{ "cells": [ { "cell_type": "markdown", "metadata": {}, "source": [ "# Analyzing publicly exposed AWS S3 Honey Bucket Logs using msticpy" ] }, { "cell_type": "markdown", "metadata": { "toc": true }, "source": [ "
| \n", " | Event Type | \n", "Event Name | \n", "Request ID | \n", "User ID | \n", "Request Parameters | \n", "Alert | \n", "Event ID | \n", "Event DateTime | \n", "Alarm DateTime | \n", "Source IP | \n", "Request User Agent | \n", "Repeated Attempts | \n", "
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 0 | \n", "AwsApiCall | \n", "ListObjects | \n", "DBHD1NBK6P65FE8B | \n", "{'type': 'AWSAccount', 'principalId': '', 'accountId': 'ANONYMOUS_PRINCIPAL'} | \n", "{'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.co... | \n", "263 – 2022-01-31T14:38:27Z | \n", "7e75ac66-2d6f-4a2c-8921-489be88c65b1 | \n", "2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "Boto3/1.17.40 Python/3.6.12 Linux/3.10.0-1160.6.1.el7.x86_64 Botocore/1.20.112 | \n", "1 | \n", "
| 1 | \n", "AwsApiCall | \n", "ListObjects | \n", "YRJ65RPXZNGK7VQH | \n", "{'type': 'AWSAccount', 'principalId': '', 'accountId': 'ANONYMOUS_PRINCIPAL'} | \n", "{'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.co... | \n", "262 – 2022-01-31T03:54:25Z | \n", "155a578b-56df-4159-84de-df7d57ddf26c | \n", "2022-01-31T03:54:25Z | \n", "2022-01-31T03:58:26.275480+00:00 | \n", "88.218.82.128 | \n", "Java/1.8.0_201 | \n", "1 | \n", "
| 2 | \n", "AwsApiCall | \n", "HeadBucket | \n", "JYSHBKCE4J9DS8K5 | \n", "{'type': 'AWSAccount', 'principalId': '', 'accountId': 'ANONYMOUS_PRINCIPAL'} | \n", "{'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com'} | \n", "261 – 2022-01-30T18:28:31Z | \n", "42dd41f1-93cb-4085-8342-c7b4ec499a79 | \n", "2022-01-30T18:28:31Z | \n", "2022-01-30T18:29:57.302040+00:00 | \n", "212.83.184.16 | \n", "Boto3/1.17.40 Python/3.6.12 Linux/3.10.0-1160.6.1.el7.x86_64 Botocore/1.20.112 | \n", "1 | \n", "
| 3 | \n", "AwsApiCall | \n", "ListObjects | \n", "66PHY3JF14ANGJH8 | \n", "{'type': 'AWSAccount', 'principalId': '', 'accountId': 'ANONYMOUS_PRINCIPAL'} | \n", "{'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.co... | \n", "260 – 2022-01-30T14:28:44Z | \n", "33143f5e-4d85-4827-b1c8-1900763febba | \n", "2022-01-30T14:28:44Z | \n", "2022-01-30T14:32:14.020955+00:00 | \n", "212.83.184.15 | \n", "Boto3/1.17.40 Python/3.6.12 Linux/3.10.0-1160.6.1.el7.x86_64 Botocore/1.20.112 | \n", "1 | \n", "
| 4 | \n", "AwsApiCall | \n", "ListObjects | \n", "PCM2P7FSY5DFW99M | \n", "{'type': 'AWSAccount', 'principalId': '', 'accountId': 'ANONYMOUS_PRINCIPAL'} | \n", "{'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.co... | \n", "259 – 2022-01-29T18:03:13Z | \n", "dff8e5ab-baa3-43ff-8023-596064565ef4 | \n", "2022-01-29T18:03:13Z | \n", "2022-01-29T18:07:30.430153+00:00 | \n", "212.83.184.15 | \n", "Boto3/1.17.40 Python/3.6.12 Linux/3.10.0-1160.6.1.el7.x86_64 Botocore/1.20.112 | \n", "1 | \n", "
\n", " MSTICPy GeoIP Providers\n", "
\n", "| \n", " | Alert | \n", "Alarm DateTime | \n", "Source IP | \n", "CountryCode | \n", "CountryName | \n", "State | \n", "City | \n", "
|---|---|---|---|---|---|---|---|
| 0 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 1 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 2 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 3 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 4 | \n", "262 – 2022-01-31T03:54:25Z | \n", "2022-01-31T03:58:26.275480+00:00 | \n", "88.218.82.128 | \n", "LA | \n", "Laos | \n", "Vientiane Prefecture | \n", "Vientiane | \n", "
| \n", " | Alert | \n", "Alarm DateTime | \n", "Source IP | \n", "SourceASN | \n", "CountryCode | \n", "CountryName | \n", "State | \n", "City | \n", "
|---|---|---|---|---|---|---|---|---|
| 0 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "Online SAS, FR | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 1 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "Online SAS, FR | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 2 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "Online SAS, FR | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 3 | \n", "263 – 2022-01-31T14:38:27Z | \n", "2022-01-31T14:39:09.605190+00:00 | \n", "212.83.184.14 | \n", "Online SAS, FR | \n", "FR | \n", "France | \n", "Île-de-France | \n", "Nogent-sur-Marne | \n", "
| 4 | \n", "262 – 2022-01-31T03:54:25Z | \n", "2022-01-31T03:58:26.275480+00:00 | \n", "88.218.82.128 | \n", "M247, GB | \n", "LA | \n", "Laos | \n", "Vientiane Prefecture | \n", "Vientiane | \n", "
| \n", " | Ioc | \n", "IocType | \n", "QuerySubtype | \n", "Provider | \n", "Result | \n", "Severity | \n", "Details | \n", "RawResult | \n", "Reference | \n", "Status | \n", "
|---|---|---|---|---|---|---|---|---|---|---|
| XForce | \n", "212.83.184.14 | \n", "ipv4 | \n", "None | \n", "XForce | \n", "True | \n", "information | \n", "{'score': 1, 'cats': {}, 'categoryDescriptions': {}, 'reason': 'Regional Internet Registry', 're... | \n", "{'ip': '212.83.184.14', 'history': [{'created': '2012-03-22T07:26:00.000Z', 'reason': 'Regional ... | \n", "https://api.xforce.ibmcloud.com/ipr/212.83.184.14 | \n", "0 | \n", "
| OTX | |
| pulse_count | 50 |
| names | [\"Ka's Honeypot visitors\", 'LCIA:HoneyNet:January 2022', 'LCIA:HoneyNet:2022', 'LCIA:HoneyNet:January 2022', 'LCIA:HoneyNet:2022', 'Honeypot Hits (2022-01-04)', 'AWS (AU-Sydney) MySQL Bruteforce Hosts for 2022-01-03', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2022-01-03', 'FTP - US Honeypot IoCs 2022-02-02', 'Honeypot Hits (2022-02-02)', 'IOCs - 2022111350', 'IOCs - 2022111344 - ANIA Threat Feeds - IP Segment 0', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2021-12-31', 'LCIA:HoneyNet:2021', 'LCIA:HoneyNet:2021', 'LCIA:HoneyNet:December 2021', 'LCIA:HoneyNet:December 2021', 'IOCs - 20211231536', 'IOCs - 20211231531 - ANIA Threat Feeds - IP Segment 0', 'IOCs - 20221291346 - ANIA Threat Feeds - IP Segment 5', 'IOCs - 20221291346 - ANIA Threat Feeds - IP Segment 4', 'IOCs - 20221291345 - ANIA Threat Feeds - IP Segment 3', 'IOCs - 20221291345 - ANIA Threat Feeds - IP Segment 1', 'IOCs - 20221291350', 'PostgresQL honeypot logs for 2022-01-29', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2022-01-28', 'AWS (India-Mumbai) MySQL Bruteforce Hosts for 2022-01-27', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2022-01-26', 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts for 2022-01-25', 'AWS (India-Mumbai) MySQL Bruteforce Hosts for 2022-01-25', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2022-01-25', 'AWS (AU-Sydney) MySQL Bruteforce Hosts for 2021-12-26', 'Honeypot Hits (2022-01-25)', 'PostgresQL honeypot logs for 2022-01-24', 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts for 2022-01-23', 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts for 2021-12-24', 'AWS (AU-Sydney) MySQL Bruteforce Hosts for 2022-01-23', 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts for 2022-01-22', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2022-01-22', 'FTP - US Honeypot IoCs 2021-12-22', 'PostgresQL honeypot logs for 2022-01-20', 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts for 2021-12-20', 'AWS (India-Mumbai) MySQL Bruteforce Hosts for 2022-01-18', 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts for 2021-12-19', 'AWS (BA-Bahrain) MySQL Bruteforce Hosts for 2022-01-17', 'Honeypot Hits (2021-12-17)', 'PostgresQL honeypot logs for 2022-01-16', 'AWS (AU-Sydney) MySQL Bruteforce Hosts for 2022-01-15', '2021-12-16 dionaea honeypot 353563f7-2182-4a0a-926f-8b2fd4403246', 'nmap Scanning Hosts for 2021-12-15'] |
| tags | [['SSH', 'scanner', 'attack', 'login', 'Telnet'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], [], ['awsau', 'mysql', 'bruteforce', 'honeypot'], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], ['honeypot', 'ftp', 'dionaea'], [], [], [], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], ['tsec', 'tpot19', 'honeypot', 'la-safe.org'], [], [], [], [], [], [], [], ['postgres', 'honeypot'], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], ['awsindia', 'mysql', 'bruteforce', 'honeypot'], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], ['awssafrica', 'mysql', 'bruteforce', 'honeypot'], ['awsindia', 'mysql', 'bruteforce', 'honeypot'], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], ['awsau', 'mysql', 'bruteforce', 'honeypot'], [], ['postgres', 'honeypot'], ['awssafrica', 'mysql', 'bruteforce', 'honeypot'], ['awsjap', 'mysql', 'bruteforce', 'honeypot'], ['awsau', 'mysql', 'bruteforce', 'honeypot'], ['awssafrica', 'mysql', 'bruteforce', 'honeypot'], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], ['honeypot', 'ftp', 'dionaea'], ['postgres', 'honeypot'], ['awsjap', 'mysql', 'bruteforce', 'honeypot'], ['awsindia', 'mysql', 'bruteforce', 'honeypot'], ['awsjap', 'mysql', 'bruteforce', 'honeypot'], ['awsbah', 'mysql', 'bruteforce', 'honeypot'], [], ['postgres', 'honeypot'], ['awsau', 'mysql', 'bruteforce', 'honeypot'], ['honeypot', 'dionaea'], ['nmap', 'port-scan', 'honeypot']] |
| references | [[], [], [], [], [], [], ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-03/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-03/', 'https://jamesbrine.com.au'], [], [], [], [], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2021-12-31/', 'https://jamesbrine.com.au'], [], [], [], [], [], [], [], [], [], [], [], [], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-28/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-27/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-26/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-25/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-25/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-25/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2021-12-26/', 'https://jamesbrine.com.au'], [], [], ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-23/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-24/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-23/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-22/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-22/', 'https://jamesbrine.com.au'], [], [], ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-20/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-18/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-19/', 'https://jamesbrine.com.au'], ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-17/', 'https://jamesbrine.com.au'], [], [], ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-15/', 'https://jamesbrine.com.au'], [], ['https://jamesbrine.com.au/bruteforce-files-list-2021-12-15/', 'https://jamesbrine.com.au']] |
{'accuracy_radius': 1000,
'area_code': 0,
'asn': 'AS15169 GOOGLE',
'base_indicator': {'access_reason': '',
'access_type': 'public',
'content': '',
'description': '',
'id': 3248081298,
'indicator': '35.233.62.116',
'title': '',
'type': 'IPv4'},
'charset': 0,
'city': 'Brussels',
'city_data': True,
'continent_code': 'EU',
'country_code': 'BE',
'country_code2': 'BE',
'country_code3': 'BEL',
'country_name': 'Belgium',
'dma_code': 0,
'false_positive': [],
'flag_title': 'Belgium',
'flag_url': '/assets/images/flags/be.png',
'indicator': '35.233.62.116',
'latitude': 50.8336,
'longitude': 4.3337,
'postal_code': '1060',
'pulse_info': {'count': 50,
'pulses': [{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '56464',
'is_following': False,
'is_subscribed': False,
'username': 'Kapppppa'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-02-16T13:14:16.945000',
'description': 'Logs of IP trying to hack into my '
'Particle Photon and Cloud Honeypot '
'instance',
'downvotes_count': 0,
'export_count': 2108,
'follower_count': 0,
'groups': [],
'id': '602bc528f447d628d41494f2',
'in_group': False,
'indicator_count': 4451,
'indicator_type_counts': {'IPv4': 4451},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:45:51.766000',
'modified_text': '1 minute ago ',
'name': \"Ka's Honeypot visitors\",
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 359,
'tags': ['SSH',
'scanner',
'attack',
'login',
'Telnet'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:20.835000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cfedf45bd67c2aafe44271',
'in_group': False,
'indicator_count': 17943,
'indicator_type_counts': {'IPv4': 17943},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:January 2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 124,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:22',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cfedf696392d4eedca0ae6',
'in_group': False,
'indicator_count': 17918,
'indicator_type_counts': {'IPv4': 17918},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 125,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:24.325000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61cfedf85b4abc76c011f453',
'in_group': False,
'indicator_count': 17918,
'indicator_type_counts': {'IPv4': 17918},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:January 2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 99,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T06:00:25.285000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2022 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 17,
'follower_count': 0,
'groups': [],
'id': '61cfedf9ba67254000a91c93',
'in_group': False,
'indicator_count': 17550,
'indicator_type_counts': {'IPv4': 17550},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-04T15:00:09.508000',
'modified_text': '46 minutes ago ',
'name': 'LCIA:HoneyNet:2022',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 100,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-04T16:46:31.905000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61d479e7714fddc557101470',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T16:04:12.606000',
'modified_text': '23 hours ago ',
'name': 'Honeypot Hits (2022-01-04)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 11,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-04T08:00:03.749000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d3fe83ebf3c87d64b39bad',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T08:00:58.262000',
'modified_text': '1 day ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2022-01-03',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-04T08:05:07.645000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d3ffb30c742a0d8fe12464',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T08:00:58.262000',
'modified_text': '1 day ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-03',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 326,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_57320/resized/80/avatar_4894047112.png',
'id': '57320',
'is_following': False,
'is_subscribed': False,
'username': 'soothsayer'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-02-03T04:30:02.933000',
'description': 'Daily FTP honeypot logs from a '
'honeypot in the US on a /32',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61fb5a4b9aa2b0f20ef7cc1a',
'in_group': False,
'indicator_count': 11,
'indicator_type_counts': {'IPv4': 11},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-03T04:30:02.933000',
'modified_text': '1 day ago ',
'name': 'FTP - US Honeypot IoCs 2022-02-02',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['honeypot', 'ftp', 'dionaea'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-02-02T22:53:26.381000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61fb0b66db08fd622ea4a2bb',
'in_group': False,
'indicator_count': 389,
'indicator_type_counts': {'IPv4': 389},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-02-02T22:53:26.381000',
'modified_text': '1 day ago ',
'name': 'Honeypot Hits (2022-02-02)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 10,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T21:51:03.951000',
'description': 'For complete list please visit '
'https://apd.altervista.org/',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d0ccc7b49862d4b2032223',
'in_group': False,
'indicator_count': 24876,
'indicator_type_counts': {'FileHash-SHA1': 4600,
'FileHash-SHA256': 799,
'FilePath': 1866,
'Mutex': 1866,
'URI': 1866,
'URL': 11598,
'YARA': 1866,
'domain': 144,
'hostname': 271},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T21:02:01.450000',
'modified_text': '3 days ago ',
'name': 'IOCs - 2022111350',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 283,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T21:52:37.014000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61d0cd25889a9d71fa9e2d8f',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T21:02:01.450000',
'modified_text': '3 days ago ',
'name': 'IOCs - 2022111344 - ANIA Threat Feeds - '
'IP Segment 0',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-01T08:05:04.050000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61d00b30a2ff64106748e6ee',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T08:02:48.505000',
'modified_text': '4 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2021-12-31',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2021-12-31/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-03-30T19:42:12.253000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 417,
'follower_count': 0,
'groups': [],
'id': '60637f141cda4877a64d0872',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 194,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-09-19T07:04:08.836000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 12,
'follower_count': 0,
'groups': [],
'id': '6146e0e8a6289a9c1b4cfcf7',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 126,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '111524',
'is_following': False,
'is_subscribed': False,
'username': 'ladarrellmiller'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-01T06:00:33.090000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 3,
'follower_count': 0,
'groups': [],
'id': '61a70f813eceb582be551305',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:December 2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 131,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '132921',
'is_following': False,
'is_subscribed': False,
'username': 'dm_lacia'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-01T06:00:41.128000',
'description': 'Louisiana Cyber Investigators '
'Alliance (LCIA): HoneyPot Suricata '
'Log: 2021 A unified coordinated '
'group of federal, state, local law '
'enforcement, as well as LA ESF-17 '
'members, focused onsafeguarding '
\"Louisiana's networks through \"
'collaborative vigilance and '
'thorough investigations '
'http://www.la-safe.org',
'downvotes_count': 0,
'export_count': 6,
'follower_count': 0,
'groups': [],
'id': '61a70f8903f0b07629aa8abc',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-31T05:03:01.372000',
'modified_text': '4 days ago ',
'name': 'LCIA:HoneyNet:December 2021',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 108,
'tags': ['tsec',
'tpot19',
'honeypot',
'la-safe.org'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-31T13:38:40.637000',
'description': 'For complete list please visit '
'https://apd.altervista.org/',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cf07e0cbed41eee43c1ca0',
'in_group': False,
'indicator_count': 25182,
'indicator_type_counts': {'FileHash-SHA1': 4600,
'FileHash-SHA256': 799,
'FilePath': 1909,
'Mutex': 1909,
'URI': 1909,
'URL': 11689,
'YARA': 1909,
'domain': 168,
'hostname': 290},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-30T13:00:17.588000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20211231536',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 282,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-31T13:40:41.324000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61cf0859fdb90e9d8c9f0499',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-30T13:00:17.588000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20211231531 - ANIA Threat Feeds - '
'IP Segment 0',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T22:01:52.364000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b950074eb942434abcb0',
'in_group': False,
'indicator_count': 44728,
'indicator_type_counts': {'IPv4': 44728},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T22:01:52.364000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291346 - ANIA Threat Feeds - '
'IP Segment 5',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T22:00:29.967000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b8fd4c36a01642d12427',
'in_group': False,
'indicator_count': 24164,
'indicator_type_counts': {'IPv4': 24164},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T22:00:29.967000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291346 - ANIA Threat Feeds - '
'IP Segment 4',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T21:59:10.696000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b8ae499e425c10eea05c',
'in_group': False,
'indicator_count': 11382,
'indicator_type_counts': {'IPv4': 11382},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T21:59:10.696000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291345 - ANIA Threat Feeds - '
'IP Segment 3',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T21:56:38.118000',
'description': 'ANIA Collector - Advanced Network '
'Interactive Analysis Collector - '
'Collected from Internet Storm '
'Center IOCs List',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f5b816ab1ca63a3f67712b',
'in_group': False,
'indicator_count': 20153,
'indicator_type_counts': {'IPv4': 20153},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T21:56:38.118000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291345 - ANIA Threat Feeds - '
'IP Segment 1',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_91912/resized/80/avatar_2b1b2b88b6.png',
'id': '91912',
'is_following': False,
'is_subscribed': False,
'username': 'AlessandroFiori'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T21:53:13.277000',
'description': 'For complete list please visit '
'https://apd.altervista.org/',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61f5b749e6036d825b4f9edc',
'in_group': False,
'indicator_count': 36147,
'indicator_type_counts': {'FileHash-SHA1': 4642,
'FileHash-SHA256': 798,
'FilePath': 1874,
'IPv4': 10811,
'Mutex': 1874,
'URI': 1874,
'URL': 11949,
'YARA': 1874,
'domain': 183,
'hostname': 268},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T21:53:13.277000',
'modified_text': '5 days ago ',
'name': 'IOCs - 20221291350',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 281,
'tags': [],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T15:23:09.965000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f55bddec75279b229bc2ac',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T15:23:09.965000',
'modified_text': '6 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-29',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1589,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-29T08:05:04.127000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f4f53016d337651b5394dd',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-29T08:05:04.127000',
'modified_text': '6 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-28',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-28/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-28T08:25:04.193000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f3a860ef11e9ebf1a1050f',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-28T08:25:04.193000',
'modified_text': '7 days ago ',
'name': 'AWS (India-Mumbai) MySQL Bruteforce Hosts '
'for 2022-01-27',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-27/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsindia',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['India'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-27T08:05:04',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f252304548dc8064a4f986',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-27T08:05:04',
'modified_text': '8 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-26',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-26/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-26T08:30:03.508000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f1068baee4a4355bbde6ce',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:30:03.508000',
'modified_text': '9 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2022-01-25',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awssafrica',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['South Africa'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-26T08:25:04.416000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f105608cc32b3345012340',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:25:04.416000',
'modified_text': '9 days ago ',
'name': 'AWS (India-Mumbai) MySQL Bruteforce Hosts '
'for 2022-01-25',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsindia',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['India'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-26T08:05:03.090000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f100afffd677be91942dd8',
'in_group': False,
'indicator_count': 4,
'indicator_type_counts': {'IPv4': 4},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:05:03.090000',
'modified_text': '9 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-25',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-27T08:00:04.235000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c972848947b7dbfcb208cf',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-26T08:01:32.111000',
'modified_text': '9 days ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2021-12-26',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2021-12-26/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-25T22:18:42.125000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61f07742109a343981a1b0a2',
'in_group': False,
'indicator_count': 377,
'indicator_type_counts': {'IPv4': 377},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-25T22:18:42.125000',
'modified_text': '9 days ago ',
'name': 'Honeypot Hits (2022-01-25)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 10,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-24T15:27:47.967000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61eec573b5accbe9e60eec0c',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T15:27:47.967000',
'modified_text': '11 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-24',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1589,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-24T08:30:03.233000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ee638b110ea437afb2d346',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T08:30:03.233000',
'modified_text': '11 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2022-01-23',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awssafrica',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['South Africa'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-25T08:18:03.788000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c6d3bb5c6d6c0d303900b3',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T08:03:43.362000',
'modified_text': '11 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2021-12-24',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-24/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsjap',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Japan'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-24T08:00:03.763000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ee5c83666f5325de820492',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-24T08:00:03.763000',
'modified_text': '11 days ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2022-01-23',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-23T08:30:03.344000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ed120b42e71540c51cea4c',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-23T08:30:03.344000',
'modified_text': '12 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2022-01-22',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awssafrica',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['South Africa'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-23T08:05:04.665000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61ed0c30c456b6ea442e1b36',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-23T08:05:04.665000',
'modified_text': '12 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-22',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_57320/resized/80/avatar_4894047112.png',
'id': '57320',
'is_following': False,
'is_subscribed': False,
'username': 'soothsayer'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-23T04:30:03.238000',
'description': 'Daily FTP honeypot logs from a '
'honeypot in the US on a /32',
'downvotes_count': 0,
'export_count': 2,
'follower_count': 0,
'groups': [],
'id': '61c3fb4b5b4bab294d29a270',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-22T04:02:39.300000',
'modified_text': '13 days ago ',
'name': 'FTP - US Honeypot IoCs 2021-12-22',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['honeypot', 'ftp', 'dionaea'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-20T15:20:48.487000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e97dd0cbdd6e55c2a5e055',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-20T15:20:48.487000',
'modified_text': '15 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-20',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1589,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-21T08:18:04.137000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c18dbca80aeab6ce03fa0a',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-20T08:01:38.562000',
'modified_text': '15 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2021-12-20',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-20/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsjap',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Japan'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-19T08:25:02.424000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e7cade1866c9786492ad1c',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-19T08:25:02.424000',
'modified_text': '16 days ago ',
'name': 'AWS (India-Mumbai) MySQL Bruteforce Hosts '
'for 2022-01-18',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-18/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsindia',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['India'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-20T08:18:03.636000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61c03c3b4187f3fd4bbd3de1',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-19T08:00:41.410000',
'modified_text': '16 days ago ',
'name': 'AWS (JAP-Tokyo) MySQL Bruteforce Hosts '
'for 2021-12-19',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-19/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsjap',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Japan'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-18T08:05:03.548000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e674afe3af42912e6870d5',
'in_group': False,
'indicator_count': 3,
'indicator_type_counts': {'IPv4': 3},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-18T08:05:03.548000',
'modified_text': '17 days ago ',
'name': 'AWS (BA-Bahrain) MySQL Bruteforce Hosts '
'for 2022-01-17',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-17/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsbah',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Bahrain'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'white',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '45974',
'is_following': False,
'is_subscribed': False,
'username': 'Ozark046'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-17T17:18:30.059000',
'description': '',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61bcc6663863a6e361427735',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T17:02:36.654000',
'modified_text': '18 days ago ',
'name': 'Honeypot Hits (2021-12-17)',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 10,
'tags': [],
'targeted_countries': ['United States of America'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/jnazario/resized/80/Screen '
'Shot 2016-07-24 at '
'12.24.30 PM.png',
'id': '14926',
'is_following': False,
'is_subscribed': False,
'username': 'jnazario'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-16T15:25:04.817000',
'description': 'PostgresQL honeypot authentication '
'attempts from a US /32',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e438d03fce4c26a836a998',
'in_group': False,
'indicator_count': 1,
'indicator_type_counts': {'IPv4': 1},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T15:25:04.817000',
'modified_text': '19 days ago ',
'name': 'PostgresQL honeypot logs for 2022-01-16',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 1590,
'tags': ['postgres', 'honeypot'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2022-01-16T08:00:04.033000',
'description': 'IPV4 hosts detected attempting to '
'brute force MySQL on private '
'honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61e3d08414aff53714bb0319',
'in_group': False,
'indicator_count': 2,
'indicator_type_counts': {'IPv4': 2},
'industries': [],
'is_author': False,
'is_modified': False,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T08:00:04.033000',
'modified_text': '19 days ago ',
'name': 'AWS (AU-Sydney) MySQL Bruteforce Hosts '
'for 2022-01-15',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-15/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 1,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['awsau',
'mysql',
'bruteforce',
'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': True,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': 'https://otx.alienvault.com/assets/images/default-avatar.png',
'id': '83377',
'is_following': False,
'is_subscribed': False,
'username': 'projectopsec'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-17T00:05:06.286000',
'description': 'previous 24 hours activity from a '
'dionaea honeypot',
'downvotes_count': 0,
'export_count': 0,
'follower_count': 0,
'groups': [],
'id': '61bbd432c6d7af7d45cd570a',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-16T00:03:19.160000',
'modified_text': '19 days ago ',
'name': '2021-12-16 dionaea honeypot '
'353563f7-2182-4a0a-926f-8b2fd4403246',
'public': 1,
'pulse_source': 'api',
'references': [],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 201,
'tags': ['honeypot', 'dionaea'],
'targeted_countries': [],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0},
{'TLP': 'green',
'adversary': '',
'attack_ids': [],
'author': {'avatar_url': '/otxapi/users/avatar_image/media/avatars/user_83487/resized/80/avatar_3b9c358f36.png',
'id': '83487',
'is_following': False,
'is_subscribed': False,
'username': 'jamesbrine'},
'cloned_from': None,
'comment_count': 0,
'created': '2021-12-16T08:20:03.164000',
'description': 'IPV4 Addresses of attackers port '
'scanning private honeypot',
'downvotes_count': 0,
'export_count': 1,
'follower_count': 0,
'groups': [],
'id': '61baf6b3f5f07bbc0a039c2e',
'in_group': False,
'indicator_count': 0,
'indicator_type_counts': {},
'industries': [],
'is_author': False,
'is_modified': True,
'is_subscribing': None,
'locked': False,
'malware_families': [],
'modified': '2022-01-15T08:05:31.677000',
'modified_text': '20 days ago ',
'name': 'nmap Scanning Hosts for 2021-12-15',
'public': 1,
'pulse_source': 'api',
'references': ['https://jamesbrine.com.au/bruteforce-files-list-2021-12-15/',
'https://jamesbrine.com.au'],
'related_indicator_is_active': 0,
'related_indicator_type': 'IPv4',
'subscriber_count': 325,
'tags': ['nmap', 'port-scan', 'honeypot'],
'targeted_countries': ['Australia'],
'threat_hunter_has_agents': 1,
'threat_hunter_scannable': False,
'upvotes_count': 0,
'validator_count': 0,
'vote': 0,
'votes_count': 0}],
'references': ['https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-20/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2021-12-31/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-22/',
'https://jamesbrine.com.au/bruteforce-files-list-2021-12-15/',
'https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-18/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2021-12-26/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-17/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-15/',
'https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-27/',
'https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-19/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-03/',
'https://jamesbrine.com.au/awsindia-mysql-bruteforce-ip-list-2022-01-25/',
'https://jamesbrine.com.au/awsau-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-26/',
'https://jamesbrine.com.au/awsjap-mysql-bruteforce-ip-list-2021-12-24/',
'https://jamesbrine.com.au/awssafrica-mysql-bruteforce-ip-list-2022-01-23/',
'https://jamesbrine.com.au/awsbah-mysql-bruteforce-ip-list-2022-01-28/',
'https://jamesbrine.com.au'],
'related': {'alienvault': {'adversary': [],
'industries': [],
'malware_families': []},
'other': {'adversary': [],
'industries': [],
'malware_families': []}}},
'region': 'BRU',
'reputation': 0,
'sections': ['general',
'geo',
'reputation',
'url_list',
'passive_dns',
'malware',
'nids_list',
'http_scans'],
'subdivision': 'BRU',
'type': 'IPv4',
'type_title': 'IPv4',
'validation': [{'message': 'In cloud provider range: provider=google',
'name': 'Cloud Provider IP range',
'source': 'cloud'}],
'whois': 'http://whois.domaintools.com/35.233.62.116'}\n",
" | XForce | |
| score | 10 |
| cats | |
| Bots | 100 |
| categoryDescriptions | |
| Bots | IPs known for botnet-member activity. Devices using these IPs are obviously infected and take part in DDoS-attacks, port-scanning, spam-sending etc. |
| reason | X-Force Botnet Trap Analysis |
| reasonDescription | Unauthorized access attempts originating from this IP address were detected. |
| tags | [] |
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member activity. '
'Devices using these IPs are obviously '
'infected and take part in DDoS-attacks, '
'port-scanning, spam-sending etc.'},
'cats': {'Bots': 100},
'geo': {'country': 'United States', 'countrycode': 'US'},
'history': [{'categoryDescriptions': {},
'cats': {},
'created': '2012-03-22T07:26:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.0.0.0/8',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'asns': {'15169': {'Company': 'GOOGLE - Google Inc., US',
'cidr': 12}},
'categoryDescriptions': {},
'cats': {},
'created': '2017-11-10T07:23:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'categoryDescriptions': {},
'cats': {},
'created': '2017-11-13T07:22:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'categoryDescriptions': {},
'cats': {},
'created': '2019-05-19T06:52:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'categoryDescriptions': {},
'cats': {},
'created': '2019-05-21T14:39:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'categoryDescriptions': {},
'cats': {},
'created': '2020-01-17T09:09:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'categoryDescriptions': {},
'cats': {},
'created': '2020-03-21T07:52:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'categoryDescriptions': {},
'cats': {},
'created': '2020-03-22T07:54:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0/12',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'score': 1},
{'asns': {'15169': {'cidr': 12, 'removed': True}},
'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 57},
'created': '2021-10-12T09:31:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 5.7},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 43},
'created': '2021-10-21T09:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 4.3},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 29},
'created': '2021-10-24T09:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 2.9},
{'categoryDescriptions': {},
'cats': {},
'created': '2021-10-25T09:10:00.000Z',
'deleted': True,
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 1},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 57},
'created': '2021-10-30T20:46:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 5.7},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 71},
'created': '2021-11-11T00:16:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 7.1},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 86},
'created': '2021-11-21T21:15:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 8.6},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 71},
'created': '2021-11-23T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 7.1},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 86},
'created': '2021-11-23T18:30:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 8.6},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 71},
'created': '2021-11-26T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 7.1},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 86},
'created': '2021-11-26T19:30:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 8.6},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 71},
'created': '2021-11-28T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 7.1},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 100},
'created': '2021-11-28T18:46:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 86},
'created': '2021-12-01T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 8.6},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 100},
'created': '2021-12-01T17:30:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 86},
'created': '2021-12-03T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 8.6},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 71},
'created': '2021-12-04T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 7.1},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 57},
'created': '2021-12-05T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 5.7},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 43},
'created': '2021-12-06T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 4.3},
{'categoryDescriptions': {'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Scanning IPs': 100},
'created': '2021-12-07T16:00:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.',
'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Bots': 100, 'Scanning IPs': 100},
'created': '2021-12-09T10:15:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218,
'isnew': True},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.',
'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Bots': 100, 'Scanning IPs': 86},
'created': '2021-12-10T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.',
'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Bots': 100, 'Scanning IPs': 71},
'created': '2021-12-11T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.',
'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Bots': 100, 'Scanning IPs': 57},
'created': '2021-12-12T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.',
'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Bots': 100, 'Scanning IPs': 43},
'created': '2021-12-13T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.',
'Scanning IPs': 'These IPs have been '
'identified as '
'illegally scanning '
'networks for '
'vulnerabilities.'},
'cats': {'Bots': 100, 'Scanning IPs': 29},
'created': '2021-12-15T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10},
{'categoryDescriptions': {'Bots': 'IPs known for botnet-member '
'activity. Devices using these '
'IPs are obviously infected and '
'take part in DDoS-attacks, '
'port-scanning, spam-sending '
'etc.'},
'cats': {'Bots': 100},
'created': '2021-12-16T10:10:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.233.62.116/32',
'malware_extended': {'BotNet': 'volatile_cedar',
'CC': 'US',
'country': 218},
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating '
'from this IP address were detected.',
'score': 10}],
'ip': '35.233.62.116',
'reason': 'X-Force Botnet Trap Analysis',
'reasonDescription': 'Unauthorized access attempts originating from this IP '
'address were detected.',
'score': 10,
'subnets': [{'asns': {'15169': {'cidr': 12, 'removed': True}},
'categoryDescriptions': {},
'cats': {},
'created': '2020-03-22T07:54:00.000Z',
'geo': {'country': 'United States', 'countrycode': 'US'},
'ip': '35.224.0.0',
'reason': 'Regional Internet Registry',
'reasonDescription': 'One of the five RIRs announced a (new) '
'location mapping of the IP.',
'reason_removed': True,
'score': 1,
'subnet': '35.224.0.0/12'}],
'tags': []}\n",
" | \n", " | Alarm DateTime | \n", "Source IP | \n", "CountryName | \n", "SourceASN | \n", "Request User Agent | \n", "
|---|---|---|---|---|---|
| 513 | \n", "2020-02-11 03:35:40 UTC | \n", "34.68.153.199 | \n", "United States | \n", "GOOGLE, US | \n", "python-requests/2.22.0 | \n", "
| \n", " | MonthofYear | \n", "count | \n", "
|---|---|---|
| 0 | \n", "2020-02 | \n", "4 | \n", "
| 1 | \n", "2020-05 | \n", "1 | \n", "
| 2 | \n", "2020-06 | \n", "4 | \n", "
| 3 | \n", "2020-07 | \n", "22 | \n", "
| 4 | \n", "2020-08 | \n", "8 | \n", "
| 5 | \n", "2020-09 | \n", "6 | \n", "
| 6 | \n", "2020-10 | \n", "5 | \n", "
| 7 | \n", "2020-11 | \n", "3 | \n", "
| 8 | \n", "2020-12 | \n", "6 | \n", "
| 9 | \n", "2021-01 | \n", "6 | \n", "
| 10 | \n", "2021-02 | \n", "11 | \n", "
| 11 | \n", "2021-03 | \n", "23 | \n", "
| 12 | \n", "2021-04 | \n", "21 | \n", "
| 13 | \n", "2021-05 | \n", "16 | \n", "
| 14 | \n", "2021-06 | \n", "15 | \n", "
| 15 | \n", "2021-07 | \n", "23 | \n", "
| 16 | \n", "2021-08 | \n", "13 | \n", "
| 17 | \n", "2021-09 | \n", "29 | \n", "
| 18 | \n", "2021-10 | \n", "27 | \n", "
| 19 | \n", "2021-11 | \n", "15 | \n", "
| 20 | \n", "2021-12 | \n", "24 | \n", "
| 21 | \n", "2022-01 | \n", "232 | \n", "
| \n", " | index | \n", "User ID | \n", "
|---|---|---|
| 0 | \n", "{'type': 'AWSAccount', 'principalId': '', 'accountId': 'ANONYMOUS_PRINCIPAL'} | \n", "477 | \n", "
| 1 | \n", "{'type': 'AWSAccount', 'principalId': '451083579297', 'accountId': '451083579297'} | \n", "12 | \n", "
| 2 | \n", "{'type': 'AWSAccount', 'principalId': '960312529846', 'accountId': '960312529846'} | \n", "7 | \n", "
| 3 | \n", "{'type': 'AWSAccount', 'principalId': '541646178081', 'accountId': '541646178081'} | \n", "5 | \n", "
| 4 | \n", "{'type': 'AWSAccount', 'principalId': 'AIDAZTADS5TQBDY2MAAOH', 'accountId': '659285011680'} | \n", "4 | \n", "
| 5 | \n", "{'type': 'AWSAccount', 'principalId': '725677763773', 'accountId': '725677763773'} | \n", "3 | \n", "
| 6 | \n", "{'type': 'AWSAccount', 'principalId': 'AIDAIYBE736TYLBM3THMU', 'accountId': '385485039111'} | \n", "2 | \n", "
| 7 | \n", "{'type': 'AWSAccount', 'principalId': 'AIDAJNSTHWDY27F2QAMTM', 'accountId': '271169583898'} | \n", "2 | \n", "
| \n", " | \n", " | count | \n", "
|---|---|---|
| Event Name | \n", "Request Parameters | \n", "\n", " |
| HeadBucket | \n", "{'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com'} | \n", "187 | \n", "
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com'} | \n", "3 | \n", "|
| {'bucketName': 'microsoft-devtest', 'Host': 's3.eu-west-1.amazonaws.com'} | \n", "2 | \n", "|
| ListObjects | \n", "{'bucketName': 'microsoft-devtest', 'Host': 'Microsoft-devtest.s3.amazonaws.com'} | \n", "2 | \n", "
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com', 'encoding-type': 'url'} | \n", "36 | \n", "|
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com', 'max-keys': '1000', 'prefix': 'a'} | \n", "1 | \n", "|
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com', 'max-keys': '1000', 'prefix': 'd'} | \n", "1 | \n", "|
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com'} | \n", "48 | \n", "|
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com', 'encoding-type': 'url', 'prefix': '*'} | \n", "3 | \n", "|
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com', 'encoding-type': 'url'} | \n", "2 | \n", "|
| {'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com', 'encoding-type': 'url'} | \n", "185 | \n", "|
| {'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.amazonaws.com'} | \n", "1 | \n", "|
| {'list-type': '2', 'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com'} | \n", "20 | \n", "|
| {'list-type': '2', 'bucketName': 'microsoft-devtest', 'encoding-type': 'url', 'prefix': '', 'delimiter': '/', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com'} | \n", "8 | \n", "|
| {'list-type': '2', 'bucketName': 'microsoft-devtest', 'max-keys': '0', 'encoding-type': 'url', 'x-amz-request-payer': 'requester', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com'} | \n", "3 | \n", "|
| {'list-type': '2', 'bucketName': 'microsoft-devtest', 'max-keys': '500', 'encoding-type': 'url', 'x-amz-request-payer': 'requester', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com'} | \n", "1 | \n", "|
| PutObject | \n", "{'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com', 'key': 'hello.txt'} | \n", "4 | \n", "
| {'bucketName': 'microsoft-devtest', 'Host': 'microsoft-devtest.s3.eu-west-1.amazonaws.com', 'key': 'writeable_bucket.txt'} | \n", "7 | \n", "
| \n", " | count | \n", "
|---|---|
| Source IP | \n", "\n", " |
| 212.83.184.15 | \n", "121 | \n", "
| 212.83.184.17 | \n", "64 | \n", "
| 212.83.184.14 | \n", "16 | \n", "
| 43.251.92.37 | \n", "16 | \n", "
| 188.40.66.118 | \n", "9 | \n", "
| 212.83.184.16 | \n", "9 | \n", "
| 35.205.104.93 | \n", "9 | \n", "
| 34.77.163.42 | \n", "9 | \n", "
| 104.155.101.3 | \n", "4 | \n", "
| 35.187.190.226 | \n", "4 | \n", "
| 95.217.207.120 | \n", "4 | \n", "
| 95.217.154.203 | \n", "4 | \n", "
| 95.216.202.243 | \n", "4 | \n", "
| 95.216.151.196 | \n", "4 | \n", "
| 35.233.62.116 | \n", "4 | \n", "
| 35.195.57.216 | \n", "4 | \n", "
| 34.76.78.209 | \n", "4 | \n", "
| 34.79.107.251 | \n", "4 | \n", "
| 34.78.120.99 | \n", "4 | \n", "
| 130.211.54.158 | \n", "4 | \n", "
| 34.71.42.209 | \n", "4 | \n", "
| 34.68.153.199 | \n", "4 | \n", "
| 34.140.248.32 | \n", "4 | \n", "
| 212.83.184.13 | \n", "4 | \n", "
| 192.175.111.231 | \n", "4 | \n", "
| 192.175.111.228 | \n", "4 | \n", "
| 95.217.6.207 | \n", "4 | \n", "
| \n", " | count | \n", "
|---|---|
| SourceASN | \n", "\n", " |
| Online SAS, FR | \n", "214 | \n", "
| M247, GB | \n", "93 | \n", "
| GOOGLE, US | \n", "69 | \n", "
| HETZNER-AS, DE | \n", "34 | \n", "
| ANINETWORK-IN Ani Network Pvt Ltd, IN | \n", "16 | \n", "
| IWEB-AS, CA | \n", "15 | \n", "
| HOSTROYALE, IN | \n", "10 | \n", "
| ASDETUK www.heficed.com, GB | \n", "8 | \n", "
| AMAZON-AES, US | \n", "6 | \n", "
| NA | \n", "5 | \n", "
| HQSERV_COMMUNICATION_SOLUTIONS, IL | \n", "5 | \n", "
| FASTRACK Fastrack Technology, AU | \n", "4 | \n", "
| QUICKPACKET, US | \n", "4 | \n", "
| KVBPL-AS-IN Kerala Vision Broad Band Private Limited, IN | \n", "3 | \n", "
| DIGITALOCEAN-ASN, US | \n", "3 | \n", "
| INETLTD, TR | \n", "2 | \n", "
| IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE | \n", "2 | \n", "
| HOST-AS-AP Host Universal Pty Ltd, AU | \n", "2 | \n", "
| COMCAST-7922, US | \n", "2 | \n", "
| SERVER-MANIA, CA | \n", "2 | \n", "
| \n", " | \n", " | count | \n", "
|---|---|---|
| Severity | \n", "Provider | \n", "\n", " |
| high | \n", "OTX | \n", "79 | \n", "
| XForce | \n", "13 | \n", "|
| information | \n", "OTX | \n", "420 | \n", "
| XForce | \n", "496 | \n", "|
| warning | \n", "OTX | \n", "15 | \n", "
| XForce | \n", "5 | \n", "