| Category | Description |
|---|---|
| Certificates | SSL certificates fields and related hashes to them |
| Malware | Malware details of Hunt signatures hits |
| JARM | JARM hashes |
| Protocol | Protocol payloads detected on the IP |
| HTTP | Details about any HTTP data returned |
| Opendir | Open Directories detected on IP from AttackCapture^TM^ |
| Phishing | Phishing infrastructure found on the IP |
| Honey Pots | Inbound requests from the IP address to Honey Pots |
| Category | Description |
|---|---|
| Certificates | SSL certificates fields and related hashes to them |
| Malware | Malware details of Hunt signatures hits |
| JARM | JARM hashes |
| Protocol | Protocol payloads detected on the IP |
| HTTP | Details about any HTTP data returned |
| Opendir | Open Directories detected on IP from AttackCapture^TM^ |
| Phishing | Phishing infrastructure found on the IP |
| Honey Pots | Inbound requests from the IP address to Honey Pots |
Related Post
Find the threat
before it finds you
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

Find the threat
before it finds you
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

Find the threat
before it finds you
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

Resources
©2025 Hunt Intelligence, Inc.
