Real Time Stats

Real Time Stats

For researchers and threat hunters focused on malicious infrastructures, Hunt's Advanced Search provides essential functions, facilitating nuanced analysis and discovery. This feature supports intricate queries across diverse data points, enhancing the efficiency and depth of cyber threat investigations.

For researchers and threat hunters focused on malicious infrastructures, Hunt's Advanced Search provides essential functions, facilitating nuanced analysis and discovery. This feature supports intricate queries across diverse data points, enhancing the efficiency and depth of cyber threat investigations.

Dashboard Widget

Dashboard Widget

Dashboard Widget

Embedded within Hunt.io's dashboard, the Real Time Stats widget details operations per second alongside a suite of crucial metrics to uncover malicious infrastructure.

Embedded within Hunt.io's dashboard, the Real Time Stats widget details operations per second alongside a suite of crucial metrics to uncover malicious infrastructure.

Click on STATS to view the real-time details page.

Click on STATS to view the real-time details page.

Real Time Statistics Details

Real Time Statistics Details

Real Time Statistics Details
Real Time Statistics Details
Real Time Statistics Details

Platform wide observations

Platform wide observations

Per second is the sum of all the parts listed below.

Per second is the sum of all the parts listed below.

Port Scans found

Port Scans found

Ports that reply as being open. We are scanning segments of the entire internet very fast. We are currently tweaking and tuning scanning cadence to see malicious activity.

Ports that reply as being open. We are scanning segments of the entire internet very fast. We are currently tweaking and tuning scanning cadence to see malicious activity.

Protocol detection

Protocol detection

Custom protocol detector that’s made to be fast and extensible. Later we can use it to find custom C2 protocols or other malicious signs running it on every unknown port.

Custom protocol detector that’s made to be fast and extensible. Later we can use it to find custom C2 protocols or other malicious signs running it on every unknown port.

HTTP pages

HTTP pages

Grabs of full HTML content.

Grabs of full HTML content.

SSH keys

SSH keys

Public SSH keys used to associate malicious activity and look for tenant change on a server.

Public SSH keys used to associate malicious activity and look for tenant change on a server.

JARM hashes

JARM hashes

Large scale collection of TLS fingerprints to give us an idea that a piece of software might be associated or malicious.

Large scale collection of TLS fingerprints to give us an idea that a piece of software might be associated or malicious.

Parsed certificates

Parsed certificates

Parsed SSL certificates to break out identifying items in each certificate.

Parsed SSL certificates to break out identifying items in each certificate.

Blog Post

Blog Post

Please read more about our platform statistics on our blog post: https://hunt.io/blog/hunt-platform-statistics

Please read more about our platform statistics on our blog post: https://hunt.io/blog/hunt-platform-statistics