For researchers and threat hunters focused on malicious infrastructures, Hunt's Advanced Search provides essential functions, facilitating nuanced analysis and discovery. This feature supports intricate queries across diverse data points, enhancing the efficiency and depth of cyber threat investigations.
Embedded within Hunt.io's dashboard, the Real Time Stats widget details operations per second alongside a suite of crucial metrics to uncover malicious infrastructure.
Click on STATS to view the real-time details page.
Per second is the sum of all the parts listed below.
Ports that reply as being open. We are scanning segments of the entire internet very fast. We are currently tweaking and tuning scanning cadence to see malicious activity.
Custom protocol detector that’s made to be fast and extensible. Later we can use it to find custom C2 protocols or other malicious signs running it on every unknown port.
Grabs of full HTML content.
Public SSH keys used to associate malicious activity and look for tenant change on a server.
Large scale collection of TLS fingerprints to give us an idea that a piece of software might be associated or malicious.
Parsed SSL certificates to break out identifying items in each certificate.
Please read more about our platform statistics on our blog post: https://hunt.io/blog/hunt-platform-statistics


