\n",
" Raw results from provider...
\n",
" {'accuracy_radius': 1000,
'area_code': 0,
'asn': 'AS15169 GOOGLE',
'base_indicator': {'access_reason': '',
'access_type': 'public',
'content': '',
'description': '',
'id': 3248081298,
'indicator': '35.233.62.116',
'title': '',
'type': 'IPv4'},
'charset': 0,
'city': 'Brussels',
'city_data': True,
'continent_code': 'EU',
'country_code': 'BE',
'country_code2': 'BE',
'country_code3': 'BEL',
'country_name': 'Belgium',
'dma_code': 0,
'false_positive': [],
'flag_title': 'Belgium',
'flag_url': '/assets/images/flags/be.png',
'indicator': '35.233.62.116',
'latitude': 50.8336,
'longitude': 4.3337,
'postal_code': '1060',
'pulse_info': {'count': 50,
'pulses': [{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '56464',
'is_following': False,
'is_subscribed': False,
'username': 'Kapppppa'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-02-16T13:14:16.945000',
'description': 'Logs of IP trying to hack into my '
'Particle Photon and Cloud Honeypot '
'instance',
'downvotes_count': 0,
'export_count': 2108,
'follower_count': 0,
'groups': [],
'id': '602bc528f447d628d41494f2',
'in_group': False,
'indicator_count': 4451,
'indicator_type_counts': {'IPv4': 4451},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:45:51.766000',
'modified_text': '1 minute ago ',
'name': \"Ka's Honeypot visitors\",
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 359,
'tags': ['SSH',
'scanner',
'attack',
'login',
'Telnet'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:20.835000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cfedf45bd67c2aafe44271',
'in_group': False,
'indicator_count': 17943,
'indicator_type_counts': {'IPv4': 17943},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:January 2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 124,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:22',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cfedf696392d4eedca0ae6',
'in_group': False,
'indicator_count': 17918,
'indicator_type_counts': {'IPv4': 17918},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 125,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:24.325000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61cfedf85b4abc76c011f453',
'in_group': False,
'indicator_count': 17918,
'indicator_type_counts': {'IPv4': 17918},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:January 2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 99,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:25.285000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 17,
'follower_count': 0,
'groups': [],
'id': '61cfedf9ba67254000a91c93',
'in_group': False,
'indicator_count': 17550,
'indicator_type_counts': {'IPv4': 17550},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 100,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-04T16:46:31.905000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61d479e7714fddc557101470',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T16:04:12.606000',
'modified_text': '23 hours ago ',
'name': 'Honeypot Hits (2022-01-04)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 11,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-04T08:00:03.749000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d3fe83ebf3c87d64b39bad',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T08:00:58.262000',
'modified_text': '1 day ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2022-01-03',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-04T08:05:07.645000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d3ffb30c742a0d8fe12464',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T08:00:58.262000',
'modified_text': '1 day ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-03',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 326,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_57320/resized/80/avatar_4894047112.png',
'id': '57320',
'is_following': False,
'is_subscribed': False,
'username': 'soothsayer'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-02-03T04:30:02.933000',
'description': 'Daily FTP honeypot logs from a '
'honeypot in the US on a /32',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61fb5a4b9aa2b0f20ef7cc1a',
'in_group': False,
'indicator_count': 11,
'indicator_type_counts': {'IPv4': 11},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T04:30:02.933000',
'modified_text': '1 day ago ',
'name': 'FTP - US Honeypot IoCs 2022-02-02',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['honeypot', 'ftp', 'dionaea'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-02-02T22:53:26.381000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61fb0b66db08fd622ea4a2bb',
'in_group': False,
'indicator_count': 389,
'indicator_type_counts': {'IPv4': 389},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-02T22:53:26.381000',
'modified_text': '1 day ago ',
'name': 'Honeypot Hits (2022-02-02)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 10,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T21:51:03.951000',
'description': 'For complete list please visit '
'https://apd.altervista.org/',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d0ccc7b49862d4b2032223',
'in_group': False,
'indicator_count': 24876,
'indicator_type_counts': {'FileHash-SHA1': 4600,
'FileHash-SHA256': 799,
'FilePath': 1866,
'Mutex': 1866,
'URI': 1866,
'URL': 11598,
'YARA': 1866,
'domain': 144,
'hostname': 271},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T21:02:01.450000',
'modified_text': '3 days ago ',
'name': 'IOCs - 2022111350',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 283,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T21:52:37.014000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61d0cd25889a9d71fa9e2d8f',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T21:02:01.450000',
'modified_text': '3 days ago ',
'name': 'IOCs - 2022111344 - ANIA Threat Feeds - '
'IP Segment 0',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T08:05:04.050000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d00b30a2ff64106748e6ee',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T08:02:48.505000',
'modified_text': '4 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2021-12-31',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2021-12-31/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-03-30T19:42:12.253000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 417,
'follower_count': 0,
'groups': [],
'id': '60637f141cda4877a64d0872',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 194,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-09-19T07:04:08.836000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 12,
'follower_count': 0,
'groups': [],
'id': '6146e0e8a6289a9c1b4cfcf7',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 126,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-01T06:00:33.090000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 3,
'follower_count': 0,
'groups': [],
'id': '61a70f813eceb582be551305',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:December 2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 131,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-01T06:00:41.128000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 6,
'follower_count': 0,
'groups': [],
'id': '61a70f8903f0b07629aa8abc',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:December 2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 108,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-31T13:38:40.637000',
'description': 'For complete list please visit '
'https://apd.altervista.org/',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cf07e0cbed41eee43c1ca0',
'in_group': False,
'indicator_count': 25182,
'indicator_type_counts': {'FileHash-SHA1': 4600,
'FileHash-SHA256': 799,
'FilePath': 1909,
'Mutex': 1909,
'URI': 1909,
'URL': 11689,
'YARA': 1909,
'domain': 168,
'hostname': 290},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-30T13:00:17.588000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20211231536',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 282,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-31T13:40:41.324000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cf0859fdb90e9d8c9f0499',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-30T13:00:17.588000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20211231531 - ANIA Threat Feeds - '
'IP Segment 0',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T22:01:52.364000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b950074eb942434abcb0',
'in_group': False,
'indicator_count': 44728,
'indicator_type_counts': {'IPv4': 44728},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T22:01:52.364000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291346 - ANIA Threat Feeds - '
'IP Segment 5',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T22:00:29.967000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b8fd4c36a01642d12427',
'in_group': False,
'indicator_count': 24164,
'indicator_type_counts': {'IPv4': 24164},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T22:00:29.967000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291346 - ANIA Threat Feeds - '
'IP Segment 4',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T21:59:10.696000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b8ae499e425c10eea05c',
'in_group': False,
'indicator_count': 11382,
'indicator_type_counts': {'IPv4': 11382},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T21:59:10.696000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291345 - ANIA Threat Feeds - '
'IP Segment 3',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T21:56:38.118000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b816ab1ca63a3f67712b',
'in_group': False,
'indicator_count': 20153,
'indicator_type_counts': {'IPv4': 20153},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T21:56:38.118000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291345 - ANIA Threat Feeds - '
'IP Segment 1',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T21:53:13.277000',
'description': 'For complete list please visit '
'https://apd.altervista.org/',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61f5b749e6036d825b4f9edc',
'in_group': False,
'indicator_count': 36147,
'indicator_type_counts': {'FileHash-SHA1': 4642,
'FileHash-SHA256': 798,
'FilePath': 1874,
'IPv4': 10811,
'Mutex': 1874,
'URI': 1874,
'URL': 11949,
'YARA': 1874,
'domain': 183,
'hostname': 268},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T21:53:13.277000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291350',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T15:23:09.965000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f55bddec75279b229bc2ac',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T15:23:09.965000',
'modified_text': '6 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-29',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1589,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T08:05:04.127000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f4f53016d337651b5394dd',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T08:05:04.127000',
'modified_text': '6 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-28',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-28/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-28T08:25:04.193000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f3a860ef11e9ebf1a1050f',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-28T08:25:04.193000',
'modified_text': '7 days ago ',
'name': 'AWS (India-Mumbai) MySQL Bruteforce Hosts '
'for 2022-01-27',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-27/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsindia',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['India'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-27T08:05:04',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f252304548dc8064a4f986',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-27T08:05:04',
'modified_text': '8 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-26',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-26/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-26T08:30:03.508000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f1068baee4a4355bbde6ce',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:30:03.508000',
'modified_text': '9 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2022-01-25',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awssafrica',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['South Africa'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-26T08:25:04.416000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f105608cc32b3345012340',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:25:04.416000',
'modified_text': '9 days ago ',
'name': 'AWS (India-Mumbai) MySQL Bruteforce Hosts '
'for 2022-01-25',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsindia',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['India'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-26T08:05:03.090000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f100afffd677be91942dd8',
'in_group': False,
'indicator_count': 4,
'indicator_type_counts': {'IPv4': 4},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:05:03.090000',
'modified_text': '9 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-25',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-27T08:00:04.235000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c972848947b7dbfcb208cf',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:01:32.111000',
'modified_text': '9 days ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2021-12-26',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2021-12-26/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-25T22:18:42.125000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f07742109a343981a1b0a2',
'in_group': False,
'indicator_count': 377,
'indicator_type_counts': {'IPv4': 377},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-25T22:18:42.125000',
'modified_text': '9 days ago ',
'name': 'Honeypot Hits (2022-01-25)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 10,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-24T15:27:47.967000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61eec573b5accbe9e60eec0c',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T15:27:47.967000',
'modified_text': '11 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-24',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1589,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-24T08:30:03.233000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ee638b110ea437afb2d346',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T08:30:03.233000',
'modified_text': '11 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2022-01-23',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awssafrica',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['South Africa'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-25T08:18:03.788000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c6d3bb5c6d6c0d303900b3',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T08:03:43.362000',
'modified_text': '11 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2021-12-24',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-24/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsjap',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Japan'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-24T08:00:03.763000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ee5c83666f5325de820492',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T08:00:03.763000',
'modified_text': '11 days ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2022-01-23',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-23T08:30:03.344000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ed120b42e71540c51cea4c',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-23T08:30:03.344000',
'modified_text': '12 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2022-01-22',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awssafrica',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['South Africa'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-23T08:05:04.665000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ed0c30c456b6ea442e1b36',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-23T08:05:04.665000',
'modified_text': '12 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-22',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_57320/resized/80/avatar_4894047112.png',
'id': '57320',
'is_following': False,
'is_subscribed': False,
'username': 'soothsayer'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-23T04:30:03.238000',
'description': 'Daily FTP honeypot logs from a '
'honeypot in the US on a /32',
'downvotes_count': 0,
'export_count': 2,
'follower_count': 0,
'groups': [],
'id': '61c3fb4b5b4bab294d29a270',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-22T04:02:39.300000',
'modified_text': '13 days ago ',
'name': 'FTP - US Honeypot IoCs 2021-12-22',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['honeypot', 'ftp', 'dionaea'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-20T15:20:48.487000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e97dd0cbdd6e55c2a5e055',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-20T15:20:48.487000',
'modified_text': '15 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-20',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1589,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-21T08:18:04.137000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c18dbca80aeab6ce03fa0a',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-20T08:01:38.562000',
'modified_text': '15 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2021-12-20',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-20/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsjap',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Japan'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-19T08:25:02.424000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e7cade1866c9786492ad1c',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-19T08:25:02.424000',
'modified_text': '16 days ago ',
'name': 'AWS (India-Mumbai) MySQL Bruteforce Hosts '
'for 2022-01-18',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-18/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsindia',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['India'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-20T08:18:03.636000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c03c3b4187f3fd4bbd3de1',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-19T08:00:41.410000',
'modified_text': '16 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2021-12-19',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-19/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsjap',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Japan'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-18T08:05:03.548000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e674afe3af42912e6870d5',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-18T08:05:03.548000',
'modified_text': '17 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-17',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-17/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-17T17:18:30.059000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61bcc6663863a6e361427735',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T17:02:36.654000',
'modified_text': '18 days ago ',
'name': 'Honeypot Hits (2021-12-17)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 10,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-16T15:25:04.817000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e438d03fce4c26a836a998',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T15:25:04.817000',
'modified_text': '19 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-16',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1590,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-16T08:00:04.033000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e3d08414aff53714bb0319',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T08:00:04.033000',
'modified_text': '19 days ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2022-01-15',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-15/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '83377',
'is_following': False,
'is_subscribed': False,
'username': 'projectopsec'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-17T00:05:06.286000',
'description': 'previous 24 hours activity from a '
'dionaea honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61bbd432c6d7af7d45cd570a',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T00:03:19.160000',
'modified_text': '19 days ago ',
'name': '2021-12-16 dionaea honeypot '
'353563f7-2182-4a0a-926f-8b2fd4403246',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 201,
'tags': ['honeypot', 'dionaea'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-16T08:20:03.164000',
'description': 'IPV4 Addresses of attackers port '
'scanning private honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61baf6b3f5f07bbc0a039c2e',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-15T08:05:31.677000',
'modified_text': '20 days ago ',
'name': 'nmap Scanning Hosts for 2021-12-15',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/bruteforce-files-list-2021-12-15/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['nmap', 'port-scan', 'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0}],
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-20/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2021-12-31/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au/bruteforce-files-list-2021-12-15/',
'https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-18/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2021-12-26/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-17/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-15/',
'https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-27/',
'https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-19/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-26/',
'https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-24/',
'https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-28/',
'https://jamesbrine.com.au'],
'related': {'alienvault': {'adversary': [],
'industries': [],
'malware_families': []},
'other': {'adversary': [],
'industries': [],
'malware_families': []}}},
'region': 'BRU',
'reputation': 0,
'sections': ['general',
'geo',
'reputation',
'url_list',
'passive_dns',
'malware',
'nids_list',
'http_scans'],
'subdivision': 'BRU',
'type': 'IPv4',
'type_title': 'IPv4',
'validation': [{'message': 'In cloud provider range: provider=google',
'name': 'Cloud Provider IP range',
'source': 'cloud'}],
'whois': 'http://whois.domaintools.com/35.233.62.116'}
\n",
" \n",
"