tutorials-and-examples/example-notebooks/data/ti_results_ipv4.pkl (107 lines of code) (raw):
��v: �pandas.core.frame�� DataFrame���)��}�(�_data��pandas.core.internals.managers��BlockManager���)��(]�(�pandas.core.indexes.base��
_new_Index���h�Index���}�(�data��numpy.core.multiarray��_reconstruct����numpy��ndarray���K ��Cb���R�(KK
��h�dtype����O8�K K��R�(K�|�NNNJ����J����K?t�b�]�(�Ioc��IocType��QuerySubtype��Provider��Result��Severity��Details�� RawResult�� Reference��Status�et�b�name�Nu��R�h
h}�(hhhK ��h��R�(KK��h!�]�(�OTX��
VirusTotal��XForce��AzSTI��OPR��Tor�et�bh0Nu��R�e]�hhK ��h��R�(KK
K��h!�]�(�38.75.137.9�hHhHhHhHhH�ipv4�hIhIhIhIhINNNNNN�OTX��
VirusTotal��XForce��AzSTI��OPR��Tor�������KKKK K K }�(�pulse_count�K�names�]�(�$Underminer.EK - Exploit Kit IOC Feed��$Underminer.EK - Exploit Kit IOC Feed��
Underminer EK�e�tags�]�(]��
Underminer.EK�a]��
Underminer.EK�a]�e�
references�]�(]�]�]��Vhttps://blog.malwarebytes.com/threat-analysis/2019/07/exploit-kits-summer-2019-review/�aeu}�(�verbose_msg��IP address in dataset��
response_code�K�
detected_urls�]�(�http://38.75.137.9/��Ihttp://38.75.137.9:9088/pubs/wiki.php?id=937a4eadd6f5a94b3738a58dcc79ca13��<http://38.75.137.9:9088/views/q5ul78uv4b4q8bg8d95canrsns.jpg��?http://38.75.137.9:9088%20/views/q5ul78uv4b4q8bg8d95canrsns.jpg��8http://38.75.137.9:9088/js/i7gb3alc7blgibsnfv2kag8er4.js��8http://38.75.137.9:9088/js/a1po3dnem5l1if2f411pr4q22o.js��8http://38.75.137.9:9088/js/dnmuj0c6a4853jnjfgfg666evg.js��8http://38.75.137.9:9088/js/0s6qod8qsa6q3l16ftk9fhdf1g.js��8http://38.75.137.9:9088/js/ekrsh4m5g1r2gqfr9vkhlajdbc.js��8http://38.75.137.9:9088/js/q95pceh704tago6819matbsrac.js��8http://38.75.137.9:9088/js/g0slmfo8o1ob2d8g471hdt4i3s.js��8http://38.75.137.9:9088/js/rif766i0nvahde8enqu2phrjh8.js��8http://38.75.137.9:9088/js/8djjf9bb1o5p8to1jn3hd0p6q0.js��8http://38.75.137.9:9088/js/6ierns0a5no5k5b1s20vopceq4.js��8http://38.75.137.9:9088/js/lbg61eg2mjdpiihj29itatqbp0.js�� http://38.75.137.9:9088/logo.swf��=http://38.75.137.9:9088/views/dlke6si3fr3spi30btq624ghlg.html���http://38.75.137.9:9088/pubs/servlet.php?fp=39fe6ccb473b08362ae067b8c0ee865d&amp;lang=en-US&amp;token=&amp;id=49457&amp;sign=5eed006ae06584a03f969b9cd3558c28&amp;validate=13b96b0bb8ac2a105d07f7c8b701f240��<http://38.75.137.9:9088/views/m7sg0k3fcvrdre8psojjlu8r2c.txt��?http://38.75.137.9:9088/views/ul2tuocpr2isi9pperindatp3c.ocx.gz��Lhttp://38.75.137.9:9088/pubs/article.php?id=471b68c405614637d03b31b4d3155244��Ihttp://38.75.137.9:9088/pubs/wiki.php?id=91f093921cbb802ee2d2a22d8a4a1135��3http://38.75.137.9/js/6aifr6hl9870452b0u0rsfjca8.js�e� positives�K!u}�(�score�K�cats�}��categoryDescriptions�}��reason��Regional Internet Registry��reasonDescription��BOne of the five RIRs announced a (new) location mapping of the IP.�hW]�u�
Not found.��IoC type ipv4 not supported.��
Not found.�}�(�sections�]�(�general��geo��
reputation��url_list��passive_dns��malware�� nids_list��
http_scans�e�city��Los Angeles�� area_code�K �accuracy_radius�M��
pulse_info�}�(�count�K�
references�]��Vhttps://blog.malwarebytes.com/threat-analysis/2019/07/exploit-kits-summer-2019-review/�a�pulses�]�(}�(�indicator_type_counts�}�(�domain�K�hostname�K�IPv4�Ku�pulse_source��api��TLP��white��description��=IPs and hostnames for the Exploit Kit known as Underminer.EK.��subscriber_count�K5�tags�]�hZa�export_count�K�malware_families�]��is_modified���
upvotes_count�K �
modified_text��7 minutes ago ��is_subscribing�Nh�]��targeted_countries�]��groups�]��vote�K �validator_count�K �threat_hunter_scannable��� is_author��� adversary�� ��id��5d4d8ccdbe24622d01f9ce9f��
industries�]��locked�K �name�hT�created��2019-08-09T15:10:05.503000��threat_hunter_has_agents�K�cloned_from�N�downvotes_count�K �modified��2020-02-14T00:01:10.497000��
comment_count�K �indicator_count�K
�
attack_ids�]��in_group���follower_count�K �votes_count�K �author�}�(�username��otxrobottwo_testing��
is_subscribed���
avatar_url��;https://otx.alienvault.com/assets/images/default-avatar.png��is_following��hɌ83138�u�public�Ku}�(h�}�(h�Kh�Kh�Kuh��api�h��white�h��=IPs and hostnames for the Exploit Kit known as Underminer.EK.�h�K�h�]�h\ah�Kh�]�h��h�K h��
101 days ago �h�Nh�]�h�]�h�]�h�K h�K hňhƉh�h�hɌ5db816cba3e59aeced1fad16�h�]�h�K h�hUhό2019-10-29T10:39:07.558000�h�Kh�Nh�K hԌ2019-11-04T13:21:54.514000�h�K h�K h�]�hډh�K h�K h�}�(hߌotxrobottwo�h�h�bhttps://otx20-web-media.s3.amazonaws.com/media/avatars/user_78495/resized/80/avatar_ba5a8acdbd.png�h�hɌ78495�uh�Ku}�(h�}�(�URL�K�FileHash-MD5�Kh�Kuh��web�h��white�h�h�h�Kh�]�h�K h�]�h��h�K h��
197 days ago �h�Nh�]�hcah�]�h�]�}�(hΌDCT Security Team�h�Mfuah�K h�K hňhƉh�h�hɌ5d41d77901a2f8c6e9b650e9�h�]�h�K h�hVhό2019-07-31T18:01:29.744000�h�Kh�Nh�K hԌ2019-07-31T18:01:29.744000�h�K h�Kh�]�hڈh�K h�K h�}�(hߌmattvittitoe�h�h�;https://otx.alienvault.com/assets/images/default-avatar.png�h�hɌ79520�uh�Kueu�continent_code��NA��latitude�G@Ay���postal_code��90017�� longitude�G�]����o�country_code��US��flag_url��/assets/images/flags/us.png��asn��AS63023 AS-GLOBALTELEHOST�� city_data��� indicator��38.75.137.9��subdivision��CA��whois��(http://whois.domaintools.com/38.75.137.9��
type_title��IPv4��region��CA��charset�K �dma_code�M#�
country_code3��USA��
country_code2��US��
reputation�K �base_indicator�}�(j �38.75.137.9�h�hȌtitle�hȌ
access_reason�hȌaccess_type��public��content�hȌtype��IPv4�h�J��~u�country_name��
United States�j8 �IPv4��
flag_title��
United States�u}�(�undetected_downloaded_samples�]�}�(�date��2019-05-21 00:09:53�� positives�K �total�KJ�sha256��@a1d0a5484e67d6edc72cd833e976afc0d48afc3cb85670089d3d61e0c139fcc2�ua�whois_timestamp�J@&^�detected_downloaded_samples�]��detected_referrer_samples�]��undetected_referrer_samples�]�}�(jC �2020-01-25 22:56:09�jE K jF KKjG �@377a186186af2c284e7a78cfba6e410e09ea7eab760e15b056615bdf8e8abf20�ua�resolutions�]�(}�(�
last_resolved��2019-11-04 21:40:19��hostname�� 11avs.xyz�u}�(jV �2019-11-29 20:26:09�jX �
201avs.com�u}�(jV �2019-11-04 19:16:49�jX � 51avs.com�u}�(jV �2019-06-03 15:30:36�jX �internetpunishment.com�u}�(jV �2019-06-11 18:33:43�jX �palettehydrogen.com�u}�(jV �2019-09-25 09:19:26�jX �r.twotouchauthentication.online�ue�detected_communicating_samples�]�(}�(jC �2019-09-22 05:59:11�jE K5jF KHjG �@9966276265a2e9303f3120285d98e559b6dddb920f03343f7d7e5ca862634a72�u}�(jC �2019-09-21 08:18:33�jE K4jF KFjG �@acb3103f32aeec8906db56ce0fbc4101ba0432e532044b287996d7f7e63c9df5�u}�(jC �2019-09-19 02:43:25�jE K1jF KFjG �@b317dce7f758f4b019825ffeee17431ba40d7a65100f0f25c457b4f8ce571b4c�ue� continent��NA��asn�M/��whois�X� NetRange: 38.0.0.0 - 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS: AS174
Organization: PSINet, Inc. (PSI)
RegDate: 1991-04-16
Updated: 2018-06-20
Comment: IP allocations within 38.0.0.0/8 are used for Cogent customer static IP assignments.
Comment:
Comment: Reassignment information for this block can be found at
Comment: rwhois.cogentco.com 4321
Ref: https://rdap.arin.net/registry/ip/38.0.0.0
OrgName: PSINet, Inc.
OrgId: PSI
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate:
Updated: 2015-06-04
Comment: rwhois.cogentco.com
Ref: https://rdap.arin.net/registry/entity/PSI
ReferralServer: rwhois://rwhois.cogentco.com:4321
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
OrgNOCPhone: +1-877-875-4311
OrgNOCEmail: noc@cogentco.com
OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN
OrgAbuseHandle: COGEN-ARIN
OrgAbuseName: Cogent Abuse
OrgAbusePhone: +1-877-875-4311
OrgAbuseEmail: abuse@cogentco.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN
OrgTechHandle: IPALL-ARIN
OrgTechName: IP Allocation
OrgTechPhone: +1-877-875-4311
OrgTechEmail: ipalloc@cogentco.com
OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN
RTechHandle: PSI-NISC-ARIN
RTechName: IP Allocation
RTechPhone: +1-877-875-4311
RTechEmail: ipalloc@cogentco.com
RTechRef: https://rdap.arin.net/registry/entity/PSI-NISC-ARIN
��undetected_urls�]�(]�(�http://38.75.137.9:9088/��@3d5edb0e0bb726e414a9b76dac619c12f5cf86a100b479dab4907958634f55d9�K KG�2019-07-31 17:22:40�e]�(�8http://38.75.137.9:9088/js/7cup1qg4cnk636f9nlddc1ou04.js��@f9ebdb5b362a1028f458896060ddc7f49caae5b9a3c1b55ba67c08840b1f910c�K KG�2019-07-31 12:49:13�e]�(�8http://38.75.137.9:9088/js/ghr3oiksiuklq0cpv92slh5u5s.js��@5b7307df422f0136246d93c05983bba92f9f59a9bbcadfbf51fe229c05aab116�K KG�2019-07-31 01:22:41�e]�(�!http://38.75.137.9:9088/index.php��@2c9bc9b6d1de9b64d60737aad0631733f59d785de05e95999fd5f2d54fbb4692�K KG�2019-07-31 01:08:56�e]�(�8http://38.75.137.9:9088/js/qr7ahpbm0efj7qf2ib98ieiab4.js��@973c9d4ce84a0d4f882ea8ee6b7ae22997d04ed91fae7d59f63941b6a8b4d0a7�K KG�2019-07-30 19:22:40�e]�(��http://38.75.137.9:9088/index.php?ad_id=wB6wi9PDSe5-X_QVxf-Fpg&re=wB6wi9PDSe5-X_QVxf-Fpg&rt=wB6wi9PDSe5-X_QVxf-Fpg&id=9088&zone=wB6wi9PDSe5-X_QVxf-Fpg&prod=wB6wi9PDSe5-X_QVxf-Fpg&lp=Type&st=wB6wi9PDSe5-X_QVxf-Fpg&e=1564325563&y=203384517502��@5e8b6dad324ce55a2ec856fbc6749a2702e7d6260dbcf3bc7603f8b7d5920d46�K KG�2019-07-29 00:35:44�e]�(�8http://38.75.137.9:9088/js/cg0e1e22ao016ueuqs1h0ehfgc.js��@07147d1d5eb564ee70be917b5046807e1089021f174b9b7c780c67f2eecb28f6�K KG�2019-07-28 09:57:56�e]�(�8http://38.75.137.9:9088/js/90r7d8ot58e6q1so1vbcvf4tog.js��@86ec01c6f54ef14ba6f00a0f8f376789ecbc705ba06bd9962b408276d8da5ca8�K KG�2019-07-26 19:00:38�e]�(�<http://38.75.137.9:9088/views/3a26c3dqrftuj9622ihrqkb45o.wav��@de15f5e854f7e218e4e39a13197574c6aca00e8aab1037462b3d772235302e70�K KG�2019-07-24 12:34:45�e]�(�<http://38.75.137.9:9088/views/pssmghf6g5k8ar3eu13u4f7848.swf��@b8ebec4fe09b0cd59e828028b5f8537b23ae1ea266c27998a0680c40578fb5d4�K KG�2019-07-24 12:31:33�e]�(��http://38.75.137.9:9088/index.php?ad_id=bRZMAqo_RoaNQchPH3TF4g&re=bRZMAqo_RoaNQchPH3TF4g&rt=bRZMAqo_RoaNQchPH3TF4g&id=9088&zone=bRZMAqo_RoaNQchPH3TF4g&prod=bRZMAqo_RoaNQchPH3TF4g&lp=Type&st=bRZMAqo_RoaNQchPH3TF4g&e=1563793061&y=203383985000��@d420ee1405f0c392ec28a3f9a43a6645b67408c6c49562d2a2c8ec7eba63554e�K KG�2019-07-23 08:12:50�e]�(�3http://38.75.137.9/js/o88om4nmcc5gumefenbaqkghdk.js��@f2a1ea4d96acac7d9703cc41ffda4e778d0b00033e6db93f082316981cebf010�K KF�2019-07-17 15:07:05�e]�(�http://38.75.137.9/index.php��@0da2acb243636b723bdf2b032db62ad36b96c1f8891b3e50663f85b189558d65�K KF�2019-07-08 05:48:02�ee�network��38.75.136.0/23��country��US��
response_code�K�as_owner��GTHost��verbose_msg�hf�
detected_urls�]�(}�(�url�hjjE KjF KH� scan_date��2020-01-28 09:17:39�u}�(j� hkjE KjF KGj� �2019-08-28 04:35:21�u}�(j� hljE KjF KGj� �2019-08-20 06:16:54�u}�(j� hmjE KjF KGj� �2019-08-16 02:18:52�u}�(j� hnjE KjF KGj� �2019-08-11 05:16:47�u}�(j� hojE KjF KGj� �2019-08-09 01:44:05�u}�(j� hpjE KjF KGj� �2019-08-06 02:33:22�u}�(j� hqjE KjF KGj� �2019-08-05 22:25:08�u}�(j� hrjE KjF KGj� �2019-08-05 01:57:50�u}�(j� hsjE KjF KGj� �2019-08-04 19:33:31�u}�(j� htjE KjF KGj� �2019-08-02 20:57:56�u}�(j� hujE KjF KGj� �2019-08-02 08:21:03�u}�(j� hvjE KjF KGj� �2019-08-01 14:58:28�u}�(j� hwjE KjF KGj� �2019-08-01 14:51:54�u}�(j� hxjE KjF KGj� �2019-08-01 08:56:54�u}�(j� hyjE KjF KGj� �2019-07-31 00:22:07�u}�(j� hzjE KjF KGj� �2019-07-30 17:16:09�u}�(j� h{jE KjF KGj� �2019-07-30 17:15:06�u}�(j� h|jE KjF KGj� �2019-07-30 17:14:04�u}�(j� h}jE KjF KGj� �2019-07-30 17:12:02�u}�(j� h~jE KjF KGj� �2019-07-30 17:09:09�u}�(j� hjE KjF KGj� �2019-07-30 17:06:42�u}�(j� h�jE KjF KFj� �2019-07-23 06:20:00�ue� undetected_communicating_samples�]�}�(jC �2019-09-21 08:04:48�jE K jF K jG �@2cd01e3f17733d477a82ef5522c9646fa3c503ac8de7ed96c0af5d881e58a2ef�uau}�(�ip��38.75.137.9��history�]�(}�(�created��2012-03-22T07:26:00.000Z��reason��Regional Internet Registry��geo�}�(�country��
United States��countrycode��US�uj� �
38.0.0.0/8��categoryDescriptions�}��reasonDescription��BOne of the five RIRs announced a (new) location mapping of the IP.��score�K�cats�}�u}�(j� �2017-07-26T06:24:00.000Z�j� �Regional Internet Registry��asns�}��174�}�(�Company��&COGENT-174 - Cogent Communications, US��cidr�Kusj� }�(j� �
United States�j� �US�uj� �
38.0.0.0/8�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�u}�(j� �2017-10-10T06:23:00.000Z�j� �Regional Internet Registry�j� }�(j� �
United States�j� �US�uj� �
38.0.0.0/8�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�u}�(j� �2017-10-18T06:23:00.000Z�j� �Regional Internet Registry�j }�j }�(j
�&COGENT-174 - Cogent Communications, US�j Kusj� }�(j� �
United States�j� �US�uj� �
38.0.0.0/8�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�u}�(j� �2019-05-19T06:52:00.000Z�j� �Regional Internet Registry�j� }�(j� �
United States�j� �US�uj� �38.75.136.0/23�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�u}�(j� �2019-05-21T14:39:00.000Z�j� �Regional Internet Registry�j� }�(j� �
United States�j� �US�uj� �38.75.136.0/23�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�u}�(j� �2020-01-17T09:09:00.000Z�j� �Regional Internet Registry�j� }�(j� �
United States�j� �US�uj� �38.75.136.0/23�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�ue�subnets�]�(}�(j� �2020-01-17T09:09:00.000Z�j� �Regional Internet Registry��reason_removed��j }�j }�(�removed��j Kusj� }�(j� �
United States�j� �US�uj� �38.0.0.0�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }��subnet��
38.0.0.0/8�u}�(j� �2020-01-17T09:09:00.000Z�j� �Regional Internet Registry�jQ �j }��63023�}�(jT �j Kusj� �38.75.136.0�j� }�j �BOne of the five RIRs announced a (new) location mapping of the IP.�j Kj }�j\ �38.75.136.0/23�uej }�j� }�(j� �
United States�j� �US�uj Kj� h�j h�j� }��tags�]�uNNN�Ehttps://otx.alienvault.com/api/v1/indicators/IPv4/38.75.137.9/general��5https://www.virustotal.com/vtapi/v2/ip-address/report��/https://api.xforce.ibmcloud.com/ipr/38.75.137.9�NN�+https://check.torproject.org/exit-addresses�K K K K KK et�ba]�h
h}�(hhhK ��h��R�(KK
��h!�]�(h%h&h'h(h)h*h+h,h-h.et�bh0Nu��R�a}��0.14.1�}�(�axes�h
�blocks�]�}�(�values�hE�mgr_locs��builtins��slice���K K
K��R�uaust�b�_typ�� dataframe�� _metadata�]��attrs�}�ub.