TABLE OF CONTENTS
Real Time Stats
Real Time Stats
For researchers and threat hunters focused on malicious infrastructures, Hunt's Advanced Search provides essential functions, facilitating nuanced analysis and discovery. This feature supports intricate queries across diverse data points, enhancing the efficiency and depth of cyber threat investigations.
For researchers and threat hunters focused on malicious infrastructures, Hunt's Advanced Search provides essential functions, facilitating nuanced analysis and discovery. This feature supports intricate queries across diverse data points, enhancing the efficiency and depth of cyber threat investigations.
Dashboard Widget
Dashboard Widget
Embedded within Hunt.io's dashboard, the Real Time Stats widget details operations per second alongside a suite of crucial metrics to uncover malicious infrastructure.
Embedded within Hunt.io's dashboard, the Real Time Stats widget details operations per second alongside a suite of crucial metrics to uncover malicious infrastructure.
Click on STATS to view the real-time details page.
Click on STATS to view the real-time details page.
Real Time Statistics Details
Real Time Statistics Details
Platform wide observations
Platform wide observations
Per second is the sum of all the parts listed below.
Per second is the sum of all the parts listed below.
Port Scans found
Port Scans found
Ports that reply as being open. We are scanning segments of the entire internet very fast. We are currently tweaking and tuning scanning cadence to see malicious activity.
Ports that reply as being open. We are scanning segments of the entire internet very fast. We are currently tweaking and tuning scanning cadence to see malicious activity.
Protocol detection
Protocol detection
Custom protocol detector that’s made to be fast and extensible. Later we can use it to find custom C2 protocols or other malicious signs running it on every unknown port.
Custom protocol detector that’s made to be fast and extensible. Later we can use it to find custom C2 protocols or other malicious signs running it on every unknown port.
HTTP pages
HTTP pages
Grabs of full HTML content.
Grabs of full HTML content.
SSH keys
SSH keys
Public SSH keys used to associate malicious activity and look for tenant change on a server.
Public SSH keys used to associate malicious activity and look for tenant change on a server.
JARM hashes
JARM hashes
Large scale collection of TLS fingerprints to give us an idea that a piece of software might be associated or malicious.
Large scale collection of TLS fingerprints to give us an idea that a piece of software might be associated or malicious.
Parsed certificates
Parsed certificates
Parsed SSL certificates to break out identifying items in each certificate.
Parsed SSL certificates to break out identifying items in each certificate.
Blog Post
Blog Post
Please read more about our platform statistics on our blog post: https://hunt.io/blog/hunt-platform-statistics
Please read more about our platform statistics on our blog post: https://hunt.io/blog/hunt-platform-statistics
Hunt Intelligence, Inc.
Hunt Intelligence, Inc.
Hunt Intelligence, Inc.