Details

_id 5e7a915b11acca7063dbbac3
reference ['https://www.virustotal.com/gui/url/18d1c1327cb69e389de5172461cb6536a875788f23af5eadf1675b6a724d26b7/details']
md5 []
sha1 []
sha256 ['18d1c1327cb69e389de5172461cb6536a875788f23af5eadf1675b6a724d26b7']
mail []
ip ['134.122.25.145']
domain ['lol.tf']
url ['https://lol.tf/eRrlQF1.botnet']
user bad_packets
tweet Active DDoS malware payload detected: https://lol.tf/eRrlQF1.botnet Hosting provider: Shock Hosting (AS395092) VirusTotal URL detections: 0 ( https://www.virustotal.com/gui/url/18d1c1327cb69e389de5172461cb6536a875788f23af5eadf1675b6a724d26b7/details …) Exploit attempt source IP: 134.122.25.145 () Vulnerability exploited: MVPower DVR (JAWS) RCE #threatintel pic.twitter.com/DkEhbZDxH9
id 1242518187788226560
retweets 5
favorites 8
link https://twitter.com/bad_packets/status/1242518187788226560
mentions []
hashtags ['#threatintel']
timestamp 1585074395
date 2020-03-24 19:26:35

Tweet