Example: CWE-242.", "disabled": true }, { "key": "closed_at", "value": "date-time", "description": "date-time\nWhen the Finding was closed. The status body parameter is required to have the status body parameter set to one of the valid closed status values: closed, duplicate, false_positive, resolved, and not_a_security_issue. This implies that both closed_at and status will be updated.", "disabled": true }, { "key": "due_date", "value": "date-time", "description": "date-time\nWhen the Finding should be fixed.", "disabled": true }, { "key": "found_on", "value": "date-time", "description": "date-time\nWhen the Finding was initially found.", "disabled": true }, { "key": "last_found_on", "value": "date-time", "description": "date-time\nWhen the Finding was last seen.", "disabled": true }, { "key": "additional_fields", "value": "object", "description": "object\nAny additional information you want associated with the Finding.", "disabled": true }, { "key": "remediation", "value": "string", "description": "string\nInstructions for remediating the Finding.", "disabled": true }, { "key": "scanner_score", "value": "float", "description": "float\nThe score provided by the Scanner.", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe new status of the Finding", "disabled": true } ] }, "description": "Update a single finding's attributes by ID. To avoid ambiguity with regards to dates, this endpoint accepts strings formatted according to a stricter version of ISO-8601: \"YYYY-MM-DDThh:mm:ss.sssZ\". All fields besides nanoseconds and timezone are required. If timezone is omitted, UTC is used." }, "response": [] }, { "name": "Bulk Delete Findings", "request": { "method": "DELETE", "header": [], "url": { "raw": "https://{{API_URL}}/findings/bulk_delete", "protocol": "https", "host": [ "{{API_URL}}" ], "path": [ "findings", "bulk_delete" ], "query": [ { "key": "finding_ids[]", "value": "array of integers", "description": "array of integers - An array of finding IDs to be deleted.", "disabled": true } ] }, "description": "Delete multiple findings at a time using the bulk delete endpoint. Delete limit is 2,000 findings at a time." }, "response": [] }, { "name": "Create Finding", "request": { "auth": { "type": "apikey", "apikey": [ { "key": "value", "value": "uJPSArehEUbWNDPeGBWggsUUvNUBdKG82vX6Pzt4C1s6451V36cRcYz6tqxcChUg", "type": "string" }, { "key": "key", "value": "X-Risk-Token", "type": "string" } ] }, "method": "POST", "header": [ { "key": "X-Risk-Token", "value": "" }, { "key": "Content-type", "value": "application/json" } ], "body": { "mode": "raw", "raw": "{\n \"finding\": {\n \"additional_fields\": {\n \"fields\": [\n { \"field_name\": \"foo\", \"value\": \"far\" },\n { \"field_name\": \"boo\", \"value\": \"bar\" }\n ]\n },\n \"asset_id\": 123,\n \"closed_at\": \"2020-06-16T17:50:33.000Z\",\n \"due_date\": \"2020-06-17\",\n \"external_unique_id\": \"3287238723\",\n \"found_on\": \"2020-06-11T15:25:43.000Z\",\n \"identifier\": \"CWE-242\",\n \"last_found_on\": \"2020-06-15T12:28:10.000Z\",\n \"prioritized\": true,\n \"remediation\": \"Fix me!\",\n \"scanner_score\": 67,\n \"status\": \"resolved\"\n }\n }" }, "url": { "raw": "https://api.kennasecurity.com/findings", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings", "id" ], "query": [ { "key": "**Update {{id}} below in path parm", "value": null, "disabled": true }, { "key": "**All parms below updated in Body", "value": "Items below for doc", "description": "**All parms updated in Body", "disabled": true }, { "key": "asset_id", "value": "integer", "description": "integer\nThe ID of the Asset associated with the Finding.\n\n", "disabled": true }, { "key": "external_unique_id", "value": "string", "description": "string\nA unique ID, created by a Scanner or client.\n\n", "disabled": true }, { "key": "identifier", "value": "string", "description": "string\nA CVE, CWE, or WASC. Example: CWE-242. Required if definition is not specified.\n\n", "disabled": true }, { "key": "definition", "value": "object", "description": "object\nRequired if identifier is not specified.\n\n", "disabled": true }, { "key": "closed_at", "value": "date-time", "description": "date-time\nWhen the Finding was closed. The status body parameter is required to have the status body parameter set to one of the valid closed status values: closed, duplicate, false_positive, resolved, and not_a_security_issue. This implies that both closed_at and status will be updated.\n\n", "disabled": true }, { "key": "due_date", "value": "date-time", "description": "date-time\nWhen the Finding should be fixed.\n\n", "disabled": true }, { "key": "found_on", "value": "date-time", "description": "date-time\nWhen the Finding was initially found.\n\n", "disabled": true }, { "key": "last_found_on", "value": "date-time", "description": "date-time\nWhen the Finding was last seen.\n\n", "disabled": true }, { "key": "additional_fields", "value": "object", "description": "object\nAny additional information you want associated with the Finding.\n\n", "disabled": true }, { "key": "remediation", "value": "string", "description": "string\nInstructions for remediating the Finding.\n\n", "disabled": true }, { "key": "scanner_score", "value": "float", "description": "float\nThe score provided by the Scanner.\n\n", "disabled": true }, { "key": "status", "value": "string", "description": "string\nThe current status of the Finding.\n\n", "disabled": true } ] }, "description": "Creates a single finding and returns the record.\r\n\r\nTo associate this Finding with a vulnerability definition, either identifier or definition is required. The identifier should be used when the Finding is associated with a known vulnerability: CVE, CWE, or WASC ID (e.g. \"CWE-242\"). However, certain scanners will not report a known vulnerability, in which case the definition can be used. The keys of definition are documented below, with scanner_identifier being minimally required.\r\n\r\nTo avoid ambiguity with regards to dates, this endpoint accepts strings formatted according to a stricter version of ISO-8601: \"YYYY-MM-DDThh:mm:ss.sssTZD\". All fields besides nanoseconds and timezone are required. If timezone is omitted, UTC is used." }, "response": [] }, { "name": "Create Finding Copy", "request": { "auth": { "type": "apikey", "apikey": [ { "key": "value", "value": "uJPSArehEUbWNDPeGBWggsUUvNUBdKG82vX6Pzt4C1s6451V36cRcYz6tqxcChUg", "type": "string" }, { "key": "key", "value": "X-Risk-Token", "type": "string" } ] }, "method": "POST", "header": [ { "key": "X-Risk-Token", "value": "" }, { "key": "Content-type", "value": "application/json" } ], "body": { "mode": "raw", "raw": "{\n \"finding\": {\n \"additional_fields\": {\n \"fields\": [\n { \"field_name\": \"foo\", \"value\": \"far\" },\n { \"field_name\": \"boo\", \"value\": \"bar\" }\n ]\n },\n \"asset_id\": 123,\n \"closed_at\": \"2020-06-16T17:50:33.000Z\",\n \"due_date\": \"2020-06-17\",\n \"external_unique_id\": \"3287238723\",\n \"found_on\": \"2020-06-11T15:25:43.000Z\",\n \"identifier\": \"CWE-242\",\n \"last_found_on\": \"2020-06-15T12:28:10.000Z\",\n \"prioritized\": true,\n \"remediation\": \"Fix me!\",\n \"scanner_score\": 67,\n \"status\": \"resolved\"\n }\n }" }, "url": { "raw": "https://api.kennasecurity.com/findings", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "findings" ] }, "description": "Creates a single finding and returns the record." }, "response": [] } ] }, { "name": "Inference", "item": [ { "name": "Inference for Microsoft Operating Systems", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"arch\":\"64-bit\",\r\n \"os_type\":\"WINDOWS\",\r\n \"os_name\":\"Microsoft Windows Server 2019 Standard\",\r\n \"os_version\":\"10.0.17763\"\r\n }", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://api.kennasecurity.com/vulnerability_definitions/os_inference", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "vulnerability_definitions", "os_inference" ] }, "description": "Returns a list of known vulnerabilities for a given Windows operating system version.\r\n\r\nRestricted Access: This API endpoint is a premium feature for select partners." }, "response": [] }, { "name": "Vulnerability Inference for Applications", "request": { "method": "POST", "header": [], "body": { "mode": "raw", "raw": "{\r\n \"arch\": \"64-bit\",\r\n \"os_type\": \"WINDOWS\",\r\n \"os_name\": \"Microsoft Windows Server 2008 R2 Standard \",\r\n \"os_version\": \"6.1.7601\",\r\n \"software\": [\r\n {\r\n \"checksum\": \"8a872ca3412e6ac3554036c6e4d9d6cf738420eec039e0bbc2d7ca61d6a4f9b6\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"Microsoft SQL Server\",\r\n \"version\": \"9.00.4035.00\"\r\n },\r\n {\r\n \"checksum\": \"8c572897b85b1acef2ec502c187e5d08806a625ad6a1093eeb27985cecf75c62\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"Malicious Software Removal Tool\",\r\n \"version\": \"5.81.16832.1\"\r\n },\r\n {\r\n \"checksum\": \"37c9f913da31fbaabb1c7357c5c2dc45b4644536cf8bcc7bf650b87cbfc2217a\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"AdmPwd.UI\",\r\n \"version\": \"6.2.0.0\"\r\n },\r\n {\r\n \"checksum\": \"4f15a985a94bfe2248067afaec6cfcedb79304e2103b0a9dc8fa7a03883e1fac\",\r\n \"vendor\": \"Microsoft Corporation\",\r\n \"product\": \"System Center Configuration Manager\",\r\n \"version\": \"5.1906.1035.1000\"\r\n }\r\n ]\r\n}", "options": { "raw": { "language": "json" } } }, "url": { "raw": "https://api.kennasecurity.com/vulnerability_definitions/app_inference", "protocol": "https", "host": [ "api", "kennasecurity", "com" ], "path": [ "vulnerability_definitions", "app_inference" ] }, "description": "Returns a list of known vulnerabilities for a given list of applications. Supported operating systems include CentOS, SUSE Linux Enterprise Server, Redhat Enterprise Linux, Ubuntu and Windows.\r\n\r\nRestricted Access: This API endpoint is a premium feature for select partners." }, "response": [] } ] } ], "auth": { "type": "apikey", "apikey": [ { "key": "value", "value": "", "type": "string" }, { "key": "key", "value": "X-Risk-Token", "type": "string" } ] }, "event": [ { "listen": "prerequest", "script": { "type": "text/javascript", "exec": [ "" ] } }, { "listen": "test", "script": { "type": "text/javascript", "exec": [ "" ] } } ], "variable": [ { "key": "API_URL", "value": "api.kennasecurity.com" } ] }