tutorials-and-examples/example-notebooks/data/ti_results_ipv4.pkl (107 lines of code) (raw):

��v:�pandas.core.frame�� DataFrame���)��}�(�_data��pandas.core.internals.managers�� BlockManager���)��(]�(�pandas.core.indexes.base�� _new_Index���h �Index���}�(�data��numpy.core.multiarray�� _reconstruct����numpy��ndarray���K��Cb���R�(KK ��h�dtype����O8�KK��R�(K�|�NNNJ����J����K?t�b�]�(�Ioc��IocType�� QuerySubtype��Provider��Result��Severity��Details�� RawResult�� Reference��Status�et�b�name�Nu��R�h h}�(hhhK��h��R�(KK��h!�]�(�OTX�� VirusTotal��XForce��AzSTI��OPR��Tor�et�bh0Nu��R�e]�hhK��h��R�(KK K��h!�]�(� 38.75.137.9�hHhHhHhHhH�ipv4�hIhIhIhIhINNNNNN�OTX�� VirusTotal��XForce��AzSTI��OPR��Tor�������KKKKKK}�(� pulse_count�K�names�]�(�$Underminer.EK - Exploit Kit IOC Feed��$Underminer.EK - Exploit Kit IOC Feed�� Underminer EK�e�tags�]�(]�� Underminer.EK�a]�� Underminer.EK�a]�e� references�]�(]�]�]��Vhttps://blog.malwarebytes.com/threat-analysis/2019/07/exploit-kits-summer-2019-review/�aeu}�(� verbose_msg��IP address in dataset�� response_code�K� detected_urls�]�(�http://38.75.137.9/��Ihttp://38.75.137.9:9088/pubs/wiki.php?id=937a4eadd6f5a94b3738a58dcc79ca13��<http://38.75.137.9:9088/views/q5ul78uv4b4q8bg8d95canrsns.jpg��?http://38.75.137.9:9088%20/views/q5ul78uv4b4q8bg8d95canrsns.jpg��8http://38.75.137.9:9088/js/i7gb3alc7blgibsnfv2kag8er4.js��8http://38.75.137.9:9088/js/a1po3dnem5l1if2f411pr4q22o.js��8http://38.75.137.9:9088/js/dnmuj0c6a4853jnjfgfg666evg.js��8http://38.75.137.9:9088/js/0s6qod8qsa6q3l16ftk9fhdf1g.js��8http://38.75.137.9:9088/js/ekrsh4m5g1r2gqfr9vkhlajdbc.js��8http://38.75.137.9:9088/js/q95pceh704tago6819matbsrac.js��8http://38.75.137.9:9088/js/g0slmfo8o1ob2d8g471hdt4i3s.js��8http://38.75.137.9:9088/js/rif766i0nvahde8enqu2phrjh8.js��8http://38.75.137.9:9088/js/8djjf9bb1o5p8to1jn3hd0p6q0.js��8http://38.75.137.9:9088/js/6ierns0a5no5k5b1s20vopceq4.js��8http://38.75.137.9:9088/js/lbg61eg2mjdpiihj29itatqbp0.js�� http://38.75.137.9:9088/logo.swf��=http://38.75.137.9:9088/views/dlke6si3fr3spi30btq624ghlg.html���http://38.75.137.9:9088/pubs/servlet.php?fp=39fe6ccb473b08362ae067b8c0ee865d&amp;amp;lang=en-US&amp;amp;token=&amp;amp;id=49457&amp;amp;sign=5eed006ae06584a03f969b9cd3558c28&amp;amp;validate=13b96b0bb8ac2a105d07f7c8b701f240��<http://38.75.137.9:9088/views/m7sg0k3fcvrdre8psojjlu8r2c.txt��?http://38.75.137.9:9088/views/ul2tuocpr2isi9pperindatp3c.ocx.gz��Lhttp://38.75.137.9:9088/pubs/article.php?id=471b68c405614637d03b31b4d3155244��Ihttp://38.75.137.9:9088/pubs/wiki.php?id=91f093921cbb802ee2d2a22d8a4a1135��3http://38.75.137.9/js/6aifr6hl9870452b0u0rsfjca8.js�e� positives�K!u}�(�score�K�cats�}��categoryDescriptions�}��reason��Regional Internet Registry��reasonDescription��BOne of the five RIRs announced a (new) location mapping of the IP.�hW]�u� Not found.��IoC type ipv4 not supported.�� Not found.�}�(�sections�]�(�general��geo�� reputation��url_list�� passive_dns��malware�� nids_list�� http_scans�e�city�� Los Angeles�� area_code�K�accuracy_radius�M�� pulse_info�}�(�count�K� references�]��Vhttps://blog.malwarebytes.com/threat-analysis/2019/07/exploit-kits-summer-2019-review/�a�pulses�]�(}�(�indicator_type_counts�}�(�domain�K�hostname�K�IPv4�Ku� pulse_source��api��TLP��white�� description��=IPs and hostnames for the Exploit Kit known as Underminer.EK.��subscriber_count�K5�tags�]�hZa� export_count�K�malware_families�]�� is_modified��� upvotes_count�K� modified_text��7 minutes ago ��is_subscribing�Nh�]��targeted_countries�]��groups�]��vote�K�validator_count�K�threat_hunter_scannable��� is_author��� adversary����id��5d4d8ccdbe24622d01f9ce9f�� industries�]��locked�K�name�hT�created��2019-08-09T15:10:05.503000��threat_hunter_has_agents�K� cloned_from�N�downvotes_count�K�modified��2020-02-14T00:01:10.497000�� comment_count�K�indicator_count�K � attack_ids�]��in_group���follower_count�K� votes_count�K�author�}�(�username��otxrobottwo_testing�� is_subscribed��� avatar_url��;https://otx.alienvault.com/assets/images/default-avatar.png�� is_following��hɌ83138�u�public�Ku}�(h�}�(h�Kh�Kh�Kuh��api�h��white�h��=IPs and hostnames for the Exploit Kit known as Underminer.EK.�h�K�h�]�h\ah�Kh�]�h��h�Kh�� 101 days ago �h�Nh�]�h�]�h�]�h�Kh�KhňhƉh�h�hɌ5db816cba3e59aeced1fad16�h�]�h�Kh�hUhό2019-10-29T10:39:07.558000�h�Kh�Nh�KhԌ2019-11-04T13:21:54.514000�h�Kh�K h�]�hډh�Kh�Kh�}�(hߌ otxrobottwo�h�h�bhttps://otx20-web-media.s3.amazonaws.com/media/avatars/user_78495/resized/80/avatar_ba5a8acdbd.png�h�hɌ78495�uh�Ku}�(h�}�(�URL�K� FileHash-MD5�Kh�Kuh��web�h��white�h�h�h�Kh�]�h�Kh�]�h��h�Kh�� 197 days ago �h�Nh�]�hcah�]�h�]�}�(hΌDCT Security Team�h�Mfuah�Kh�KhňhƉh�h�hɌ5d41d77901a2f8c6e9b650e9�h�]�h�Kh�hVhό2019-07-31T18:01:29.744000�h�Kh�Nh�KhԌ2019-07-31T18:01:29.744000�h�Kh�Kh�]�hڈh�Kh�Kh�}�(hߌ mattvittitoe�h�h�;https://otx.alienvault.com/assets/images/default-avatar.png�h�hɌ79520�uh�Kueu�continent_code��NA��latitude�G@Ay�� � postal_code��90017�� longitude�G�]����o� country_code��US��flag_url��/assets/images/flags/us.png��asn��AS63023 AS-GLOBALTELEHOST�� city_data��� indicator�� 38.75.137.9�� subdivision��CA��whois��(http://whois.domaintools.com/38.75.137.9�� type_title��IPv4��region��CA��charset�K�dma_code�M#� country_code3��USA�� country_code2��US�� reputation�K�base_indicator�}�(j� 38.75.137.9�h�hȌtitle�hȌ access_reason�hȌ access_type��public��content�hȌtype��IPv4�h�J��~u� country_name�� United States�j8�IPv4�� flag_title�� United States�u}�(�undetected_downloaded_samples�]�}�(�date��2019-05-21 00:09:53�� positives�K�total�KJ�sha256��@a1d0a5484e67d6edc72cd833e976afc0d48afc3cb85670089d3d61e0c139fcc2�ua�whois_timestamp�J@&^�detected_downloaded_samples�]��detected_referrer_samples�]��undetected_referrer_samples�]�}�(jC�2020-01-25 22:56:09�jEKjFKKjG�@377a186186af2c284e7a78cfba6e410e09ea7eab760e15b056615bdf8e8abf20�ua� resolutions�]�(}�(� last_resolved��2019-11-04 21:40:19��hostname�� 11avs.xyz�u}�(jV�2019-11-29 20:26:09�jX� 201avs.com�u}�(jV�2019-11-04 19:16:49�jX� 51avs.com�u}�(jV�2019-06-03 15:30:36�jX�internetpunishment.com�u}�(jV�2019-06-11 18:33:43�jX�palettehydrogen.com�u}�(jV�2019-09-25 09:19:26�jX�r.twotouchauthentication.online�ue�detected_communicating_samples�]�(}�(jC�2019-09-22 05:59:11�jEK5jFKHjG�@9966276265a2e9303f3120285d98e559b6dddb920f03343f7d7e5ca862634a72�u}�(jC�2019-09-21 08:18:33�jEK4jFKFjG�@acb3103f32aeec8906db56ce0fbc4101ba0432e532044b287996d7f7e63c9df5�u}�(jC�2019-09-19 02:43:25�jEK1jFKFjG�@b317dce7f758f4b019825ffeee17431ba40d7a65100f0f25c457b4f8ce571b4c�ue� continent��NA��asn�M/��whois�X�NetRange: 38.0.0.0 - 38.255.255.255 CIDR: 38.0.0.0/8 NetName: COGENT-A NetHandle: NET-38-0-0-0-1 Parent: () NetType: Direct Allocation OriginAS: AS174 Organization: PSINet, Inc. (PSI) RegDate: 1991-04-16 Updated: 2018-06-20 Comment: IP allocations within 38.0.0.0/8 are used for Cogent customer static IP assignments. Comment: Comment: Reassignment information for this block can be found at Comment: rwhois.cogentco.com 4321 Ref: https://rdap.arin.net/registry/ip/38.0.0.0 OrgName: PSINet, Inc. OrgId: PSI Address: 2450 N Street NW City: Washington StateProv: DC PostalCode: 20037 Country: US RegDate: Updated: 2015-06-04 Comment: rwhois.cogentco.com Ref: https://rdap.arin.net/registry/entity/PSI ReferralServer: rwhois://rwhois.cogentco.com:4321 OrgNOCHandle: ZC108-ARIN OrgNOCName: Cogent Communications OrgNOCPhone: +1-877-875-4311 OrgNOCEmail: noc@cogentco.com OrgNOCRef: https://rdap.arin.net/registry/entity/ZC108-ARIN OrgAbuseHandle: COGEN-ARIN OrgAbuseName: Cogent Abuse OrgAbusePhone: +1-877-875-4311 OrgAbuseEmail: abuse@cogentco.com OrgAbuseRef: https://rdap.arin.net/registry/entity/COGEN-ARIN OrgTechHandle: IPALL-ARIN OrgTechName: IP Allocation OrgTechPhone: +1-877-875-4311 OrgTechEmail: ipalloc@cogentco.com OrgTechRef: https://rdap.arin.net/registry/entity/IPALL-ARIN RTechHandle: PSI-NISC-ARIN RTechName: IP Allocation RTechPhone: +1-877-875-4311 RTechEmail: ipalloc@cogentco.com RTechRef: https://rdap.arin.net/registry/entity/PSI-NISC-ARIN ��undetected_urls�]�(]�(�http://38.75.137.9:9088/��@3d5edb0e0bb726e414a9b76dac619c12f5cf86a100b479dab4907958634f55d9�KKG�2019-07-31 17:22:40�e]�(�8http://38.75.137.9:9088/js/7cup1qg4cnk636f9nlddc1ou04.js��@f9ebdb5b362a1028f458896060ddc7f49caae5b9a3c1b55ba67c08840b1f910c�KKG�2019-07-31 12:49:13�e]�(�8http://38.75.137.9:9088/js/ghr3oiksiuklq0cpv92slh5u5s.js��@5b7307df422f0136246d93c05983bba92f9f59a9bbcadfbf51fe229c05aab116�KKG�2019-07-31 01:22:41�e]�(�!http://38.75.137.9:9088/index.php��@2c9bc9b6d1de9b64d60737aad0631733f59d785de05e95999fd5f2d54fbb4692�KKG�2019-07-31 01:08:56�e]�(�8http://38.75.137.9:9088/js/qr7ahpbm0efj7qf2ib98ieiab4.js��@973c9d4ce84a0d4f882ea8ee6b7ae22997d04ed91fae7d59f63941b6a8b4d0a7�KKG�2019-07-30 19:22:40�e]�(��http://38.75.137.9:9088/index.php?ad_id=wB6wi9PDSe5-X_QVxf-Fpg&re=wB6wi9PDSe5-X_QVxf-Fpg&rt=wB6wi9PDSe5-X_QVxf-Fpg&id=9088&zone=wB6wi9PDSe5-X_QVxf-Fpg&prod=wB6wi9PDSe5-X_QVxf-Fpg&lp=Type&st=wB6wi9PDSe5-X_QVxf-Fpg&e=1564325563&y=203384517502��@5e8b6dad324ce55a2ec856fbc6749a2702e7d6260dbcf3bc7603f8b7d5920d46�KKG�2019-07-29 00:35:44�e]�(�8http://38.75.137.9:9088/js/cg0e1e22ao016ueuqs1h0ehfgc.js��@07147d1d5eb564ee70be917b5046807e1089021f174b9b7c780c67f2eecb28f6�KKG�2019-07-28 09:57:56�e]�(�8http://38.75.137.9:9088/js/90r7d8ot58e6q1so1vbcvf4tog.js��@86ec01c6f54ef14ba6f00a0f8f376789ecbc705ba06bd9962b408276d8da5ca8�KKG�2019-07-26 19:00:38�e]�(�<http://38.75.137.9:9088/views/3a26c3dqrftuj9622ihrqkb45o.wav��@de15f5e854f7e218e4e39a13197574c6aca00e8aab1037462b3d772235302e70�KKG�2019-07-24 12:34:45�e]�(�<http://38.75.137.9:9088/views/pssmghf6g5k8ar3eu13u4f7848.swf��@b8ebec4fe09b0cd59e828028b5f8537b23ae1ea266c27998a0680c40578fb5d4�KKG�2019-07-24 12:31:33�e]�(��http://38.75.137.9:9088/index.php?ad_id=bRZMAqo_RoaNQchPH3TF4g&re=bRZMAqo_RoaNQchPH3TF4g&rt=bRZMAqo_RoaNQchPH3TF4g&id=9088&zone=bRZMAqo_RoaNQchPH3TF4g&prod=bRZMAqo_RoaNQchPH3TF4g&lp=Type&st=bRZMAqo_RoaNQchPH3TF4g&e=1563793061&y=203383985000��@d420ee1405f0c392ec28a3f9a43a6645b67408c6c49562d2a2c8ec7eba63554e�KKG�2019-07-23 08:12:50�e]�(�3http://38.75.137.9/js/o88om4nmcc5gumefenbaqkghdk.js��@f2a1ea4d96acac7d9703cc41ffda4e778d0b00033e6db93f082316981cebf010�KKF�2019-07-17 15:07:05�e]�(�http://38.75.137.9/index.php��@0da2acb243636b723bdf2b032db62ad36b96c1f8891b3e50663f85b189558d65�KKF�2019-07-08 05:48:02�ee�network��38.75.136.0/23��country��US�� response_code�K�as_owner��GTHost�� verbose_msg�hf� detected_urls�]�(}�(�url�hjjEKjFKH� scan_date��2020-01-28 09:17:39�u}�(j�hkjEKjFKGj��2019-08-28 04:35:21�u}�(j�hljEKjFKGj��2019-08-20 06:16:54�u}�(j�hmjEKjFKGj��2019-08-16 02:18:52�u}�(j�hnjEKjFKGj��2019-08-11 05:16:47�u}�(j�hojEKjFKGj��2019-08-09 01:44:05�u}�(j�hpjEKjFKGj��2019-08-06 02:33:22�u}�(j�hqjEKjFKGj��2019-08-05 22:25:08�u}�(j�hrjEKjFKGj��2019-08-05 01:57:50�u}�(j�hsjEKjFKGj��2019-08-04 19:33:31�u}�(j�htjEKjFKGj��2019-08-02 20:57:56�u}�(j�hujEKjFKGj��2019-08-02 08:21:03�u}�(j�hvjEKjFKGj��2019-08-01 14:58:28�u}�(j�hwjEKjFKGj��2019-08-01 14:51:54�u}�(j�hxjEKjFKGj��2019-08-01 08:56:54�u}�(j�hyjEKjFKGj��2019-07-31 00:22:07�u}�(j�hzjEKjFKGj��2019-07-30 17:16:09�u}�(j�h{jEKjFKGj��2019-07-30 17:15:06�u}�(j�h|jEKjFKGj��2019-07-30 17:14:04�u}�(j�h}jEKjFKGj��2019-07-30 17:12:02�u}�(j�h~jEKjFKGj��2019-07-30 17:09:09�u}�(j�hjEKjFKGj��2019-07-30 17:06:42�u}�(j�h�jEKjFKFj��2019-07-23 06:20:00�ue� undetected_communicating_samples�]�}�(jC�2019-09-21 08:04:48�jEKjFKjG�@2cd01e3f17733d477a82ef5522c9646fa3c503ac8de7ed96c0af5d881e58a2ef�uau}�(�ip�� 38.75.137.9��history�]�(}�(�created��2012-03-22T07:26:00.000Z��reason��Regional Internet Registry��geo�}�(�country�� United States�� countrycode��US�uj�� 38.0.0.0/8��categoryDescriptions�}��reasonDescription��BOne of the five RIRs announced a (new) location mapping of the IP.��score�K�cats�}�u}�(j��2017-07-26T06:24:00.000Z�j��Regional Internet Registry��asns�}��174�}�(�Company��&COGENT-174 - Cogent Communications, US��cidr�Kusj�}�(j�� United States�j��US�uj�� 38.0.0.0/8�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�u}�(j��2017-10-10T06:23:00.000Z�j��Regional Internet Registry�j�}�(j�� United States�j��US�uj�� 38.0.0.0/8�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�u}�(j��2017-10-18T06:23:00.000Z�j��Regional Internet Registry�j }�j }�(j �&COGENT-174 - Cogent Communications, US�jKusj�}�(j�� United States�j��US�uj�� 38.0.0.0/8�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�u}�(j��2019-05-19T06:52:00.000Z�j��Regional Internet Registry�j�}�(j�� United States�j��US�uj��38.75.136.0/23�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�u}�(j��2019-05-21T14:39:00.000Z�j��Regional Internet Registry�j�}�(j�� United States�j��US�uj��38.75.136.0/23�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�u}�(j��2020-01-17T09:09:00.000Z�j��Regional Internet Registry�j�}�(j�� United States�j��US�uj��38.75.136.0/23�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�ue�subnets�]�(}�(j��2020-01-17T09:09:00.000Z�j��Regional Internet Registry��reason_removed��j }�j }�(�removed��jKusj�}�(j�� United States�j��US�uj��38.0.0.0�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}��subnet�� 38.0.0.0/8�u}�(j��2020-01-17T09:09:00.000Z�j��Regional Internet Registry�jQ�j }��63023�}�(jT�jKusj�� 38.75.136.0�j�}�j�BOne of the five RIRs announced a (new) location mapping of the IP.�jKj}�j\�38.75.136.0/23�uej}�j�}�(j�� United States�j��US�ujKj�h�jh�j�}��tags�]�uNNN�Ehttps://otx.alienvault.com/api/v1/indicators/IPv4/38.75.137.9/general��5https://www.virustotal.com/vtapi/v2/ip-address/report��/https://api.xforce.ibmcloud.com/ipr/38.75.137.9�NN�+https://check.torproject.org/exit-addresses�KKKKKKet�ba]�h h}�(hhhK��h��R�(KK ��h!�]�(h%h&h'h(h)h*h+h,h-h.et�bh0Nu��R�a}��0.14.1�}�(�axes�h �blocks�]�}�(�values�hE�mgr_locs��builtins��slice���KK K��R�uaust�b�_typ�� dataframe�� _metadata�]��attrs�}�ub.