{"id":992345,"date":"2025-11-05T22:13:51","date_gmt":"2025-11-05T19:13:51","guid":{"rendered":"https:\/\/gpss.ro\/?page_id=992345"},"modified":"2025-11-13T15:16:06","modified_gmt":"2025-11-13T12:16:06","slug":"maps","status":"publish","type":"page","link":"https:\/\/delve.ro\/ro\/maps\/","title":{"rendered":"Live threat Map"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"992345\" class=\"elementor elementor-992345\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fd444b9 e-flex e-con-boxed e-con e-parent\" data-id=\"fd444b9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8878d18 elementor-widget elementor-widget-html\" data-id=\"8878d18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <!-- GPSS Threat Map v1776427992 -->\n\n    <!-- Leaflet CSS -->\n    <link rel=\"stylesheet\" href=\"https:\/\/unpkg.com\/leaflet@1.9.4\/dist\/leaflet.css?v=1776427992\" \/>\n\n    <style>\n        .gpss-threat-map-inline {\n            position: relative;\n            width: 100%;\n            background: #0a0e27;\n            color: #fff;\n            font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, sans-serif;\n            border-radius: 8px;\n            overflow: hidden;\n        }\n\n        .gpss-threat-map-inline .map-header {\n            background: linear-gradient(135deg, #1e2139 0%, #0a0e27 100%);\n            padding: 20px 30px;\n            border-bottom: 1px solid rgba(59, 130, 246, 0.2);\n        }\n\n        .gpss-threat-map-inline .map-title {\n            font-size: 24px;\n            font-weight: 600;\n            color: #fff;\n            margin: 0;\n        }\n\n        .gpss-threat-map-inline .map-subtitle {\n            font-size: 14px;\n            color: #94a3b8;\n            margin: 5px 0 0 0;\n        }\n\n        .gpss-threat-map-inline .threat-map {\n            width: 100%;\n            height: 500px;\n            background: #0a0e27;\n        }\n\n        .gpss-threat-map-inline .map-stats {\n            display: flex;\n            justify-content: space-around;\n            background: rgba(30, 33, 57, 0.95);\n            padding: 20px;\n            border-top: 1px solid rgba(59, 130, 246, 0.2);\n        }\n\n        .gpss-threat-map-inline .stat-item {\n            text-align: center;\n        }\n\n        .gpss-threat-map-inline .stat-value {\n            display: block;\n            font-size: 32px;\n            font-weight: 700;\n            color: #3b82f6;\n            margin-bottom: 5px;\n        }\n\n        .gpss-threat-map-inline .stat-label {\n            display: block;\n            font-size: 13px;\n            color: #94a3b8;\n            text-transform: uppercase;\n            letter-spacing: 0.5px;\n        }\n\n        .gpss-threat-map-inline .map-loading {\n            position: absolute;\n            top: 50%;\n            left: 50%;\n            transform: translate(-50%, -50%);\n            background: rgba(10, 14, 39, 0.95);\n            padding: 30px 50px;\n            border-radius: 8px;\n            border: 1px solid rgba(59, 130, 246, 0.3);\n            z-index: 1000;\n            text-align: center;\n        }\n\n        .gpss-threat-map-inline .loading-spinner {\n            width: 40px;\n            height: 40px;\n            border: 4px solid rgba(59, 130, 246, 0.2);\n            border-top-color: #3b82f6;\n            border-radius: 50%;\n            animation: spin 1s linear infinite;\n            margin: 0 auto 15px;\n        }\n\n        @keyframes spin {\n            to { transform: rotate(360deg); }\n        }\n\n        .gpss-threat-map-inline .leaflet-popup-content-wrapper {\n            background: rgba(30, 33, 57, 0.98);\n            color: #fff;\n            border: 1px solid rgba(59, 130, 246, 0.3);\n        }\n\n        .gpss-threat-map-inline .leaflet-popup-tip {\n            background: rgba(30, 33, 57, 0.98);\n        }\n    <\/style>\n\n    <div class=\"gpss-threat-map-inline\" style=\"height: 700px\">\n        <div class=\"map-header\">\n            <h2 class=\"map-title\">Global Cyber Threat Map<\/h2>\n            <p class=\"map-subtitle\">Real-time threat detection and monitoring<\/p>\n        <\/div>\n\n        <div style=\"position: relative; height: calc(700px - 180px);\">\n            <div id=\"threat-map-69e223d83822f\" class=\"threat-map\" style=\"height: 100%;\"><\/div>\n            <div id=\"loading-threat-map-69e223d83822f\" class=\"map-loading\">\n                <div class=\"loading-spinner\"><\/div>\n                <div>Loading threat data...<\/div>\n            <\/div>\n        <\/div>\n\n        <div class=\"map-stats\">\n            <div class=\"stat-item\">\n                <span class=\"stat-value\" id=\"total-threat-map-69e223d83822f\">0<\/span>\n                <span class=\"stat-label\">Total Attacks<\/span>\n            <\/div>\n            <div class=\"stat-item\">\n                <span class=\"stat-value\" id=\"active-threat-map-69e223d83822f\">0<\/span>\n                <span class=\"stat-label\">Active Threats<\/span>\n            <\/div>\n            <div class=\"stat-item\">\n                <span class=\"stat-value\" id=\"countries-threat-map-69e223d83822f\">0<\/span>\n                <span class=\"stat-label\">Countries<\/span>\n            <\/div>\n            <div class=\"stat-item\">\n                <span class=\"stat-value\" id=\"severity-threat-map-69e223d83822f\">0<\/span>\n                <span class=\"stat-label\">High Severity<\/span>\n            <\/div>\n        <\/div>\n    <\/div>\n\n    <!-- Leaflet JS -->\n    <script src=\"https:\/\/unpkg.com\/leaflet@1.9.4\/dist\/leaflet.js?v=1776427992\"><\/script>\n\n    <script>\n    console.log('\ud83d\uddfa\ufe0f Threat Map Script Loading... [v1776427992]');\n\n    \/\/ Wait for everything to load\n    (function initThreatMap() {\n        \/\/ Check jQuery\n        if (typeof jQuery === 'undefined') {\n            console.error('\u274c jQuery not loaded! Retrying in 500ms...');\n            setTimeout(initThreatMap, 500);\n            return;\n        }\n\n        \/\/ Check Leaflet\n        if (typeof L === 'undefined') {\n            console.error('\u274c Leaflet not loaded! Retrying in 500ms...');\n            setTimeout(initThreatMap, 500);\n            return;\n        }\n\n        console.log('\u2705 jQuery and Leaflet loaded');\n        console.log('\ud83d\uddfa\ufe0f Initializing map: threat-map-69e223d83822f');\n\n        \/\/ Initialize map\n        const mapElement = document.getElementById('threat-map-69e223d83822f');\n        if (!mapElement) {\n            console.error('\u274c Map element not found: threat-map-69e223d83822f');\n            return;\n        }\n\n        const map = L.map('threat-map-69e223d83822f', {\n            center: [20, 0],\n            zoom: 2,\n            minZoom: 2,\n            maxZoom: 6,\n            zoomControl: true,\n            attributionControl: false\n        });\n\n        \/\/ Add dark tile layer\n        L.tileLayer('https:\/\/{s}.basemaps.cartocdn.com\/dark_nolabels\/{z}\/{x}\/{y}{r}.png', {\n            maxZoom: 19,\n            subdomains: 'abcd'\n        }).addTo(map);\n\n        console.log('\ud83d\uddfa\ufe0f Map initialized, loading threat data...');\n\n        \/\/ NEW APPROACH: Load data first, calculate bounds, THEN add markers\n        jQuery.ajax({\n            url: 'https:\/\/delve.ro\/wp-admin\/admin-ajax.php',\n            method: 'GET',\n            data: {\n                action: 'gpss_get_active_attacks',\n                limit: 500,      \/\/ Afi\u0219eaz\u0103 p\u00e2n\u0103 la 500 de amenin\u021b\u0103ri\n                show_all: 'true' \/\/ TOATE amenin\u021b\u0103rile, nu doar ultimele 24h\n            },\n            success: function(response) {\n                console.log('\u2705 API response received', response);\n\n                if (response.success && response.data) {\n                    const threats = response.data;\n\n                    \/\/ Update stats\n                    jQuery('#total-threat-map-69e223d83822f').text(threats.length);\n                    jQuery('#active-threat-map-69e223d83822f').text(threats.length);\n\n                    const countries = new Set(threats.map(t => t.target_country)).size;\n                    jQuery('#countries-threat-map-69e223d83822f').text(countries);\n\n                    const highSeverity = threats.filter(t => t.severity === 'high' || t.severity === 'critical').length;\n                    jQuery('#severity-threat-map-69e223d83822f').text(highSeverity);\n\n                    \/\/ STEP 1: Pre-process and validate all coordinates\n                    const validThreats = [];\n                    const tempBounds = [];\n\n                    threats.forEach(function(threat) {\n                        const lat = parseFloat(threat.target_latitude);\n                        const lon = parseFloat(threat.target_longitude);\n\n                        \/\/ Validate coordinates\n                        if (lat && lon && !isNaN(lat) && !isNaN(lon) &&\n                            Math.abs(lat) <= 90 && Math.abs(lon) <= 180) {\n\n                            validThreats.push({\n                                threat: threat,\n                                lat: lat,\n                                lon: lon\n                            });\n                            tempBounds.push([lat, lon]);\n                        }\n                    });\n\n                    console.log(`\ud83d\udccd Found ${validThreats.length} threats with valid coordinates`);\n\n                    if (validThreats.length === 0) {\n                        jQuery('#loading-threat-map-69e223d83822f').html('<div style=\"color: #f59e0b;\">No valid threat locations found<\/div>');\n                        return;\n                    }\n\n                    \/\/ STEP 2: Add markers DIRECTLY - no fitBounds!\n                    console.log('\ud83d\udccd Starting to add markers directly to map...');\n\n                    const markers = [];\n                    const markerGroup = L.featureGroup();  \/\/ Group pentru a gestiona markers\n\n                    \/\/ Color mapping\n                    const colors = {\n                        'critical': '#dc2626',\n                        'high': '#ea580c',\n                        'medium': '#f59e0b',\n                        'low': '#10b981'\n                    };\n\n                    \/\/ STEP 3: Create all markers and add to group\n                    validThreats.forEach(function(item) {\n                        const { threat, lat, lon } = item;\n                        const color = colors[threat.severity] || '#3b82f6';\n\n                        \/\/ Create marker\n                        const marker = L.circleMarker([lat, lon], {\n                            radius: 12,\n                            fillColor: color,\n                            color: '#ffffff',\n                            weight: 2,\n                            opacity: 1,\n                            fillOpacity: 0.9,\n                            interactive: true\n                        });\n\n                        \/\/ Add popup with all details including IPs\n                        let popupContent = `\n                            <div style=\"color: #fff; min-width: 250px;\">\n                                <strong style=\"color: #3b82f6; font-size: 14px;\">${threat.title || 'Threat'}<\/strong><br>\n                                <hr style=\"border-color: #3b82f6; margin: 8px 0;\">\n                                <strong>Type:<\/strong> ${threat.threat_type || 'Unknown'}<br>\n                                <strong>Severity:<\/strong> <span style=\"color: ${threat.severity === 'critical' ? '#dc2626' : (threat.severity === 'high' ? '#ea580c' : '#f59e0b')}; font-weight: bold;\">${(threat.severity || 'Unknown').toUpperCase()}<\/span><br>\n                        `;\n\n                        \/\/ Add Source IP if available\n                        if (threat.source_ip) {\n                            popupContent += `<strong>Source IP:<\/strong> <code style=\"background: #000; padding: 2px 6px; border-radius: 3px;\">${threat.source_ip}<\/code><br>`;\n                        }\n\n                        \/\/ Add Target IP if available\n                        if (threat.target_ip) {\n                            popupContent += `<strong>Target IP:<\/strong> <code style=\"background: #000; padding: 2px 6px; border-radius: 3px;\">${threat.target_ip}<\/code><br>`;\n                        }\n\n                        \/\/ Add location info\n                        popupContent += `\n                                <strong>Location:<\/strong> ${threat.target_country || 'Unknown'}<br>\n                                <strong>Coords:<\/strong> <span style=\"font-size: 11px;\">${lat.toFixed(4)}, ${lon.toFixed(4)}<\/span><br>\n                        `;\n\n                        \/\/ Add date detected\n                        if (threat.date_detected) {\n                            const detectedDate = new Date(threat.date_detected);\n                            popupContent += `<strong>Detected:<\/strong> ${detectedDate.toLocaleDateString()} ${detectedDate.toLocaleTimeString()}<br>`;\n                        }\n\n                        \/\/ Add description if available (truncated)\n                        if (threat.description) {\n                            const shortDesc = threat.description.substring(0, 100);\n                            popupContent += `<hr style=\"border-color: #3b82f6; margin: 8px 0;\"><em style=\"font-size: 12px; color: #94a3b8;\">${shortDesc}${threat.description.length > 100 ? '...' : ''}<\/em>`;\n                        }\n\n                        popupContent += `<\/div>`;\n\n                        marker.bindPopup(popupContent);\n\n                        markerGroup.addLayer(marker);\n                        markers.push(marker);\n                    });\n\n                    console.log(`\u2705 Created ${markers.length} markers`);\n\n                    \/\/ STEP 4: Add entire group to map at once\n                    markerGroup.addTo(map);\n                    console.log(`\ud83d\uddfa\ufe0f Added marker group to map`);\n\n                    \/\/ STEP 5: Fit map to show all markers\n                    try {\n                        map.fitBounds(markerGroup.getBounds(), {\n                            padding: [50, 50],\n                            maxZoom: 4\n                        });\n                        console.log('\ud83d\uddfa\ufe0f Map fitted to marker bounds');\n                    } catch (e) {\n                        console.warn('Could not fit bounds, using default view');\n                    }\n\n                    \/\/ Hide loading indicator\n                    jQuery('#loading-threat-map-69e223d83822f').fadeOut();\n\n                    console.log(`\ud83c\udfaf SUCCESS! ${markers.length} markers visible on map`);\n\n                    \/\/ STEP 6: Start PULSE animations\n                    if (markers.length > 1) {\n                        let animationIndex = 0;\n                        const animColors = ['#ff0000', '#ff6600', '#ffcc00', '#00ff00', '#0099ff'];\n\n                        \/\/ Pulse effect on markers\n                        markers.forEach(function(marker) {\n                            let growing = true;\n                            let currentRadius = 12;\n\n                            setInterval(function() {\n                                if (growing) {\n                                    currentRadius += 0.5;\n                                    if (currentRadius >= 16) growing = false;\n                                } else {\n                                    currentRadius -= 0.5;\n                                    if (currentRadius <= 12) growing = true;\n                                }\n                                marker.setRadius(currentRadius);\n                            }, 100);\n                        });\n\n                        \/\/ FORTIGUARD STYLE - Straight lines with fast traveling particles\n                        function animateAttackLine() {\n                            const from = markers[Math.floor(Math.random() * markers.length)];\n                            const to = markers[Math.floor(Math.random() * markers.length)];\n\n                            if (from !== to) {\n                                const color = animColors[animationIndex % animColors.length];\n                                const fromLatLng = from.getLatLng();\n                                const toLatLng = to.getLatLng();\n\n                                \/\/ STRAIGHT LINE - FortiGuard style (nu curbe!)\n                                const line = L.polyline([fromLatLng, toLatLng], {\n                                    color: color,\n                                    weight: 1,\n                                    opacity: 0.3,\n                                    dashArray: '5, 5'\n                                }).addTo(map);\n\n                                \/\/ Particle that travels along the line\n                                const particle = L.circleMarker(fromLatLng, {\n                                    radius: 5,\n                                    fillColor: color,\n                                    color: '#ffffff',\n                                    weight: 1,\n                                    opacity: 1,\n                                    fillOpacity: 1\n                                }).addTo(map);\n\n                                \/\/ Glow effect around particle\n                                const glow = L.circleMarker(fromLatLng, {\n                                    radius: 15,\n                                    fillColor: color,\n                                    color: color,\n                                    weight: 0,\n                                    opacity: 0,\n                                    fillOpacity: 0.3\n                                }).addTo(map);\n\n                                \/\/ Trail effect - multiple points that fade out\n                                const trailPoints = [];\n                                const maxTrailLength = 8;\n\n                                \/\/ Fast animation - FortiGuard style\n                                let progress = 0;\n                                const steps = 30; \/\/ Faster than before\n                                const animSpeed = 25; \/\/ Very fast\n\n                                const travelInterval = setInterval(function() {\n                                    progress++;\n                                    const t = progress \/ steps;\n\n                                    \/\/ Calculate current position (linear interpolation)\n                                    const currentLat = fromLatLng.lat + (toLatLng.lat - fromLatLng.lat) * t;\n                                    const currentLng = fromLatLng.lng + (toLatLng.lng - fromLatLng.lng) * t;\n                                    const currentPos = L.latLng(currentLat, currentLng);\n\n                                    \/\/ Update particle position\n                                    particle.setLatLng(currentPos);\n                                    glow.setLatLng(currentPos);\n\n                                    \/\/ Pulse glow effect\n                                    const glowRadius = 12 + Math.sin(progress * 0.5) * 5;\n                                    glow.setRadius(glowRadius);\n\n                                    \/\/ Add trail point\n                                    const trailPoint = L.circleMarker(currentPos, {\n                                        radius: 3,\n                                        fillColor: color,\n                                        color: color,\n                                        weight: 0,\n                                        opacity: 0.8,\n                                        fillOpacity: 0.8\n                                    }).addTo(map);\n                                    trailPoints.push(trailPoint);\n\n                                    \/\/ Remove old trail points\n                                    if (trailPoints.length > maxTrailLength) {\n                                        const oldPoint = trailPoints.shift();\n                                        map.removeLayer(oldPoint);\n                                    }\n\n                                    \/\/ Fade existing trail points\n                                    trailPoints.forEach(function(point, index) {\n                                        const opacity = (index + 1) \/ trailPoints.length * 0.8;\n                                        point.setStyle({\n                                            fillOpacity: opacity,\n                                            opacity: opacity\n                                        });\n                                    });\n\n                                    \/\/ When reached destination\n                                    if (progress >= steps) {\n                                        clearInterval(travelInterval);\n\n                                        \/\/ Flash at destination\n                                        let flashCount = 0;\n                                        const flashInterval = setInterval(function() {\n                                            particle.setStyle({\n                                                fillOpacity: flashCount % 2 === 0 ? 1 : 0.3,\n                                                radius: flashCount % 2 === 0 ? 8 : 5\n                                            });\n                                            glow.setStyle({\n                                                fillOpacity: flashCount % 2 === 0 ? 0.5 : 0.2\n                                            });\n                                            flashCount++;\n\n                                            if (flashCount > 4) {\n                                                clearInterval(flashInterval);\n\n                                                \/\/ Quick fade out\n                                                setTimeout(function() {\n                                                    map.removeLayer(line);\n                                                    map.removeLayer(particle);\n                                                    map.removeLayer(glow);\n                                                    trailPoints.forEach(p => map.removeLayer(p));\n                                                }, 200);\n                                            }\n                                        }, 80);\n                                    }\n                                }, animSpeed);\n\n                                animationIndex++;\n                            }\n                        }\n\n                        \/\/ Create multiple simultaneous attacks - FortiGuard style\n                        setInterval(animateAttackLine, 400); \/\/ Very frequent\n\n                        \/\/ Start with burst of attacks\n                        for (let i = 0; i < 5; i++) {\n                            setTimeout(animateAttackLine, i * 150);\n                        }\n\n                        console.log('\u2705 Pulse animations started');\n                    }\n\n                } else {\n                    jQuery('#loading-threat-map-69e223d83822f').html('<div style=\"color: #ef4444;\">No threat data available<\/div>');\n                }\n            },\n            error: function(xhr, status, error) {\n                console.error('\u274c API error:', error);\n                jQuery('#loading-threat-map-69e223d83822f').html('<div style=\"color: #ef4444;\">Failed to load data<\/div>');\n            }\n        });\n\n        \/\/ Load statistics separately\n        jQuery.ajax({\n            url: 'https:\/\/delve.ro\/wp-admin\/admin-ajax.php',\n            method: 'GET',\n            data: {\n                action: 'gpss_get_threat_stats'\n            },\n            success: function(response) {\n                if (response.success && response.data) {\n                    const stats = response.data;\n\n                    if (stats.total_count) {\n                        jQuery('#total-threat-map-69e223d83822f').text(stats.total_count);\n                    }\n\n                    if (stats.active_count) {\n                        jQuery('#active-threat-map-69e223d83822f').text(stats.active_count);\n                    }\n                }\n            }\n        });\n\n    })(); \/\/ End initThreatMap\n\n    console.log('\ud83d\uddfa\ufe0f Threat Map Script Loaded');\n    <\/script>\n\n    \n\n\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6d6fe0 e-flex e-con-boxed e-con e-parent\" data-id=\"b6d6fe0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e9b3cd elementor-widget elementor-widget-html\" data-id=\"9e9b3cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"gpss-threat-map-container\">\n            <style>\n            .gpss-threat-map-container {\n                max-width: 1400px;\n                margin: 0 auto;\n                padding: 30px 20px;\n            }\n\n            .threat-map-header {\n                text-align: center;\n                margin-bottom: 30px;\n            }\n\n            .threat-map-header h2 {\n                font-size: 32px;\n                margin-bottom: 10px;\n                color: #1e293b;\n            }\n\n            .threat-stats {\n                display: grid;\n                grid-template-columns: repeat(auto-fit, minmax(200px, 1fr));\n                gap: 20px;\n                margin-bottom: 30px;\n            }\n\n            .stat-card {\n                background: white;\n                padding: 20px;\n                border-radius: 8px;\n                box-shadow: 0 2px 4px rgba(0,0,0,0.1);\n                text-align: center;\n            }\n\n            .stat-card .stat-number {\n                font-size: 36px;\n                font-weight: bold;\n                margin-bottom: 5px;\n            }\n\n            .stat-card .stat-label {\n                color: #64748b;\n                font-size: 14px;\n            }\n\n            .stat-card.critical .stat-number { color: #dc2626; }\n            .stat-card.high .stat-number { color: #f59e0b; }\n            .stat-card.medium .stat-number { color: #eab308; }\n            .stat-card.low .stat-number { color: #22c55e; }\n\n            .map-controls {\n                background: white;\n                padding: 20px;\n                border-radius: 8px;\n                box-shadow: 0 2px 4px rgba(0,0,0,0.1);\n                margin-bottom: 20px;\n            }\n\n            .filters {\n                display: flex;\n                flex-wrap: wrap;\n                gap: 15px;\n                align-items: center;\n            }\n\n            .filter-group {\n                flex: 1;\n                min-width: 200px;\n            }\n\n            .filter-group label {\n                display: block;\n                font-weight: 600;\n                margin-bottom: 5px;\n                font-size: 14px;\n                color: #475569;\n            }\n\n            .filter-group select {\n                width: 100%;\n                padding: 10px;\n                border: 1px solid #cbd5e1;\n                border-radius: 6px;\n                font-size: 14px;\n            }\n\n            \/* Live indicator *\/\n            .live-indicator {\n                display: inline-block;\n                width: 8px;\n                height: 8px;\n                background: #22c55e;\n                border-radius: 50%;\n                margin-right: 8px;\n                animation: pulse-green 2s infinite;\n            }\n\n            @keyframes pulse-green {\n                0%, 100% {\n                    opacity: 1;\n                    box-shadow: 0 0 0 0 rgba(34, 197, 94, 0.7);\n                }\n                50% {\n                    opacity: 0.5;\n                    box-shadow: 0 0 0 5px rgba(34, 197, 94, 0);\n                }\n            }\n\n            .auto-update-status {\n                text-align: center;\n                padding: 10px;\n                background: #f0fdf4;\n                border-radius: 6px;\n                margin-bottom: 20px;\n                font-size: 14px;\n                color: #166534;\n            }\n\n            .recent-threats {\n                background: white;\n                padding: 25px;\n                border-radius: 8px;\n                box-shadow: 0 2px 4px rgba(0,0,0,0.1);\n            }\n\n            .recent-threats h3 {\n                margin-top: 0;\n                margin-bottom: 20px;\n                font-size: 20px;\n            }\n\n            \/* ========== MOBILE RESPONSIVE ========== *\/\n            @media (max-width: 768px) {\n                .gpss-threat-map-container {\n                    padding: 15px 10px;\n                }\n\n                .threat-map-header h2 {\n                    font-size: 24px;\n                }\n\n                .threat-map-header p {\n                    font-size: 14px;\n                }\n\n                \/* StatisticsGrid - 2 columns on mobile *\/\n                .threat-stats {\n                    grid-template-columns: repeat(2, 1fr);\n                    gap: 10px;\n                }\n\n                .stat-card {\n                    padding: 15px 10px;\n                }\n\n                .stat-card .stat-number {\n                    font-size: 28px;\n                }\n\n                .stat-card .stat-label {\n                    font-size: 12px;\n                }\n\n                .stat-card div[style*=\"font-size: 11px\"] {\n                    font-size: 10px !important;\n                }\n\n                \/* Filters - stack vertically *\/\n                .filters {\n                    flex-direction: column;\n                    gap: 10px;\n                }\n\n                .filter-group {\n                    min-width: 100%;\n                }\n\n                \/* Hide table, show cards instead *\/\n                #threat-table-container table {\n                    display: none !important;\n                }\n\n                .mobile-threats-container {\n                    display: block !important;\n                }\n\n                \/* Mobile Card Layout *\/\n                .mobile-threat-card {\n                    background: white;\n                    border-radius: 8px;\n                    padding: 15px;\n                    margin-bottom: 12px;\n                    box-shadow: 0 2px 4px rgba(0,0,0,0.1);\n                    border-left: 4px solid #3b82f6;\n                }\n\n                .mobile-threat-card.critical {\n                    border-left-color: #ef4444;\n                }\n\n                .mobile-threat-card.high {\n                    border-left-color: #f59e0b;\n                }\n\n                .mobile-threat-card.medium {\n                    border-left-color: #eab308;\n                }\n\n                .mobile-threat-card.low {\n                    border-left-color: #22c55e;\n                }\n\n                .mobile-threat-header {\n                    display: flex;\n                    justify-content: space-between;\n                    align-items: start;\n                    margin-bottom: 12px;\n                }\n\n                .mobile-threat-title {\n                    flex: 1;\n                    font-weight: 600;\n                    font-size: 15px;\n                    color: #1e293b;\n                    margin-right: 10px;\n                }\n\n                .mobile-threat-severity {\n                    padding: 4px 10px;\n                    border-radius: 6px;\n                    font-size: 10px;\n                    font-weight: 700;\n                    text-transform: uppercase;\n                    white-space: nowrap;\n                    color: white;\n                }\n\n                .mobile-threat-meta {\n                    display: grid;\n                    grid-template-columns: 1fr 1fr;\n                    gap: 8px;\n                    margin-top: 12px;\n                }\n\n                .mobile-meta-item {\n                    font-size: 13px;\n                    color: #475569;\n                }\n\n                .mobile-meta-label {\n                    font-size: 11px;\n                    color: #94a3b8;\n                    text-transform: uppercase;\n                    font-weight: 600;\n                    margin-bottom: 4px;\n                }\n\n                .mobile-meta-value {\n                    font-weight: 500;\n                }\n\n                .mobile-threat-type {\n                    background: #e0e7ff;\n                    color: #4f46e5;\n                    padding: 4px 8px;\n                    border-radius: 4px;\n                    font-size: 12px;\n                    font-weight: 600;\n                    display: inline-block;\n                    margin-top: 8px;\n                }\n\n                .mobile-threat-ip {\n                    background: #000;\n                    padding: 4px 8px;\n                    border-radius: 4px;\n                    font-size: 11px;\n                    font-family: monospace;\n                    display: inline-block;\n                }\n\n                .mobile-threat-ip.source {\n                    color: #10b981;\n                }\n\n                .mobile-threat-ip.target {\n                    color: #f59e0b;\n                }\n\n                \/* Details panel on mobile *\/\n                #threat-details-panel {\n                    padding: 15px !important;\n                    margin-bottom: 15px !important;\n                }\n\n                #details-title {\n                    font-size: 16px !important;\n                }\n\n                #close-details {\n                    padding: 6px 12px !important;\n                    font-size: 12px !important;\n                }\n\n                #threat-details-list > div {\n                    padding: 15px !important;\n                }\n\n                #threat-details-list h4 {\n                    font-size: 14px !important;\n                }\n\n                #threat-details-list p {\n                    font-size: 13px !important;\n                }\n\n                \/* Auto-update status on mobile *\/\n                .auto-update-status {\n                    font-size: 12px !important;\n                    padding: 8px !important;\n                }\n\n                .auto-update-status span {\n                    display: inline-block;\n                    margin: 0 5px;\n                }\n\n                \/* Map controls on mobile *\/\n                .map-controls {\n                    padding: 15px !important;\n                }\n\n                \/* Recent threats section *\/\n                .recent-threats {\n                    padding: 15px !important;\n                }\n\n                .recent-threats h3 {\n                    font-size: 18px !important;\n                }\n            }\n\n            \/* Small mobile devices *\/\n            @media (max-width: 480px) {\n                .threat-stats {\n                    grid-template-columns: 1fr;\n                }\n\n                .mobile-threat-meta {\n                    grid-template-columns: 1fr;\n                    gap: 10px;\n                }\n\n                .threat-map-header h2 {\n                    font-size: 20px !important;\n                }\n\n                .threat-map-header p {\n                    font-size: 13px !important;\n                }\n\n                .stat-card .stat-number {\n                    font-size: 24px !important;\n                }\n\n                .auto-update-status {\n                    font-size: 11px !important;\n                }\n\n                .mobile-threat-title {\n                    font-size: 14px !important;\n                }\n\n                .mobile-threat-severity {\n                    font-size: 9px !important;\n                    padding: 3px 8px !important;\n                }\n            }\n            <\/style>\n\n            <div class=\"threat-map-header\">\n                <h2>\ud83d\udee1\ufe0f Amenin\u021b\u0103ri Cibernetice Detectate<\/h2>\n                <p style=\"color: #64748b; font-size: 16px;\">Monitorizare \u00een timp real a amenin\u021b\u0103rilor cibernetice globale<\/p>\n            <\/div>\n\n            <!-- Live Update Status -->\n            <div class=\"auto-update-status\">\n                <span class=\"live-indicator\"><\/span>\n                <strong>LIVE<\/strong> - Actualizare automat\u0103 activ\u0103\n                <span style=\"margin-left: 15px;\">\ud83d\udce1 Ultima actualizare: <span id=\"last-update\">acum<\/span><\/span>\n            <\/div>\n\n            <!-- Statistics (CLICKABLE for details) -->\n            <div class=\"threat-stats\">\n                <div class=\"stat-card critical clickable-stat\" data-severity=\"critical\" style=\"cursor: pointer; transition: transform 0.2s;\">\n                    <div class=\"stat-number\" id=\"stat-critical\">0<\/div>\n                    <div class=\"stat-label\">\ud83d\udd34 Critical<\/div>\n                    <div style=\"font-size: 11px; color: #94a3b8; margin-top: 5px;\">Click pentru detalii<\/div>\n                <\/div>\n                <div class=\"stat-card high clickable-stat\" data-severity=\"high\" style=\"cursor: pointer; transition: transform 0.2s;\">\n                    <div class=\"stat-number\" id=\"stat-high\">0<\/div>\n                    <div class=\"stat-label\">\ud83d\udfe0 High<\/div>\n                    <div style=\"font-size: 11px; color: #94a3b8; margin-top: 5px;\">Click pentru detalii<\/div>\n                <\/div>\n                <div class=\"stat-card medium clickable-stat\" data-severity=\"medium\" style=\"cursor: pointer; transition: transform 0.2s;\">\n                    <div class=\"stat-number\" id=\"stat-medium\">0<\/div>\n                    <div class=\"stat-label\">\ud83d\udfe1 Medium<\/div>\n                    <div style=\"font-size: 11px; color: #94a3b8; margin-top: 5px;\">Click pentru detalii<\/div>\n                <\/div>\n                <div class=\"stat-card low clickable-stat\" data-severity=\"low\" style=\"cursor: pointer; transition: transform 0.2s;\">\n                    <div class=\"stat-number\" id=\"stat-low\">0<\/div>\n                    <div class=\"stat-label\">\ud83d\udfe2 Low<\/div>\n                    <div style=\"font-size: 11px; color: #94a3b8; margin-top: 5px;\">Click pentru detalii<\/div>\n                <\/div>\n                <div class=\"stat-card clickable-stat\" data-severity=\"all\" style=\"cursor: pointer; transition: transform 0.2s;\">\n                    <div class=\"stat-number\" id=\"stat-total\" style=\"color: #3b82f6;\">0<\/div>\n                    <div class=\"stat-label\">\ud83d\udcca Total Amenin\u021b\u0103ri<\/div>\n                    <div style=\"font-size: 11px; color: #94a3b8; margin-top: 5px;\">Click pentru toate<\/div>\n                <\/div>\n            <\/div>\n\n            <!-- Threat Details Panel (shown when clicking on stats) -->\n            <div id=\"threat-details-panel\" style=\"display: none; background: white; padding: 25px; border-radius: 8px; box-shadow: 0 4px 6px rgba(0,0,0,0.1); margin-bottom: 20px;\">\n                <div style=\"display: flex; justify-content: space-between; align-items: center; margin-bottom: 20px;\">\n                    <h3 id=\"details-title\" style=\"margin: 0; font-size: 20px; color: #1e293b;\">Detalii Amenin\u021b\u0103ri<\/h3>\n                    <button id=\"close-details\" style=\"background: #ef4444; color: white; border: none; padding: 8px 16px; border-radius: 6px; cursor: pointer; font-weight: 600;\">\n                        \u2715 \u00cenchide\n                    <\/button>\n                <\/div>\n                <div id=\"threat-details-list\" style=\"max-height: 600px; overflow-y: auto;\"><\/div>\n            <\/div>\n\n            <!-- Filters -->\n            <div class=\"map-controls\">\n                <div class=\"filters\">\n                    <div class=\"filter-group\">\n                        <label>\ud83d\udd0d Filtreaz\u0103 dup\u0103 severitate:<\/label>\n                        <select id=\"filter-severity\">\n                            <option value=\"all\">Toate<\/option>\n                            <option value=\"critical\">\ud83d\udd34 Critical<\/option>\n                            <option value=\"high\">\ud83d\udfe0 High<\/option>\n                            <option value=\"medium\">\ud83d\udfe1 Medium<\/option>\n                            <option value=\"low\">\ud83d\udfe2 Low<\/option>\n                        <\/select>\n                    <\/div>\n\n                    <div class=\"filter-group\">\n                        <label>\ud83c\udfaf Filtreaz\u0103 dup\u0103 tip:<\/label>\n                        <select id=\"filter-type\">\n                            <option value=\"all\">Toate<\/option>\n                            <option value=\"malware\">\ud83e\udda0 Malware<\/option>\n                            <option value=\"phishing\">\ud83c\udfa3 Phishing<\/option>\n                            <option value=\"ransomware\">\ud83d\udd12 Ransomware<\/option>\n                            <option value=\"ddos\">\u26a1 DDoS<\/option>\n                            <option value=\"data_breach\">\ud83d\udcbe Data Breach<\/option>\n                            <option value=\"apt\">\ud83c\udfaf APT<\/option>\n                            <option value=\"zero_day\">\u26a0\ufe0f Zero-Day<\/option>\n                            <option value=\"botnet\">\ud83e\udd16 Botnet<\/option>\n                        <\/select>\n                    <\/div>\n\n                    <div class=\"filter-group\">\n                        <label>\ud83c\udf0d Top \u021a\u0103ri Vizate:<\/label>\n                        <select id=\"filter-country\">\n                            <option value=\"all\">Toate \u021a\u0103rile<\/option>\n                            <!-- Va fi populat dinamic din date -->\n                        <\/select>\n                    <\/div>\n\n                    <div class=\"filter-group\">\n                        <label>\ud83d\udcc5 Perioad\u0103:<\/label>\n                        <select id=\"filter-period\">\n                            <option value=\"12\">Ultimele 12 ore<\/option>\n                            <option value=\"24\" selected>Ultimele 24 ore<\/option>\n                            <option value=\"72\">Ultimele 72 ore<\/option>\n                            <option value=\"720\">Ultima lun\u0103 (30 zile)<\/option>\n                        <\/select>\n                    <\/div>\n\n                    <div class=\"filter-group\">\n                        <label>\ud83d\udd25 Vizualizare:<\/label>\n                        <select id=\"view-mode\">\n                            <option value=\"normal\">Normal<\/option>\n                            <option value=\"heatmap\">Heat Map<\/option>\n                            <option value=\"top-threats\">Top Threats Only<\/option>\n                        <\/select>\n                    <\/div>\n\n                    <div class=\"filter-group\">\n                        <label>&nbsp;<\/label>\n                        <button id=\"reset-filters\" class=\"button\"\n                                style=\"width: 100%; padding: 10px; background: #3b82f6; color: white; border: none; border-radius: 6px; cursor: pointer; font-weight: 600;\">\n                            \ud83d\udd04 Reset Filtre\n                        <\/button>\n                    <\/div>\n                <\/div>\n            <\/div>\n\n            <!-- Threat Data Table (NO MAP) -->\n            <div class=\"recent-threats\">\n                <h3>\ud83d\udccb Toate Amenin\u021b\u0103rile Detectate<\/h3>\n                <div id=\"threat-table-container\"><\/div>\n            <\/div>\n        <\/div>\n\n        <script>\n        (function() {\n            var threats = [{\"id\":\"8699\",\"title\":\"Malware Distribution - 70.31.230.2\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Canada\",\"latitude\":\"45.6196000\",\"longitude\":\"-73.7366000\",\"ip_address\":\"70.31.230.2\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Bell Canada\",\"created_at\":\"2026-04-17 07:43:51\",\"updated_at\":\"2026-04-17 07:43:51\",\"auto_import_date\":null},{\"id\":\"8698\",\"title\":\"Malware Distribution - 222.220.145.182\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"25.0453000\",\"longitude\":\"102.7100000\",\"ip_address\":\"222.220.145.182\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-17 07:43:49\",\"updated_at\":\"2026-04-17 07:43:49\",\"auto_import_date\":null},{\"id\":\"8697\",\"title\":\"Malware Distribution - 182.117.50.97\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.117.50.97\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-17 07:43:47\",\"updated_at\":\"2026-04-17 07:43:47\",\"auto_import_date\":null},{\"id\":\"8696\",\"title\":\"Malware Distribution - 123.11.78.92\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.11.78.92\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:45\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-17 07:43:46\",\"updated_at\":\"2026-04-17 07:43:46\",\"auto_import_date\":null},{\"id\":\"8695\",\"title\":\"Malware Distribution - 42.227.39.66\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.227.39.66\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-17 07:43:44\",\"updated_at\":\"2026-04-17 07:43:44\",\"auto_import_date\":null},{\"id\":\"8694\",\"title\":\"Malware Distribution - 115.56.12.227\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.56.12.227\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-17 07:43:42\",\"updated_at\":\"2026-04-17 07:43:42\",\"auto_import_date\":null},{\"id\":\"8693\",\"title\":\"Malware Distribution - 64.89.163.230\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1109000\",\"longitude\":\"8.6821300\",\"ip_address\":\"64.89.163.230\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Netiface America\",\"created_at\":\"2026-04-17 07:43:41\",\"updated_at\":\"2026-04-17 07:43:41\",\"auto_import_date\":null},{\"id\":\"8692\",\"title\":\"Malware Distribution - 123.10.230.129\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.230.129\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-17 07:43:39\",\"updated_at\":\"2026-04-17 07:43:39\",\"auto_import_date\":null},{\"id\":\"8691\",\"title\":\"Malware Distribution - 115.49.28.13\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.49.28.13\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-17 07:43:37\",\"updated_at\":\"2026-04-17 07:43:37\",\"auto_import_date\":null},{\"id\":\"8690\",\"title\":\"Malware Distribution - 123.129.135.1\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"123.129.135.1\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-17 07:43:35\",\"updated_at\":\"2026-04-17 07:43:35\",\"auto_import_date\":null},{\"id\":\"8689\",\"title\":\"Malware Distribution - 85.215.159.4\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1109000\",\"longitude\":\"8.6821300\",\"ip_address\":\"85.215.159.4\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:33\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: IONOS SE\",\"created_at\":\"2026-04-17 07:43:34\",\"updated_at\":\"2026-04-17 07:43:34\",\"auto_import_date\":null},{\"id\":\"8688\",\"title\":\"Malware Distribution - 42.230.18.228\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.230.18.228\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-17 07:43:32\",\"updated_at\":\"2026-04-17 07:43:32\",\"auto_import_date\":null},{\"id\":\"8687\",\"title\":\"Malware Distribution - 115.59.34.70\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.59.34.70\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-17 07:43:30\",\"updated_at\":\"2026-04-17 07:43:30\",\"auto_import_date\":null},{\"id\":\"8686\",\"title\":\"Malware Distribution - 42.228.245.139\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.228.245.139\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:28\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-17 07:43:29\",\"updated_at\":\"2026-04-17 07:43:29\",\"auto_import_date\":null},{\"id\":\"8685\",\"title\":\"Malware Distribution - 36.69.84.241\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.2208000\",\"longitude\":\"106.8403000\",\"ip_address\":\"36.69.84.241\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PT. TELKOM INDONESIA\",\"created_at\":\"2026-04-17 07:43:27\",\"updated_at\":\"2026-04-17 07:43:27\",\"auto_import_date\":null},{\"id\":\"8684\",\"title\":\"Malware Distribution - 42.239.188.6\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.239.188.6\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-17 07:43:25\",\"updated_at\":\"2026-04-17 07:43:25\",\"auto_import_date\":null},{\"id\":\"8683\",\"title\":\"Malware Distribution - 27.207.140.19\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.207.140.19\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-17 07:43:23\",\"updated_at\":\"2026-04-17 07:43:23\",\"auto_import_date\":null},{\"id\":\"8682\",\"title\":\"Malware Distribution - 14.157.83.132\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"23.1317000\",\"longitude\":\"113.2660000\",\"ip_address\":\"14.157.83.132\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-17 07:43:22\",\"updated_at\":\"2026-04-17 07:43:22\",\"auto_import_date\":null},{\"id\":\"8681\",\"title\":\"Malware Distribution - 222.127.154.48\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Philippines\",\"latitude\":\"14.5562000\",\"longitude\":\"121.0298000\",\"ip_address\":\"222.127.154.48\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-17 10:43:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Globe Telecom\",\"created_at\":\"2026-04-17 07:43:20\",\"updated_at\":\"2026-04-17 07:43:20\",\"auto_import_date\":null},{\"id\":\"8679\",\"title\":\"Malware Distribution - 111.35.78.2\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6683000\",\"longitude\":\"117.0210000\",\"ip_address\":\"111.35.78.2\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Mobile communications corporation\",\"created_at\":\"2026-04-16 19:51:58\",\"updated_at\":\"2026-04-16 19:51:58\",\"auto_import_date\":null},{\"id\":\"8678\",\"title\":\"Malware Distribution - 42.239.252.150\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.239.252.150\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:57\",\"updated_at\":\"2026-04-16 19:51:57\",\"auto_import_date\":null},{\"id\":\"8677\",\"title\":\"Malware Distribution - 113.233.232.44\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"113.233.232.44\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-16 19:51:55\",\"updated_at\":\"2026-04-16 19:51:55\",\"auto_import_date\":null},{\"id\":\"8676\",\"title\":\"Malware Distribution - 27.216.250.235\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"37.4765000\",\"longitude\":\"121.4408000\",\"ip_address\":\"27.216.250.235\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-16 19:51:53\",\"updated_at\":\"2026-04-16 19:51:53\",\"auto_import_date\":null},{\"id\":\"8675\",\"title\":\"Malware Distribution - 42.238.169.6\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.238.169.6\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:51\",\"updated_at\":\"2026-04-16 19:51:51\",\"auto_import_date\":null},{\"id\":\"8674\",\"title\":\"Malware Distribution - 61.53.133.230\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.133.230\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 19:51:50\",\"updated_at\":\"2026-04-16 19:51:50\",\"auto_import_date\":null},{\"id\":\"8673\",\"title\":\"Malware Distribution - 182.114.248.141\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.114.248.141\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:48\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:48\",\"updated_at\":\"2026-04-16 19:51:48\",\"auto_import_date\":null},{\"id\":\"8672\",\"title\":\"Malware Distribution - 42.86.55.13\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.86.55.13\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-16 19:51:46\",\"updated_at\":\"2026-04-16 19:51:46\",\"auto_import_date\":null},{\"id\":\"8671\",\"title\":\"Malware Distribution - 110.36.80.169\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.4819000\",\"longitude\":\"74.3536000\",\"ip_address\":\"110.36.80.169\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-16 19:51:44\",\"updated_at\":\"2026-04-16 19:51:44\",\"auto_import_date\":null},{\"id\":\"8670\",\"title\":\"Malware Distribution - 61.52.156.114\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.52.156.114\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 19:51:43\",\"updated_at\":\"2026-04-16 19:51:43\",\"auto_import_date\":null},{\"id\":\"8669\",\"title\":\"Malware Distribution - 110.37.52.120\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.52.120\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-16 19:51:41\",\"updated_at\":\"2026-04-16 19:51:41\",\"auto_import_date\":null},{\"id\":\"8668\",\"title\":\"Malware Distribution - 219.155.111.60\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"219.155.111.60\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 19:51:39\",\"updated_at\":\"2026-04-16 19:51:39\",\"auto_import_date\":null},{\"id\":\"8667\",\"title\":\"Malware Distribution - 182.121.162.191\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.162.191\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:37\",\"updated_at\":\"2026-04-16 19:51:37\",\"auto_import_date\":null},{\"id\":\"8666\",\"title\":\"Malware Distribution - 182.113.2.247\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.113.2.247\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:36\",\"updated_at\":\"2026-04-16 19:51:36\",\"auto_import_date\":null},{\"id\":\"8665\",\"title\":\"Malware Distribution - 123.13.1.74\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.13.1.74\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 19:51:34\",\"updated_at\":\"2026-04-16 19:51:34\",\"auto_import_date\":null},{\"id\":\"8664\",\"title\":\"Malware Distribution - 42.224.126.96\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.224.126.96\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:32\",\"updated_at\":\"2026-04-16 19:51:32\",\"auto_import_date\":null},{\"id\":\"8663\",\"title\":\"Malware Distribution - 182.127.69.241\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.127.69.241\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 19:51:31\",\"updated_at\":\"2026-04-16 19:51:31\",\"auto_import_date\":null},{\"id\":\"8662\",\"title\":\"Malware Distribution - 45.8.118.17\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Kazakhstan\",\"latitude\":\"51.1876000\",\"longitude\":\"71.4491000\",\"ip_address\":\"45.8.118.17\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: NLS ASTANA LLP\",\"created_at\":\"2026-04-16 19:51:29\",\"updated_at\":\"2026-04-16 19:51:29\",\"auto_import_date\":null},{\"id\":\"8661\",\"title\":\"Malware Distribution - 115.48.160.29\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.48.160.29\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 19:51:27\",\"updated_at\":\"2026-04-16 19:51:27\",\"auto_import_date\":null},{\"id\":\"8660\",\"title\":\"Malware Distribution - 92.112.127.184\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Netherlands\",\"latitude\":\"52.3759000\",\"longitude\":\"4.8975000\",\"ip_address\":\"92.112.127.184\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Matteo Martelloni trading as DELUXHOST\",\"created_at\":\"2026-04-16 19:51:25\",\"updated_at\":\"2026-04-16 19:51:25\",\"auto_import_date\":null},{\"id\":\"8659\",\"title\":\"Spam Source - 23.146.241.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL681852\",\"country\":\"United States\",\"latitude\":\"41.4873000\",\"longitude\":\"-75.6966000\",\"ip_address\":\"23.146.241.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 22:51:23\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.146.241.0\\\/24\",\"created_at\":\"2026-04-16 19:51:23\",\"updated_at\":\"2026-04-16 19:51:23\",\"auto_import_date\":null},{\"id\":\"8656\",\"title\":\"Malware Distribution - 182.120.162.185\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.120.162.185\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:13\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 13:35:14\",\"updated_at\":\"2026-04-16 13:35:14\",\"auto_import_date\":null},{\"id\":\"8655\",\"title\":\"Malware Distribution - 83.142.209.75\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Ukraine\",\"latitude\":\"50.4504000\",\"longitude\":\"30.5245000\",\"ip_address\":\"83.142.209.75\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Ghosty Networks LLC\",\"created_at\":\"2026-04-16 13:35:12\",\"updated_at\":\"2026-04-16 13:35:12\",\"auto_import_date\":null},{\"id\":\"8654\",\"title\":\"Malware Distribution - 2.26.98.67\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1169000\",\"longitude\":\"8.6837000\",\"ip_address\":\"2.26.98.67\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:10\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Ace Data Centers II\",\"created_at\":\"2026-04-16 13:35:10\",\"updated_at\":\"2026-04-16 13:35:10\",\"auto_import_date\":null},{\"id\":\"8653\",\"title\":\"Malware Distribution - 182.114.34.178\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.114.34.178\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:08\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 13:35:09\",\"updated_at\":\"2026-04-16 13:35:09\",\"auto_import_date\":null},{\"id\":\"8652\",\"title\":\"Malware Distribution - 89.189.181.54\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"55.0313000\",\"longitude\":\"82.9195000\",\"ip_address\":\"89.189.181.54\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:07\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Siberian Networks ltd\",\"created_at\":\"2026-04-16 13:35:07\",\"updated_at\":\"2026-04-16 13:35:07\",\"auto_import_date\":null},{\"id\":\"8651\",\"title\":\"Malware Distribution - 115.49.218.180\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.49.218.180\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:05\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 13:35:05\",\"updated_at\":\"2026-04-16 13:35:05\",\"auto_import_date\":null},{\"id\":\"8650\",\"title\":\"Malware Distribution - 182.126.126.199\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.126.126.199\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 13:35:03\",\"updated_at\":\"2026-04-16 13:35:03\",\"auto_import_date\":null},{\"id\":\"8649\",\"title\":\"Malware Distribution - 219.155.123.23\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"219.155.123.23\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 13:35:02\",\"updated_at\":\"2026-04-16 13:35:02\",\"auto_import_date\":null},{\"id\":\"8648\",\"title\":\"Malware Distribution - 193.163.187.213\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Albania\",\"latitude\":\"41.3287000\",\"longitude\":\"19.4494000\",\"ip_address\":\"193.163.187.213\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:35:00\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: MyTv-Alb SH.P.K.\",\"created_at\":\"2026-04-16 13:35:00\",\"updated_at\":\"2026-04-16 13:35:00\",\"auto_import_date\":null},{\"id\":\"8647\",\"title\":\"Malware Distribution - 182.118.240.155\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"182.118.240.155\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 13:34:58\",\"updated_at\":\"2026-04-16 13:34:58\",\"auto_import_date\":null},{\"id\":\"8646\",\"title\":\"Malware Distribution - 123.11.9.131\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.11.9.131\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 13:34:57\",\"updated_at\":\"2026-04-16 13:34:57\",\"auto_import_date\":null},{\"id\":\"8645\",\"title\":\"Malware Distribution - 61.53.91.133\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.91.133\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:55\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 13:34:55\",\"updated_at\":\"2026-04-16 13:34:55\",\"auto_import_date\":null},{\"id\":\"8644\",\"title\":\"Malware Distribution - 182.113.36.145\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.113.36.145\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 13:34:53\",\"updated_at\":\"2026-04-16 13:34:53\",\"auto_import_date\":null},{\"id\":\"8643\",\"title\":\"Malware Distribution - 119.178.165.188\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"119.178.165.188\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-16 13:34:51\",\"updated_at\":\"2026-04-16 13:34:51\",\"auto_import_date\":null},{\"id\":\"8642\",\"title\":\"Malware Distribution - 222.134.162.139\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"222.134.162.139\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-16 13:34:50\",\"updated_at\":\"2026-04-16 13:34:50\",\"auto_import_date\":null},{\"id\":\"8641\",\"title\":\"Malware Distribution - 39.68.43.217\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"39.68.43.217\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:48\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-16 13:34:48\",\"updated_at\":\"2026-04-16 13:34:48\",\"auto_import_date\":null},{\"id\":\"8640\",\"title\":\"Malware Distribution - 110.36.28.183\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"32.4926000\",\"longitude\":\"74.6124000\",\"ip_address\":\"110.36.28.183\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-16 13:34:46\",\"updated_at\":\"2026-04-16 13:34:46\",\"auto_import_date\":null},{\"id\":\"8639\",\"title\":\"Malware Distribution - 115.55.58.160\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.55.58.160\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 13:34:45\",\"updated_at\":\"2026-04-16 13:34:45\",\"auto_import_date\":null},{\"id\":\"8638\",\"title\":\"Malware Distribution - 125.46.197.2\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"125.46.197.2\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:43\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 13:34:43\",\"updated_at\":\"2026-04-16 13:34:43\",\"auto_import_date\":null},{\"id\":\"8637\",\"title\":\"Malware Distribution - 182.117.50.21\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.117.50.21\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 16:34:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 13:34:41\",\"updated_at\":\"2026-04-16 13:34:41\",\"auto_import_date\":null},{\"id\":\"8680\",\"title\":\"Beyond the breach: inside a cargo theft actor's post-compromise playbook\",\"description\":\"A cargo theft threat actor maintained access to a decoy environment for over a month, providing extensive visibility into post-compromise operations. The attacker established redundant persistence using multiple remote access tools, including four ScreenConnect instances, Pulseway RMM, and SimpleHelp RMM. A previously unknown signing-as-a-service capability was employed to evade detection by re-signing ScreenConnect installers with fraudulent code-signing certificates. Extensive reconnaissance t\",\"country\":\"Germany\",\"latitude\":\"52.5200000\",\"longitude\":\"13.4050000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 13:02:23\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 22\",\"created_at\":\"2026-04-16 20:48:03\",\"updated_at\":\"2026-04-16 20:48:03\",\"auto_import_date\":null},{\"id\":\"8636\",\"title\":\"Spam Source - 5.101.86.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL694579\",\"country\":\"Canada\",\"latitude\":\"45.5041000\",\"longitude\":\"-73.5522000\",\"ip_address\":\"5.101.86.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 10:30:33\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.101.86.0\\\/24\",\"created_at\":\"2026-04-16 07:30:34\",\"updated_at\":\"2026-04-16 07:30:34\",\"auto_import_date\":null},{\"id\":\"8657\",\"title\":\"CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace\",\"description\":\"Three days after disclosure of a critical pre-authorization remote code execution vulnerability in the marimo Python notebook platform, multiple threat actors deployed malware hosted on HuggingFace Spaces. A previously undocumented NKAbuse variant was delivered through a typosquatted HuggingFace Space, utilizing NKN blockchain for command and control. Between April 11-14, 2026, eleven unique source IPs across ten countries generated 662 exploit events. Attack patterns included reverse shell camp\",\"country\":\"Malaysia\",\"latitude\":\"3.0966400\",\"longitude\":\"101.6770000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 08:36:45\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 19\",\"created_at\":\"2026-04-16 15:00:22\",\"updated_at\":\"2026-04-16 15:00:22\",\"auto_import_date\":null},{\"id\":\"8635\",\"title\":\"Malware Distribution - 120.28.138.7\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Philippines\",\"latitude\":\"14.6438000\",\"longitude\":\"120.9632000\",\"ip_address\":\"120.28.138.7\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:18\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Globe Telecom\",\"created_at\":\"2026-04-16 01:37:19\",\"updated_at\":\"2026-04-16 01:37:19\",\"auto_import_date\":null},{\"id\":\"8634\",\"title\":\"Malware Distribution - 187.45.95.254\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Brazil\",\"latitude\":\"-7.2855000\",\"longitude\":\"-35.6485000\",\"ip_address\":\"187.45.95.254\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: ASSOCIA\\u00c7\\u00c3O NACIONAL PARA INCLUS\\u00c3O DIGITAL - ANID\",\"created_at\":\"2026-04-16 01:37:17\",\"updated_at\":\"2026-04-16 01:37:17\",\"auto_import_date\":null},{\"id\":\"8633\",\"title\":\"Malware Distribution - 180.244.8.214\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.1624000\",\"longitude\":\"106.7857000\",\"ip_address\":\"180.244.8.214\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PT. TELKOM INDONESIA\",\"created_at\":\"2026-04-16 01:37:15\",\"updated_at\":\"2026-04-16 01:37:15\",\"auto_import_date\":null},{\"id\":\"8632\",\"title\":\"Malware Distribution - 85.239.147.6\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Finland\",\"latitude\":\"60.1699000\",\"longitude\":\"24.9384000\",\"ip_address\":\"85.239.147.6\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:13\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: HomeLine Broadband LLC\",\"created_at\":\"2026-04-16 01:37:14\",\"updated_at\":\"2026-04-16 01:37:14\",\"auto_import_date\":null},{\"id\":\"8631\",\"title\":\"Malware Distribution - 222.138.239.41\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.138.239.41\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 01:37:12\",\"updated_at\":\"2026-04-16 01:37:12\",\"auto_import_date\":null},{\"id\":\"8630\",\"title\":\"Malware Distribution - 42.231.224.68\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.231.224.68\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:10\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 01:37:10\",\"updated_at\":\"2026-04-16 01:37:10\",\"auto_import_date\":null},{\"id\":\"8629\",\"title\":\"Malware Distribution - 175.146.153.184\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"175.146.153.184\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:08\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-16 01:37:09\",\"updated_at\":\"2026-04-16 01:37:09\",\"auto_import_date\":null},{\"id\":\"8628\",\"title\":\"Malware Distribution - 175.165.114.202\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"175.165.114.202\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:07\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-16 01:37:07\",\"updated_at\":\"2026-04-16 01:37:07\",\"auto_import_date\":null},{\"id\":\"8627\",\"title\":\"Malware Distribution - 42.224.102.253\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.224.102.253\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:05\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 01:37:05\",\"updated_at\":\"2026-04-16 01:37:05\",\"auto_import_date\":null},{\"id\":\"8626\",\"title\":\"Malware Distribution - 222.142.254.82\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.142.254.82\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 01:37:04\",\"updated_at\":\"2026-04-16 01:37:04\",\"auto_import_date\":null},{\"id\":\"8625\",\"title\":\"Malware Distribution - 113.221.15.165\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"28.1142000\",\"longitude\":\"112.9830000\",\"ip_address\":\"113.221.15.165\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:02\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-16 01:37:02\",\"updated_at\":\"2026-04-16 01:37:02\",\"auto_import_date\":null},{\"id\":\"8624\",\"title\":\"Malware Distribution - 180.188.138.221\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Hong Kong\",\"latitude\":\"22.3031000\",\"longitude\":\"114.1920000\",\"ip_address\":\"180.188.138.221\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:37:00\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: HGC Global Communications Limited\",\"created_at\":\"2026-04-16 01:37:00\",\"updated_at\":\"2026-04-16 01:37:00\",\"auto_import_date\":null},{\"id\":\"8623\",\"title\":\"Malware Distribution - 182.116.122.104\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.116.122.104\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 01:36:58\",\"updated_at\":\"2026-04-16 01:36:58\",\"auto_import_date\":null},{\"id\":\"8622\",\"title\":\"Malware Distribution - 125.161.248.54\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.1810000\",\"longitude\":\"106.7739000\",\"ip_address\":\"125.161.248.54\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:57\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telekomunikasi Indonesia\",\"created_at\":\"2026-04-16 01:36:57\",\"updated_at\":\"2026-04-16 01:36:57\",\"auto_import_date\":null},{\"id\":\"8621\",\"title\":\"Malware Distribution - 39.86.52.95\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"39.86.52.95\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:55\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-16 01:36:55\",\"updated_at\":\"2026-04-16 01:36:55\",\"auto_import_date\":null},{\"id\":\"8620\",\"title\":\"Malware Distribution - 42.177.238.150\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.177.238.150\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-16 01:36:54\",\"updated_at\":\"2026-04-16 01:36:54\",\"auto_import_date\":null},{\"id\":\"8619\",\"title\":\"Malware Distribution - 42.229.217.59\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.229.217.59\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-16 01:36:52\",\"updated_at\":\"2026-04-16 01:36:52\",\"auto_import_date\":null},{\"id\":\"8618\",\"title\":\"Malware Distribution - 125.38.134.233\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"39.1424000\",\"longitude\":\"117.1727000\",\"ip_address\":\"125.38.134.233\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:50\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Tianjin Province Network\",\"created_at\":\"2026-04-16 01:36:50\",\"updated_at\":\"2026-04-16 01:36:50\",\"auto_import_date\":null},{\"id\":\"8617\",\"title\":\"Malware Distribution - 123.13.48.231\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.13.48.231\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-16 04:36:48\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-16 01:36:48\",\"updated_at\":\"2026-04-16 01:36:48\",\"auto_import_date\":null},{\"id\":\"8611\",\"title\":\"Malware Distribution - 219.157.62.56\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.157.62.56\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 22:29:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 19:29:56\",\"updated_at\":\"2026-04-15 19:29:56\",\"auto_import_date\":null},{\"id\":\"8610\",\"title\":\"Malware Distribution - 42.238.134.89\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.238.134.89\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 22:29:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-15 19:29:55\",\"updated_at\":\"2026-04-15 19:29:55\",\"auto_import_date\":null},{\"id\":\"8609\",\"title\":\"Malware Distribution - 115.55.132.253\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.55.132.253\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 22:29:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 19:29:53\",\"updated_at\":\"2026-04-15 19:29:53\",\"auto_import_date\":null},{\"id\":\"8615\",\"title\":\"Silent Crypto Wallet Takeover Unlimited USDT Approval Exploitation via Trust Wallet QR Code Phishing\",\"description\":\"An active campaign targets Trust Wallet users through malicious QR codes distributed via Telegram, exploiting deep link mechanisms to redirect victims to Netlify-hosted phishing domains. The attack masquerades as a legitimate USDT transfer interface but covertly triggers an ERC-20 approve() transaction, granting unlimited token allowance to an attacker-controlled contract on BNB Smart Chain. This enables persistent fund drainage without further victim interaction. The modular drainer architectur\",\"country\":\"Romania\",\"latitude\":\"44.4268000\",\"longitude\":\"26.1025000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 17:16:15\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 4\",\"created_at\":\"2026-04-15 20:45:09\",\"updated_at\":\"2026-04-15 20:45:09\",\"auto_import_date\":null},{\"id\":\"8616\",\"title\":\"Fake YouTube copyright notices can steal your Google login\",\"description\":\"A sophisticated phishing campaign is targeting YouTube creators using convincing fake copyright strike notifications. The attack dynamically pulls real channel data including profile pictures, subscriber counts, and recent videos to create personalized scare pages. Victims are funneled through a Browser-in-the-Browser attack displaying a fake Google sign-in that captures credentials. The operation functions as phishing-as-a-service, with multiple attackers sharing infrastructure and rotating dom\",\"country\":\"United States\",\"latitude\":\"38.9072000\",\"longitude\":\"-77.0369000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 17:15:57\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 5\",\"created_at\":\"2026-04-15 20:45:09\",\"updated_at\":\"2026-04-15 20:45:09\",\"auto_import_date\":null},{\"id\":\"8614\",\"title\":\"From fake Proton VPN sites to gaming mods, this Windows infostealer is everywhere\",\"description\":\"Multiple campaigns are distributing NWHStealer through diverse platforms including fake VPN downloads, hardware utilities, and gaming modifications. The infostealer collects browser data, saved passwords, and cryptocurrency wallet information. Distribution occurs via fake websites impersonating legitimate services like Proton VPN, code hosting platforms such as GitHub and GitLab, file hosting services including MediaFire and SourceForge, and links from YouTube videos. Two primary infection metho\",\"country\":\"Romania\",\"latitude\":\"44.4268000\",\"longitude\":\"26.1025000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 16:13:12\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 8\",\"created_at\":\"2026-04-15 20:45:09\",\"updated_at\":\"2026-04-15 20:45:09\",\"auto_import_date\":null},{\"id\":\"8613\",\"title\":\"The n8n n8mare: How threat actors are misusing AI workflow automation\",\"description\":\"Investigation reveals widespread abuse of n8n, an AI workflow automation platform, in sophisticated phishing campaigns from October 2025 through March 2026. Attackers exploit the platform's webhook functionality to deliver malware and fingerprint devices while bypassing security filters through trusted infrastructure. Email volume containing n8n webhook URLs increased by 686% between January 2025 and March 2026. Observed campaigns utilize CAPTCHA-protected pages to deliver remote access tools in\",\"country\":\"United States\",\"latitude\":\"38.9072000\",\"longitude\":\"-77.0369000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 15:08:21\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 15\",\"created_at\":\"2026-04-15 20:45:08\",\"updated_at\":\"2026-04-15 20:45:08\",\"auto_import_date\":null},{\"id\":\"8606\",\"title\":\"Malware Distribution - 123.10.36.176\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.36.176\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:33\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:33\",\"updated_at\":\"2026-04-15 07:38:33\",\"auto_import_date\":null},{\"id\":\"8605\",\"title\":\"Malware Distribution - 113.239.69.72\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"113.239.69.72\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:31\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-15 07:38:31\",\"updated_at\":\"2026-04-15 07:38:31\",\"auto_import_date\":null},{\"id\":\"8604\",\"title\":\"Malware Distribution - 110.37.39.234\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.39.234\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-15 07:38:30\",\"updated_at\":\"2026-04-15 07:38:30\",\"auto_import_date\":null},{\"id\":\"8603\",\"title\":\"Malware Distribution - 115.62.154.202\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.62.154.202\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:28\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:28\",\"updated_at\":\"2026-04-15 07:38:28\",\"auto_import_date\":null},{\"id\":\"8602\",\"title\":\"Malware Distribution - 61.3.19.106\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"14.7601000\",\"longitude\":\"75.1175000\",\"ip_address\":\"61.3.19.106\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:26\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Bharat Sanchar Nigam Ltd\",\"created_at\":\"2026-04-15 07:38:26\",\"updated_at\":\"2026-04-15 07:38:26\",\"auto_import_date\":null},{\"id\":\"8601\",\"title\":\"Malware Distribution - 125.42.33.158\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"125.42.33.158\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:24\",\"updated_at\":\"2026-04-15 07:38:24\",\"auto_import_date\":null},{\"id\":\"8600\",\"title\":\"Malware Distribution - 124.198.131.88\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United States\",\"latitude\":\"40.7126000\",\"longitude\":\"-74.0066000\",\"ip_address\":\"124.198.131.88\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: 1337 Services GmbH\",\"created_at\":\"2026-04-15 07:38:23\",\"updated_at\":\"2026-04-15 07:38:23\",\"auto_import_date\":null},{\"id\":\"8599\",\"title\":\"Malware Distribution - 42.180.38.47\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.180.38.47\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:21\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-15 07:38:21\",\"updated_at\":\"2026-04-15 07:38:21\",\"auto_import_date\":null},{\"id\":\"8598\",\"title\":\"Malware Distribution - 115.58.173.223\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.58.173.223\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:19\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:19\",\"updated_at\":\"2026-04-15 07:38:19\",\"auto_import_date\":null},{\"id\":\"8597\",\"title\":\"Malware Distribution - 219.156.51.105\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.156.51.105\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:18\",\"updated_at\":\"2026-04-15 07:38:18\",\"auto_import_date\":null},{\"id\":\"8596\",\"title\":\"Malware Distribution - 221.14.168.156\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"221.14.168.156\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:16\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:16\",\"updated_at\":\"2026-04-15 07:38:16\",\"auto_import_date\":null},{\"id\":\"8595\",\"title\":\"Malware Distribution - 115.50.89.11\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.50.89.11\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:14\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:14\",\"updated_at\":\"2026-04-15 07:38:14\",\"auto_import_date\":null},{\"id\":\"8594\",\"title\":\"Malware Distribution - 119.187.239.144\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"119.187.239.144\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-15 07:38:12\",\"updated_at\":\"2026-04-15 07:38:12\",\"auto_import_date\":null},{\"id\":\"8593\",\"title\":\"Malware Distribution - 60.23.223.141\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8357000\",\"longitude\":\"123.4290000\",\"ip_address\":\"60.23.223.141\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:11\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CHINA UNICOM China169 Backbone\",\"created_at\":\"2026-04-15 07:38:11\",\"updated_at\":\"2026-04-15 07:38:11\",\"auto_import_date\":null},{\"id\":\"8592\",\"title\":\"Malware Distribution - 115.59.27.175\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.59.27.175\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:09\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-15 07:38:09\",\"updated_at\":\"2026-04-15 07:38:09\",\"auto_import_date\":null},{\"id\":\"8591\",\"title\":\"Malware Distribution - 84.21.189.150\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1169000\",\"longitude\":\"8.6837000\",\"ip_address\":\"84.21.189.150\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:07\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Qwins LTD\",\"created_at\":\"2026-04-15 07:38:07\",\"updated_at\":\"2026-04-15 07:38:07\",\"auto_import_date\":null},{\"id\":\"8590\",\"title\":\"Malware Distribution - 59.47.190.105\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.2941000\",\"longitude\":\"123.7670000\",\"ip_address\":\"59.47.190.105\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:06\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-15 07:38:06\",\"updated_at\":\"2026-04-15 07:38:06\",\"auto_import_date\":null},{\"id\":\"8589\",\"title\":\"Malware Distribution - 45.92.1.242\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Netherlands\",\"latitude\":\"52.5150000\",\"longitude\":\"5.4847000\",\"ip_address\":\"45.92.1.242\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:04\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: 1337 Services GmbH\",\"created_at\":\"2026-04-15 07:38:04\",\"updated_at\":\"2026-04-15 07:38:04\",\"auto_import_date\":null},{\"id\":\"8588\",\"title\":\"Malware Distribution - 182.121.46.177\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.46.177\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:02\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-15 07:38:02\",\"updated_at\":\"2026-04-15 07:38:02\",\"auto_import_date\":null},{\"id\":\"8587\",\"title\":\"Malware Distribution - 45.171.177.193\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Brazil\",\"latitude\":\"-19.8828000\",\"longitude\":\"-44.0801000\",\"ip_address\":\"45.171.177.193\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:38:00\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Planex Telecom\",\"created_at\":\"2026-04-15 07:38:01\",\"updated_at\":\"2026-04-15 07:38:01\",\"auto_import_date\":null},{\"id\":\"8586\",\"title\":\"Spam Source - 23.147.52.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL689777\",\"country\":\"United States\",\"latitude\":\"39.8032000\",\"longitude\":\"-104.7610000\",\"ip_address\":\"23.147.52.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 10:37:58\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.147.52.0\\\/24\",\"created_at\":\"2026-04-15 07:37:58\",\"updated_at\":\"2026-04-15 07:37:58\",\"auto_import_date\":null},{\"id\":\"8612\",\"title\":\"Chasing an Angry Spark\",\"description\":\"In spring 2022, a highly sophisticated backdoor named AngrySpark was discovered on a single machine in the United Kingdom. The malware employed a three-stage architecture: a DLL masquerading as a Windows Task Scheduler component, a custom virtual machine interpreter running bytecode instructions, and a beacon that profiles systems while disguising C2 communications as PNG image requests. The malware featured VM-based obfuscation, dual encrypted C2 channels using RSA-4096 and XXTEA encryption, di\",\"country\":\"United Kingdom\",\"latitude\":\"51.5081000\",\"longitude\":\"-0.1278000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 09:21:55\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 17\",\"created_at\":\"2026-04-15 20:45:08\",\"updated_at\":\"2026-04-15 20:45:08\",\"auto_import_date\":null},{\"id\":\"8585\",\"title\":\"Spam Source - 23.147.164.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL689968\",\"country\":\"United States\",\"latitude\":\"39.1325000\",\"longitude\":\"-94.1986000\",\"ip_address\":\"23.147.164.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 04:31:18\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.147.164.0\\\/24\",\"created_at\":\"2026-04-15 01:31:18\",\"updated_at\":\"2026-04-15 01:31:18\",\"auto_import_date\":null},{\"id\":\"8584\",\"title\":\"Spam Source - 23.147.156.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL689967\",\"country\":\"United States\",\"latitude\":\"39.1520000\",\"longitude\":\"-84.5081000\",\"ip_address\":\"23.147.156.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 04:31:16\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.147.156.0\\\/24\",\"created_at\":\"2026-04-15 01:31:16\",\"updated_at\":\"2026-04-15 01:31:16\",\"auto_import_date\":null},{\"id\":\"8583\",\"title\":\"Spam Source - 23.147.148.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL689966\",\"country\":\"United States\",\"latitude\":\"38.6953000\",\"longitude\":\"-93.2383000\",\"ip_address\":\"23.147.148.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 04:31:14\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.147.148.0\\\/24\",\"created_at\":\"2026-04-15 01:31:15\",\"updated_at\":\"2026-04-15 01:31:15\",\"auto_import_date\":null},{\"id\":\"8582\",\"title\":\"Spam Source - 5.101.82.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL689964\",\"country\":\"Germany\",\"latitude\":\"50.1084000\",\"longitude\":\"8.6837000\",\"ip_address\":\"5.101.82.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-15 04:31:12\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.101.82.0\\\/24\",\"created_at\":\"2026-04-15 01:31:13\",\"updated_at\":\"2026-04-15 01:31:13\",\"auto_import_date\":null},{\"id\":\"8580\",\"title\":\"Malware Distribution - 115.56.112.254\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.56.112.254\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 19:32:53\",\"updated_at\":\"2026-04-14 19:32:53\",\"auto_import_date\":null},{\"id\":\"8579\",\"title\":\"Malware Distribution - 115.50.28.175\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.50.28.175\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 19:32:52\",\"updated_at\":\"2026-04-14 19:32:52\",\"auto_import_date\":null},{\"id\":\"8578\",\"title\":\"Malware Distribution - 119.179.250.240\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"119.179.250.240\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:50\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-14 19:32:50\",\"updated_at\":\"2026-04-14 19:32:50\",\"auto_import_date\":null},{\"id\":\"8577\",\"title\":\"Malware Distribution - 61.53.239.45\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.239.45\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:48\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 19:32:48\",\"updated_at\":\"2026-04-14 19:32:48\",\"auto_import_date\":null},{\"id\":\"8576\",\"title\":\"Malware Distribution - 112.240.250.145\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"112.240.250.145\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-14 19:32:46\",\"updated_at\":\"2026-04-14 19:32:46\",\"auto_import_date\":null},{\"id\":\"8575\",\"title\":\"Malware Distribution - 125.166.201.116\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.1716000\",\"longitude\":\"106.5265000\",\"ip_address\":\"125.166.201.116\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PT. TELKOM INDONESIA\",\"created_at\":\"2026-04-14 19:32:45\",\"updated_at\":\"2026-04-14 19:32:45\",\"auto_import_date\":null},{\"id\":\"8574\",\"title\":\"Malware Distribution - 222.138.206.249\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.138.206.249\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:43\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 19:32:43\",\"updated_at\":\"2026-04-14 19:32:43\",\"auto_import_date\":null},{\"id\":\"8573\",\"title\":\"Malware Distribution - 219.155.63.138\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"219.155.63.138\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 19:32:41\",\"updated_at\":\"2026-04-14 19:32:41\",\"auto_import_date\":null},{\"id\":\"8572\",\"title\":\"Malware Distribution - 42.224.168.31\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.6735000\",\"longitude\":\"112.4368000\",\"ip_address\":\"42.224.168.31\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 19:32:40\",\"updated_at\":\"2026-04-14 19:32:40\",\"auto_import_date\":null},{\"id\":\"8571\",\"title\":\"Malware Distribution - 182.124.40.151\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.124.40.151\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:38\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 19:32:38\",\"updated_at\":\"2026-04-14 19:32:38\",\"auto_import_date\":null},{\"id\":\"8570\",\"title\":\"Malware Distribution - 110.138.131.72\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.2808000\",\"longitude\":\"106.9835000\",\"ip_address\":\"110.138.131.72\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:36\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PT. TELKOM INDONESIA\",\"created_at\":\"2026-04-14 19:32:36\",\"updated_at\":\"2026-04-14 19:32:36\",\"auto_import_date\":null},{\"id\":\"8569\",\"title\":\"Malware Distribution - 125.160.135.94\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.2808000\",\"longitude\":\"106.9835000\",\"ip_address\":\"125.160.135.94\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PT. TELKOM INDONESIA\",\"created_at\":\"2026-04-14 19:32:34\",\"updated_at\":\"2026-04-14 19:32:34\",\"auto_import_date\":null},{\"id\":\"8568\",\"title\":\"Malware Distribution - 43.248.15.119\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"43.248.15.119\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Z COM Networks (Private) Limited\",\"created_at\":\"2026-04-14 19:32:32\",\"updated_at\":\"2026-04-14 19:32:32\",\"auto_import_date\":null},{\"id\":\"8567\",\"title\":\"Malware Distribution - 46.227.184.199\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Kazakhstan\",\"latitude\":\"51.1605000\",\"longitude\":\"71.4704000\",\"ip_address\":\"46.227.184.199\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Kar-Tel LLC\",\"created_at\":\"2026-04-14 19:32:31\",\"updated_at\":\"2026-04-14 19:32:31\",\"auto_import_date\":null},{\"id\":\"8566\",\"title\":\"Malware Distribution - 112.248.140.131\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"112.248.140.131\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-14 19:32:29\",\"updated_at\":\"2026-04-14 19:32:29\",\"auto_import_date\":null},{\"id\":\"8565\",\"title\":\"Malware Distribution - 46.8.78.55\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Hong Kong\",\"latitude\":\"22.3193000\",\"longitude\":\"114.1690000\",\"ip_address\":\"46.8.78.55\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CGI GLOBAL LIMITED\",\"created_at\":\"2026-04-14 19:32:27\",\"updated_at\":\"2026-04-14 19:32:27\",\"auto_import_date\":null},{\"id\":\"8564\",\"title\":\"Malware Distribution - 119.116.155.243\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"119.116.155.243\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-14 19:32:26\",\"updated_at\":\"2026-04-14 19:32:26\",\"auto_import_date\":null},{\"id\":\"8563\",\"title\":\"Malware Distribution - 112.249.89.236\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"112.249.89.236\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 22:32:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-14 19:32:24\",\"updated_at\":\"2026-04-14 19:32:24\",\"auto_import_date\":null},{\"id\":\"8581\",\"title\":\"108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure\",\"description\":\"A coordinated campaign of 108 malicious Chrome extensions operated through shared command-and-control infrastructure at cloudapi[.]stream has been identified, collectively accounting for approximately 20,000 installations. The campaign spans multiple threat categories: 54 extensions steal Google account identities via OAuth2, one extension actively exfiltrates Telegram Web sessions every 15 seconds, and 45 extensions contain a universal backdoor enabling arbitrary URL execution on browser startu\",\"country\":\"United States\",\"latitude\":\"38.6364000\",\"longitude\":\"-90.1985000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 15:38:11\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 44\",\"created_at\":\"2026-04-14 20:46:54\",\"updated_at\":\"2026-04-14 20:46:54\",\"auto_import_date\":null},{\"id\":\"8562\",\"title\":\"59 Victims, Zero Authentication: A ClickFix Campaign Force-Installs a Chrome Extension Banking Stealer and Leaves the Entire C2 Wide Open\",\"description\":\"A Brazilian banking fraud operation leveraging ClickFix social engineering was discovered through a community tip, exposing a completely unauthenticated command-and-control infrastructure. The campaign deploys a malicious Chrome extension masquerading as a Banco Central do Brasil tool, force-installed via Chrome Cloud Management enrollment tokens. The extension achieves zero antivirus detections while targeting eight Brazilian financial institutions. At investigation time, 59 machines were compr\",\"country\":\"United States\",\"latitude\":\"38.6364000\",\"longitude\":\"-90.1985000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 13:56:58\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 19\",\"created_at\":\"2026-04-14 15:09:19\",\"updated_at\":\"2026-04-14 15:09:19\",\"auto_import_date\":null},{\"id\":\"8556\",\"title\":\"Malware Distribution - 147.45.42.251\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"48.8558000\",\"longitude\":\"2.3494000\",\"ip_address\":\"147.45.42.251\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Aeza International LTD\",\"created_at\":\"2026-04-14 08:03:00\",\"updated_at\":\"2026-04-14 08:03:00\",\"auto_import_date\":null},{\"id\":\"8555\",\"title\":\"Malware Distribution - 123.10.240.255\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.240.255\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:57\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 08:02:58\",\"updated_at\":\"2026-04-14 08:02:58\",\"auto_import_date\":null},{\"id\":\"8554\",\"title\":\"Malware Distribution - 182.124.137.90\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.124.137.90\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 08:02:56\",\"updated_at\":\"2026-04-14 08:02:56\",\"auto_import_date\":null},{\"id\":\"8553\",\"title\":\"Malware Distribution - 182.113.195.13\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.113.195.13\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 08:02:54\",\"updated_at\":\"2026-04-14 08:02:54\",\"auto_import_date\":null},{\"id\":\"8552\",\"title\":\"Malware Distribution - 42.5.243.162\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.5.243.162\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-14 08:02:53\",\"updated_at\":\"2026-04-14 08:02:53\",\"auto_import_date\":null},{\"id\":\"8551\",\"title\":\"Malware Distribution - 123.13.108.229\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.13.108.229\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 08:02:51\",\"updated_at\":\"2026-04-14 08:02:51\",\"auto_import_date\":null},{\"id\":\"8550\",\"title\":\"Malware Distribution - 182.114.252.9\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.114.252.9\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 08:02:49\",\"updated_at\":\"2026-04-14 08:02:49\",\"auto_import_date\":null},{\"id\":\"8549\",\"title\":\"Malware Distribution - 27.37.110.185\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"23.0207000\",\"longitude\":\"113.7520000\",\"ip_address\":\"27.37.110.185\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Guangdong Province Network\",\"created_at\":\"2026-04-14 08:02:48\",\"updated_at\":\"2026-04-14 08:02:48\",\"auto_import_date\":null},{\"id\":\"8548\",\"title\":\"Malware Distribution - 85.137.165.145\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Czechia\",\"latitude\":\"50.0755000\",\"longitude\":\"14.4378000\",\"ip_address\":\"85.137.165.145\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: SmartApe OU\",\"created_at\":\"2026-04-14 08:02:46\",\"updated_at\":\"2026-04-14 08:02:46\",\"auto_import_date\":null},{\"id\":\"8547\",\"title\":\"Malware Distribution - 182.117.69.33\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.117.69.33\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 08:02:44\",\"updated_at\":\"2026-04-14 08:02:44\",\"auto_import_date\":null},{\"id\":\"8546\",\"title\":\"Malware Distribution - 222.138.64.12\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.138.64.12\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 08:02:42\",\"updated_at\":\"2026-04-14 08:02:42\",\"auto_import_date\":null},{\"id\":\"8545\",\"title\":\"Malware Distribution - 182.117.41.179\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.117.41.179\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 08:02:41\",\"updated_at\":\"2026-04-14 08:02:41\",\"auto_import_date\":null},{\"id\":\"8544\",\"title\":\"Malware Distribution - 110.36.80.173\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.4819000\",\"longitude\":\"74.3536000\",\"ip_address\":\"110.36.80.173\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-14 08:02:39\",\"updated_at\":\"2026-04-14 08:02:39\",\"auto_import_date\":null},{\"id\":\"8543\",\"title\":\"Malware Distribution - 105.186.213.212\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-29.1252000\",\"longitude\":\"26.1630000\",\"ip_address\":\"105.186.213.212\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-14 08:02:37\",\"updated_at\":\"2026-04-14 08:02:37\",\"auto_import_date\":null},{\"id\":\"8542\",\"title\":\"Malware Distribution - 125.41.170.101\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"125.41.170.101\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 11:02:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 08:02:36\",\"updated_at\":\"2026-04-14 08:02:36\",\"auto_import_date\":null},{\"id\":\"8557\",\"title\":\"Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks\",\"description\":\"APT37 conducted a sophisticated social engineering campaign utilizing Facebook accounts claiming locations in Pyongyang and Pyongsong, North Korea, to conduct reconnaissance and build trust with targets. After establishing relationships through Facebook Messenger, the threat actor migrated conversations to Telegram and employed pretexting tactics, claiming to share encrypted PDF documents containing military weapons information. Victims were persuaded to install a tampered Wondershare PDFelement\",\"country\":\"South Korea\",\"latitude\":\"37.3654000\",\"longitude\":\"127.1220000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 08:55:08\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 21\",\"created_at\":\"2026-04-14 10:09:45\",\"updated_at\":\"2026-04-14 10:09:45\",\"auto_import_date\":null},{\"id\":\"8558\",\"title\":\"Q1 2026 Malware Statistics Report for Linux SSH Servers\",\"description\":\"Analysis of attacks against Linux SSH servers during Q1 2026 reveals P2PInfect worm as the dominant threat, representing 70.3% of all attack sources. DDoS botnets including Mirai, XMRig, Prometei, and CoinMiner were identified as primary threats. A notable campaign involved installing V2Ray proxy tools on compromised systems, attributed to a suspected Chinese threat actor. Attackers employed SSH brute-force techniques to gain access, executed reconnaissance commands to assess system information,\",\"country\":\"Singapore\",\"latitude\":\"1.2919000\",\"longitude\":\"103.8500000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 08:54:27\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 2\",\"created_at\":\"2026-04-14 10:09:46\",\"updated_at\":\"2026-04-14 10:09:46\",\"auto_import_date\":null},{\"id\":\"8559\",\"title\":\"Q1 2026 Malware Statistics Report for Windows Database Servers\",\"description\":\"During the first quarter of 2026, Windows-based MS-SQL and MySQL database servers experienced consistent malicious attacks with a temporary decrease in February before rising again in March. The primary threat actor, Larva-26002, leveraged various utilities including BCP, curl, bitsadmin, and PowerShell to deploy a Go-based scanner called ICE Cloud, which contained Turkish language strings and C&C-based scanning capabilities. This tool attempted MS-SQL authentication using predefined credentials\",\"country\":\"The Netherlands\",\"latitude\":\"52.3676000\",\"longitude\":\"4.9041400\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 08:54:02\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 13\",\"created_at\":\"2026-04-14 10:09:46\",\"updated_at\":\"2026-04-14 10:09:46\",\"auto_import_date\":null},{\"id\":\"8561\",\"title\":\"Q1 2026 malware statistics report for Windows web servers\",\"description\":\"Analysis of Windows web server attacks during Q1 2026 reveals that Internet Information Services (IIS) and Apache Tomcat servers face persistent threats through web shell exploitation. The Larva-26001 threat actor has been targeting domestic IIS servers for several years, deploying privilege escalation tools including JuicyPotato, BadPotato, and exploiting CVE-2019-1458. Following privilege escalation, attackers utilize port-forwarding tools like HTran and PortTranC to redirect traffic to RDP po\",\"country\":\"France\",\"latitude\":\"48.8566000\",\"longitude\":\"2.3522000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 08:53:33\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 8\",\"created_at\":\"2026-04-14 10:09:47\",\"updated_at\":\"2026-04-14 10:09:47\",\"auto_import_date\":null},{\"id\":\"8560\",\"title\":\"March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day\",\"description\":\"In March 2026, 31 high-impact vulnerabilities were identified requiring prioritization for remediation, with 29 receiving Very Critical Risk Scores. Affected vendors included Cisco, Microsoft, Google, ConnectWise, and others, with Microsoft and Apple accounting for approximately 32% of vulnerabilities. Notably, the Interlock Ransomware Group exploited CVE-2026-20131, a zero-day deserialization vulnerability in Cisco Secure Firewall Management Center, as early as January 2026 to compromise enterp\",\"country\":\"Finland\",\"latitude\":\"60.1719000\",\"longitude\":\"24.9347000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"ransomware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 08:53:11\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 27\",\"created_at\":\"2026-04-14 10:09:46\",\"updated_at\":\"2026-04-14 10:09:46\",\"auto_import_date\":null},{\"id\":\"8541\",\"title\":\"Malware Distribution - 123.10.25.133\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.25.133\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 01:56:56\",\"updated_at\":\"2026-04-14 01:56:56\",\"auto_import_date\":null},{\"id\":\"8540\",\"title\":\"Malware Distribution - 115.63.188.1\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.63.188.1\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 01:56:54\",\"updated_at\":\"2026-04-14 01:56:54\",\"auto_import_date\":null},{\"id\":\"8539\",\"title\":\"Malware Distribution - 182.117.76.47\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.117.76.47\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 01:56:53\",\"updated_at\":\"2026-04-14 01:56:53\",\"auto_import_date\":null},{\"id\":\"8538\",\"title\":\"Malware Distribution - 60.18.85.182\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8357000\",\"longitude\":\"123.4290000\",\"ip_address\":\"60.18.85.182\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CHINA UNICOM China169 Backbone\",\"created_at\":\"2026-04-14 01:56:51\",\"updated_at\":\"2026-04-14 01:56:51\",\"auto_import_date\":null},{\"id\":\"8537\",\"title\":\"Malware Distribution - 221.214.246.46\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"221.214.246.46\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-14 01:56:49\",\"updated_at\":\"2026-04-14 01:56:49\",\"auto_import_date\":null},{\"id\":\"8536\",\"title\":\"Malware Distribution - 194.163.140.58\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"48.9742000\",\"longitude\":\"8.1851000\",\"ip_address\":\"194.163.140.58\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Contabo GmbH\",\"created_at\":\"2026-04-14 01:56:47\",\"updated_at\":\"2026-04-14 01:56:47\",\"auto_import_date\":null},{\"id\":\"8535\",\"title\":\"Malware Distribution - 186.227.247.25\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Brazil\",\"latitude\":\"-20.7471000\",\"longitude\":\"-46.2855000\",\"ip_address\":\"186.227.247.25\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Rede Exitus Ltda\",\"created_at\":\"2026-04-14 01:56:46\",\"updated_at\":\"2026-04-14 01:56:46\",\"auto_import_date\":null},{\"id\":\"8534\",\"title\":\"Malware Distribution - 110.38.221.11\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.38.221.11\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom (Pvt.) Ltd\",\"created_at\":\"2026-04-14 01:56:44\",\"updated_at\":\"2026-04-14 01:56:44\",\"auto_import_date\":null},{\"id\":\"8533\",\"title\":\"Malware Distribution - 221.15.187.90\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"221.15.187.90\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 01:56:43\",\"updated_at\":\"2026-04-14 01:56:43\",\"auto_import_date\":null},{\"id\":\"8532\",\"title\":\"Malware Distribution - 61.54.42.193\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"35.1874000\",\"longitude\":\"113.8025000\",\"ip_address\":\"61.54.42.193\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-14 01:56:41\",\"updated_at\":\"2026-04-14 01:56:41\",\"auto_import_date\":null},{\"id\":\"8531\",\"title\":\"Malware Distribution - 222.219.74.101\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"25.0453000\",\"longitude\":\"102.7100000\",\"ip_address\":\"222.219.74.101\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-14 01:56:39\",\"updated_at\":\"2026-04-14 01:56:39\",\"auto_import_date\":null},{\"id\":\"8530\",\"title\":\"Malware Distribution - 182.121.21.186\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.21.186\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 01:56:37\",\"updated_at\":\"2026-04-14 01:56:37\",\"auto_import_date\":null},{\"id\":\"8529\",\"title\":\"Malware Distribution - 5.165.101.226\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"55.5044000\",\"longitude\":\"47.4872000\",\"ip_address\":\"5.165.101.226\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: JSC \\\"ER-Telecom Holding\\\"\",\"created_at\":\"2026-04-14 01:56:36\",\"updated_at\":\"2026-04-14 01:56:36\",\"auto_import_date\":null},{\"id\":\"8528\",\"title\":\"Malware Distribution - 60.219.202.31\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"45.7567000\",\"longitude\":\"126.6420000\",\"ip_address\":\"60.219.202.31\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Heilongjiang Province Network\",\"created_at\":\"2026-04-14 01:56:34\",\"updated_at\":\"2026-04-14 01:56:34\",\"auto_import_date\":null},{\"id\":\"8527\",\"title\":\"Malware Distribution - 182.116.9.59\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.116.9.59\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 01:56:32\",\"updated_at\":\"2026-04-14 01:56:32\",\"auto_import_date\":null},{\"id\":\"8526\",\"title\":\"Malware Distribution - 42.239.191.226\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.239.191.226\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 01:56:30\",\"updated_at\":\"2026-04-14 01:56:30\",\"auto_import_date\":null},{\"id\":\"8525\",\"title\":\"Malware Distribution - 176.65.134.19\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"48.6242000\",\"longitude\":\"13.6687000\",\"ip_address\":\"176.65.134.19\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Netiface LLC\",\"created_at\":\"2026-04-14 01:56:29\",\"updated_at\":\"2026-04-14 01:56:29\",\"auto_import_date\":null},{\"id\":\"8524\",\"title\":\"Malware Distribution - 110.36.86.83\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.4819000\",\"longitude\":\"74.3536000\",\"ip_address\":\"110.36.86.83\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-14 01:56:27\",\"updated_at\":\"2026-04-14 01:56:27\",\"auto_import_date\":null},{\"id\":\"8523\",\"title\":\"Malware Distribution - 42.235.99.98\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.235.99.98\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-14 01:56:25\",\"updated_at\":\"2026-04-14 01:56:25\",\"auto_import_date\":null},{\"id\":\"8522\",\"title\":\"Malware Distribution - 123.129.132.93\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"123.129.132.93\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-14 04:56:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-14 01:56:24\",\"updated_at\":\"2026-04-14 01:56:24\",\"auto_import_date\":null},{\"id\":\"8513\",\"title\":\"Spam Source - 23.164.152.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL680302\",\"country\":\"United States\",\"latitude\":\"25.8119000\",\"longitude\":\"-80.2318000\",\"ip_address\":\"23.164.152.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 16:50:01\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.164.152.0\\\/24\",\"created_at\":\"2026-04-13 13:50:01\",\"updated_at\":\"2026-04-13 13:50:01\",\"auto_import_date\":null},{\"id\":\"8517\",\"title\":\"Polymarket Trader Funds at Risk: DPRK npm Package Steals Wallet Keys and Installs SSH Backdoor\",\"description\":\"On April 10, 2026, a malicious npm package named sleek-pretty@1.0.0 was published, targeting developers running automated trading bots on Polymarket, a prediction market platform with $477 million in open interest. The package executes four attack chains upon import: system fingerprinting, SSH backdoor installation on Linux hosts, filesystem exfiltration, and targeted theft of Polymarket CLOB API credentials and Ethereum\\\/Polygon wallet private keys. The payload runs at require() time without ins\",\"country\":\"United Kingdom\",\"latitude\":\"51.5074000\",\"longitude\":\"-0.1278000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 15:11:52\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 6\",\"created_at\":\"2026-04-13 20:48:59\",\"updated_at\":\"2026-04-13 20:48:59\",\"auto_import_date\":null},{\"id\":\"8518\",\"title\":\"Live C2 Dump Recovering Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger\",\"description\":\"On April 11, 2026, researchers analyzed a CHM file (api_reference.chm) tagged as Kimsuky that initiated a three-stage attack chain. The C2 server at check[.]nid-log[.]com had directory listing enabled, allowing recovery of complete source code for all payload stages: a 6,338-byte VBScript performing system reconnaissance and establishing persistence via scheduled task, a 449-byte VBScript bridge to PowerShell, and a 6,234-byte PowerShell keylogger with clipboard monitoring and timed exfiltration\",\"country\":\"Singapore\",\"latitude\":\"1.2799400\",\"longitude\":\"103.8490000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 15:10:44\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 47\",\"created_at\":\"2026-04-13 20:48:59\",\"updated_at\":\"2026-04-13 20:48:59\",\"auto_import_date\":null},{\"id\":\"8519\",\"title\":\"Fake recruiter campaign targets crypto developers with RAT\",\"description\":\"A sophisticated fake recruitment campaign named 'graphalgo' has been active since May 2025, targeting JavaScript and Python developers in the cryptocurrency sector. Attackers approach victims through LinkedIn, Facebook, and Reddit with fabricated job opportunities from fake blockchain companies like Veltrix Capital. The campaign uses malicious dependencies hidden in npm and PyPI packages, delivered through coding test repositories on GitHub. Notable is the bigmathutils package that accumulated o\",\"country\":\"China\",\"latitude\":\"39.9042000\",\"longitude\":\"116.4074000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 15:09:51\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 319\",\"created_at\":\"2026-04-13 20:48:59\",\"updated_at\":\"2026-04-13 20:48:59\",\"auto_import_date\":null},{\"id\":\"8520\",\"title\":\"REFUNDEE: Inside a Shadow Panel Phishing-as-a-Service Operation\",\"description\":\"An open directory discovery at refundonex[.]com exposed a complete Phishing-as-a-Service and RAT-as-a-Service platform targeting Spanish and Portuguese-speaking victims. The investigation uncovered 3,788 files including weaponized LNK, VBS, and AES-encrypted PowerShell payloads delivering a remote access trojan. The platform, called Shadow Panel, operates from Bulgarian infrastructure and offers capabilities including remote shell execution, screenshot capture, file management, browser credentia\",\"country\":\"Bulgaria\",\"latitude\":\"42.6695000\",\"longitude\":\"23.2912000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 15:06:23\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 37\",\"created_at\":\"2026-04-13 20:49:00\",\"updated_at\":\"2026-04-13 20:49:00\",\"auto_import_date\":null},{\"id\":\"8521\",\"title\":\"ASO RAT: Arabic-Language Android Surveillance Platform Targeting Syria\",\"description\":\"ASO RAT is a custom Android Remote Access Trojan featuring comprehensive device compromise capabilities including SMS interception, camera access, GPS tracking, call logging, file exfiltration, and DDoS functionality. Operating from Frankfurt-based infrastructure with connections to Syria, the platform disguises itself as PDF readers and Syrian government applications. Investigation revealed two active C2 servers, four DDNS domains, eight malicious APK samples with the newest achieving 0\\\/66 anti\",\"country\":\"Germany\",\"latitude\":\"50.1224000\",\"longitude\":\"8.7397900\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 15:05:19\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 31\",\"created_at\":\"2026-04-13 20:49:00\",\"updated_at\":\"2026-04-13 20:49:00\",\"auto_import_date\":null},{\"id\":\"8514\",\"title\":\"Threat Actor Targets Arabian Gulf Region With PlugX\",\"description\":\"In March 2026, a China-nexus threat actor launched a sophisticated campaign targeting countries in the Arabian Gulf region, exploiting renewed Middle East conflict themes within 24 hours of escalation. The attack utilized Arabic-language lures depicting missile strikes and employed a multi-stage infection chain beginning with weaponized ZIP archives containing malicious LNK and CHM files. The campaign deployed a heavily obfuscated PlugX backdoor variant through DLL sideloading, with components u\",\"country\":\"United Kingdom\",\"latitude\":\"51.5123000\",\"longitude\":\"-0.0909000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 14:40:01\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 31\",\"created_at\":\"2026-04-13 14:51:39\",\"updated_at\":\"2026-04-13 14:51:39\",\"auto_import_date\":null},{\"id\":\"8516\",\"title\":\"A new Android RAT turning infected devices into potential residential proxy nodes\",\"description\":\"Mirax is a newly identified Android Remote Access Trojan operating as Malware-as-a-Service, actively targeting European users, particularly in Spanish-speaking regions. Distributed through Meta advertisements and GitHub-hosted droppers, the malware has reached over 200,000 accounts. It employs sophisticated techniques including dynamically fetched HTML overlays, comprehensive keylogging, and remote device control capabilities. A distinctive feature is its integration of SOCKS5-based residential\",\"country\":\"Romania\",\"latitude\":\"44.4268000\",\"longitude\":\"26.1025000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 14:27:43\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 4\",\"created_at\":\"2026-04-13 14:51:39\",\"updated_at\":\"2026-04-13 14:51:39\",\"auto_import_date\":null},{\"id\":\"8515\",\"title\":\"Threat Actors Leverage Claude Code Leak as Social Engineering Lure to Distribute Malicious Payloads via GitHub\",\"description\":\"Cybercriminals are exploiting the recent Claude Code leak incident by using it as a social engineering tactic to deliver malware through GitHub repositories. The attackers have created trojanized versions of the leaked Claude source code, distributing malicious payloads including Vidar stealer version 18.7 and GhostSocks trojan. The campaign demonstrates rapid opportunistic exploitation of high-profile security incidents, with compromised repositories serving as delivery mechanisms. Organization\",\"country\":\"Germany\",\"latitude\":\"50.1169000\",\"longitude\":\"8.6837000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 14:19:58\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 20\",\"created_at\":\"2026-04-13 14:51:39\",\"updated_at\":\"2026-04-13 14:51:39\",\"auto_import_date\":null},{\"id\":\"8510\",\"title\":\"Malware Distribution - 115.55.197.113\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.55.197.113\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-13 07:41:27\",\"updated_at\":\"2026-04-13 07:41:27\",\"auto_import_date\":null},{\"id\":\"8509\",\"title\":\"Malware Distribution - 182.123.235.81\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.123.235.81\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-13 07:41:26\",\"updated_at\":\"2026-04-13 07:41:26\",\"auto_import_date\":null},{\"id\":\"8508\",\"title\":\"Malware Distribution - 115.49.2.184\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.49.2.184\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-13 07:41:24\",\"updated_at\":\"2026-04-13 07:41:24\",\"auto_import_date\":null},{\"id\":\"8507\",\"title\":\"Malware Distribution - 190.109.227.177\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Bolivia\",\"latitude\":\"-16.5739000\",\"longitude\":\"-68.1511000\",\"ip_address\":\"190.109.227.177\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Cotel Ltda.\",\"created_at\":\"2026-04-13 07:41:22\",\"updated_at\":\"2026-04-13 07:41:22\",\"auto_import_date\":null},{\"id\":\"8506\",\"title\":\"Malware Distribution - 139.59.231.32\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Singapore\",\"latitude\":\"1.3212300\",\"longitude\":\"103.6950000\",\"ip_address\":\"139.59.231.32\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: DIGITALOCEAN\",\"created_at\":\"2026-04-13 07:41:21\",\"updated_at\":\"2026-04-13 07:41:21\",\"auto_import_date\":null},{\"id\":\"8505\",\"title\":\"Malware Distribution - 27.210.144.124\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.0610000\",\"longitude\":\"120.3814000\",\"ip_address\":\"27.210.144.124\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:19\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-13 07:41:19\",\"updated_at\":\"2026-04-13 07:41:19\",\"auto_import_date\":null},{\"id\":\"8504\",\"title\":\"Malware Distribution - 222.79.195.189\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"24.8741000\",\"longitude\":\"118.6760000\",\"ip_address\":\"222.79.195.189\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-13 07:41:17\",\"updated_at\":\"2026-04-13 07:41:17\",\"auto_import_date\":null},{\"id\":\"8503\",\"title\":\"Malware Distribution - 42.224.103.137\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.6735000\",\"longitude\":\"112.4368000\",\"ip_address\":\"42.224.103.137\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-13 07:41:15\",\"updated_at\":\"2026-04-13 07:41:15\",\"auto_import_date\":null},{\"id\":\"8502\",\"title\":\"Malware Distribution - 110.37.1.162\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.1.162\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:14\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-13 07:41:14\",\"updated_at\":\"2026-04-13 07:41:14\",\"auto_import_date\":null},{\"id\":\"8501\",\"title\":\"Malware Distribution - 27.219.14.111\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.219.14.111\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-13 07:41:12\",\"updated_at\":\"2026-04-13 07:41:12\",\"auto_import_date\":null},{\"id\":\"8500\",\"title\":\"Malware Distribution - 182.119.62.197\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"182.119.62.197\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:10\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-13 07:41:10\",\"updated_at\":\"2026-04-13 07:41:10\",\"auto_import_date\":null},{\"id\":\"8499\",\"title\":\"Malware Distribution - 110.186.228.86\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"30.6509000\",\"longitude\":\"104.0760000\",\"ip_address\":\"110.186.228.86\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:09\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-13 07:41:09\",\"updated_at\":\"2026-04-13 07:41:09\",\"auto_import_date\":null},{\"id\":\"8498\",\"title\":\"Malware Distribution - 110.37.117.225\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"29.4186000\",\"longitude\":\"71.6913000\",\"ip_address\":\"110.37.117.225\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:07\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-13 07:41:07\",\"updated_at\":\"2026-04-13 07:41:07\",\"auto_import_date\":null},{\"id\":\"8497\",\"title\":\"Malware Distribution - 61.52.197.8\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.52.197.8\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:05\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-13 07:41:05\",\"updated_at\":\"2026-04-13 07:41:05\",\"auto_import_date\":null},{\"id\":\"8496\",\"title\":\"Malware Distribution - 119.126.120.31\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"23.1317000\",\"longitude\":\"113.2660000\",\"ip_address\":\"119.126.120.31\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-13 07:41:04\",\"updated_at\":\"2026-04-13 07:41:04\",\"auto_import_date\":null},{\"id\":\"8495\",\"title\":\"Malware Distribution - 117.63.246.36\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"32.0607000\",\"longitude\":\"118.7630000\",\"ip_address\":\"117.63.246.36\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:02\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-13 07:41:02\",\"updated_at\":\"2026-04-13 07:41:02\",\"auto_import_date\":null},{\"id\":\"8494\",\"title\":\"Malware Distribution - 123.11.168.250\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.11.168.250\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:41:00\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-13 07:41:00\",\"updated_at\":\"2026-04-13 07:41:00\",\"auto_import_date\":null},{\"id\":\"8493\",\"title\":\"Malware Distribution - 123.183.196.223\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"40.9515000\",\"longitude\":\"117.9630000\",\"ip_address\":\"123.183.196.223\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:40:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet Hebei Province Network\",\"created_at\":\"2026-04-13 07:40:59\",\"updated_at\":\"2026-04-13 07:40:59\",\"auto_import_date\":null},{\"id\":\"8492\",\"title\":\"Malware Distribution - 42.242.164.219\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"25.0453000\",\"longitude\":\"102.7100000\",\"ip_address\":\"42.242.164.219\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:40:57\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-13 07:40:57\",\"updated_at\":\"2026-04-13 07:40:57\",\"auto_import_date\":null},{\"id\":\"8491\",\"title\":\"Malware Distribution - 219.154.160.33\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.154.160.33\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 10:40:55\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-13 07:40:55\",\"updated_at\":\"2026-04-13 07:40:55\",\"auto_import_date\":null},{\"id\":\"8511\",\"title\":\"CPU-Z & HWMonitor, cpuid.com, Watering Hole Attack\",\"description\":\"On April 9, 2026, the cpuid.com website was compromised in a watering hole attack lasting approximately 19 hours. Download URLs for legitimate system administration tools CPU-Z, HWMonitor, HWMonitor Pro, and Perfmonitor 2 were replaced with links to malicious sites distributing trojanized versions. The malicious installers contained legitimate signed executables paired with DLL files named CRYPTBASE.dll that exploited DLL sideloading for C2 communication and payload delivery. Attackers reused in\",\"country\":\"China\",\"latitude\":\"39.9042000\",\"longitude\":\"116.4074000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 08:47:01\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 43\",\"created_at\":\"2026-04-13 08:48:52\",\"updated_at\":\"2026-04-13 08:48:52\",\"auto_import_date\":null},{\"id\":\"8512\",\"title\":\"Tracking MiniDionis: CozyCar's New Ride Is Related to Seaduke\",\"description\":\"A new campaign attributed to CozyDuke threat actors has been identified, utilizing malware called MiniDionis that appears related to Seaduke. The campaign began on July 7, 2015, targeting government organizations and think-tanks in democratic countries through spear phishing emails containing malicious links or attachments. The attack chain involves multi-stage droppers that deliver decoy media files while executing malicious payloads in the background. MiniDionis uses compromised legitimate web\",\"country\":\"China\",\"latitude\":\"39.9042000\",\"longitude\":\"116.4070000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-13 08:41:53\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 44\",\"created_at\":\"2026-04-13 08:48:52\",\"updated_at\":\"2026-04-13 08:48:52\",\"auto_import_date\":null},{\"id\":\"8490\",\"title\":\"Malware Distribution - 85.12.205.35\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"56.8577000\",\"longitude\":\"60.6113000\",\"ip_address\":\"85.12.205.35\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:21\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: INSYS network\",\"created_at\":\"2026-04-12 20:22:22\",\"updated_at\":\"2026-04-12 20:22:22\",\"auto_import_date\":null},{\"id\":\"8489\",\"title\":\"Malware Distribution - 160.176.104.127\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Morocco\",\"latitude\":\"33.5922000\",\"longitude\":\"-7.6184000\",\"ip_address\":\"160.176.104.127\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Office National des Postes et Telecommunications ONPT (Maroc Telecom) \\\/ IAM\",\"created_at\":\"2026-04-12 20:22:20\",\"updated_at\":\"2026-04-12 20:22:20\",\"auto_import_date\":null},{\"id\":\"8488\",\"title\":\"Malware Distribution - 196.189.198.173\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Ethiopia\",\"latitude\":\"9.0245000\",\"longitude\":\"38.7485000\",\"ip_address\":\"196.189.198.173\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:18\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Ethiotelecom\",\"created_at\":\"2026-04-12 20:22:18\",\"updated_at\":\"2026-04-12 20:22:18\",\"auto_import_date\":null},{\"id\":\"8487\",\"title\":\"Malware Distribution - 115.55.229.210\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.55.229.210\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:16\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 20:22:17\",\"updated_at\":\"2026-04-12 20:22:17\",\"auto_import_date\":null},{\"id\":\"8486\",\"title\":\"Malware Distribution - 182.127.53.122\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.127.53.122\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 20:22:15\",\"updated_at\":\"2026-04-12 20:22:15\",\"auto_import_date\":null},{\"id\":\"8485\",\"title\":\"Malware Distribution - 210.10.132.168\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Australia\",\"latitude\":\"-37.7595000\",\"longitude\":\"145.1418000\",\"ip_address\":\"210.10.132.168\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:13\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: AAPT Limited\",\"created_at\":\"2026-04-12 20:22:13\",\"updated_at\":\"2026-04-12 20:22:13\",\"auto_import_date\":null},{\"id\":\"8484\",\"title\":\"Malware Distribution - 222.142.227.254\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.142.227.254\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:11\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 20:22:11\",\"updated_at\":\"2026-04-12 20:22:11\",\"auto_import_date\":null},{\"id\":\"8483\",\"title\":\"Malware Distribution - 176.65.139.52\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"The Netherlands\",\"latitude\":\"50.8933000\",\"longitude\":\"6.0580500\",\"ip_address\":\"176.65.139.52\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:09\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Offshore LC\",\"created_at\":\"2026-04-12 20:22:10\",\"updated_at\":\"2026-04-12 20:22:10\",\"auto_import_date\":null},{\"id\":\"8482\",\"title\":\"Malware Distribution - 42.6.251.140\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.6.251.140\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:08\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-12 20:22:08\",\"updated_at\":\"2026-04-12 20:22:08\",\"auto_import_date\":null},{\"id\":\"8481\",\"title\":\"Malware Distribution - 220.192.233.49\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"29.5689000\",\"longitude\":\"106.5577000\",\"ip_address\":\"220.192.233.49\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:06\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Network\",\"created_at\":\"2026-04-12 20:22:06\",\"updated_at\":\"2026-04-12 20:22:06\",\"auto_import_date\":null},{\"id\":\"8480\",\"title\":\"Malware Distribution - 42.227.207.21\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.227.207.21\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:04\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 20:22:05\",\"updated_at\":\"2026-04-12 20:22:05\",\"auto_import_date\":null},{\"id\":\"8479\",\"title\":\"Malware Distribution - 110.37.78.200\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.78.200\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-12 20:22:03\",\"updated_at\":\"2026-04-12 20:22:03\",\"auto_import_date\":null},{\"id\":\"8478\",\"title\":\"Malware Distribution - 219.156.175.211\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.156.175.211\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:22:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 20:22:01\",\"updated_at\":\"2026-04-12 20:22:01\",\"auto_import_date\":null},{\"id\":\"8477\",\"title\":\"Malware Distribution - 175.164.96.190\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.7806000\",\"longitude\":\"123.4314000\",\"ip_address\":\"175.164.96.190\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:21:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-12 20:21:59\",\"updated_at\":\"2026-04-12 20:21:59\",\"auto_import_date\":null},{\"id\":\"8476\",\"title\":\"Malware Distribution - 123.12.32.168\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.12.32.168\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:21:57\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 20:21:58\",\"updated_at\":\"2026-04-12 20:21:58\",\"auto_import_date\":null},{\"id\":\"8475\",\"title\":\"Malware Distribution - 42.231.94.183\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.231.94.183\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:21:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 20:21:56\",\"updated_at\":\"2026-04-12 20:21:56\",\"auto_import_date\":null},{\"id\":\"8474\",\"title\":\"Malware Distribution - 220.202.89.27\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"27.8507000\",\"longitude\":\"112.8970000\",\"ip_address\":\"220.202.89.27\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:21:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Network\",\"created_at\":\"2026-04-12 20:21:54\",\"updated_at\":\"2026-04-12 20:21:54\",\"auto_import_date\":null},{\"id\":\"8473\",\"title\":\"Malware Distribution - 182.121.81.106\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.81.106\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 23:21:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 20:21:53\",\"updated_at\":\"2026-04-12 20:21:53\",\"auto_import_date\":null},{\"id\":\"8472\",\"title\":\"Malware Distribution - 115.49.66.246\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.49.66.246\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:47:08\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:47:08\",\"updated_at\":\"2026-04-12 13:47:08\",\"auto_import_date\":null},{\"id\":\"8471\",\"title\":\"Malware Distribution - 61.53.133.158\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.133.158\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:47:06\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:47:07\",\"updated_at\":\"2026-04-12 13:47:07\",\"auto_import_date\":null},{\"id\":\"8470\",\"title\":\"Malware Distribution - 115.52.247.47\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.52.247.47\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:47:05\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:47:05\",\"updated_at\":\"2026-04-12 13:47:05\",\"auto_import_date\":null},{\"id\":\"8469\",\"title\":\"Malware Distribution - 60.18.11.208\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8357000\",\"longitude\":\"123.4290000\",\"ip_address\":\"60.18.11.208\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:47:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CHINA UNICOM China169 Backbone\",\"created_at\":\"2026-04-12 13:47:03\",\"updated_at\":\"2026-04-12 13:47:03\",\"auto_import_date\":null},{\"id\":\"8468\",\"title\":\"Malware Distribution - 42.225.62.169\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.225.62.169\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:47:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 13:47:02\",\"updated_at\":\"2026-04-12 13:47:02\",\"auto_import_date\":null},{\"id\":\"8467\",\"title\":\"Malware Distribution - 219.156.58.239\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.156.58.239\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:47:00\",\"updated_at\":\"2026-04-12 13:47:00\",\"auto_import_date\":null},{\"id\":\"8466\",\"title\":\"Malware Distribution - 27.207.82.181\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.207.82.181\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-12 13:46:58\",\"updated_at\":\"2026-04-12 13:46:58\",\"auto_import_date\":null},{\"id\":\"8465\",\"title\":\"Malware Distribution - 196.189.96.59\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Ethiopia\",\"latitude\":\"9.0245000\",\"longitude\":\"38.7485000\",\"ip_address\":\"196.189.96.59\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Ethiotelecom\",\"created_at\":\"2026-04-12 13:46:56\",\"updated_at\":\"2026-04-12 13:46:56\",\"auto_import_date\":null},{\"id\":\"8464\",\"title\":\"Malware Distribution - 123.10.130.49\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.130.49\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:46:55\",\"updated_at\":\"2026-04-12 13:46:55\",\"auto_import_date\":null},{\"id\":\"8463\",\"title\":\"Malware Distribution - 125.41.8.16\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"125.41.8.16\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:46:53\",\"updated_at\":\"2026-04-12 13:46:53\",\"auto_import_date\":null},{\"id\":\"8462\",\"title\":\"Malware Distribution - 178.16.55.80\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United States\",\"latitude\":\"40.7503000\",\"longitude\":\"-74.0014000\",\"ip_address\":\"178.16.55.80\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Omegatech LTD\",\"created_at\":\"2026-04-12 13:46:51\",\"updated_at\":\"2026-04-12 13:46:51\",\"auto_import_date\":null},{\"id\":\"8461\",\"title\":\"Malware Distribution - 222.139.225.181\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.0960000\",\"longitude\":\"114.3828000\",\"ip_address\":\"222.139.225.181\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:46:49\",\"updated_at\":\"2026-04-12 13:46:49\",\"auto_import_date\":null},{\"id\":\"8460\",\"title\":\"Malware Distribution - 130.12.180.16\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"The Netherlands\",\"latitude\":\"52.3759000\",\"longitude\":\"4.8975000\",\"ip_address\":\"130.12.180.16\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Netiface LLC\",\"created_at\":\"2026-04-12 13:46:48\",\"updated_at\":\"2026-04-12 13:46:48\",\"auto_import_date\":null},{\"id\":\"8459\",\"title\":\"Malware Distribution - 110.39.234.150\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.39.234.150\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-12 13:46:46\",\"updated_at\":\"2026-04-12 13:46:46\",\"auto_import_date\":null},{\"id\":\"8458\",\"title\":\"Malware Distribution - 37.26.86.218\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Albania\",\"latitude\":\"41.1122000\",\"longitude\":\"20.0818000\",\"ip_address\":\"37.26.86.218\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: ATU\",\"created_at\":\"2026-04-12 13:46:44\",\"updated_at\":\"2026-04-12 13:46:44\",\"auto_import_date\":null},{\"id\":\"8457\",\"title\":\"Malware Distribution - 221.15.15.16\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"221.15.15.16\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:46:43\",\"updated_at\":\"2026-04-12 13:46:43\",\"auto_import_date\":null},{\"id\":\"8456\",\"title\":\"Malware Distribution - 221.15.4.9\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"221.15.4.9\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 13:46:41\",\"updated_at\":\"2026-04-12 13:46:41\",\"auto_import_date\":null},{\"id\":\"8455\",\"title\":\"Malware Distribution - 123.148.198.166\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"30.2742000\",\"longitude\":\"120.1550000\",\"ip_address\":\"123.148.198.166\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Zhejiang Province Network\",\"created_at\":\"2026-04-12 13:46:39\",\"updated_at\":\"2026-04-12 13:46:39\",\"auto_import_date\":null},{\"id\":\"8454\",\"title\":\"Malware Distribution - 130.94.41.210\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"39.9042000\",\"longitude\":\"116.4070000\",\"ip_address\":\"130.94.41.210\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 16:46:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Light Node Limited\",\"created_at\":\"2026-04-12 13:46:38\",\"updated_at\":\"2026-04-12 13:46:38\",\"auto_import_date\":null},{\"id\":\"8453\",\"title\":\"Malware Distribution - 42.179.11.151\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.179.11.151\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-12 01:29:27\",\"updated_at\":\"2026-04-12 01:29:27\",\"auto_import_date\":null},{\"id\":\"8452\",\"title\":\"Malware Distribution - 119.186.208.144\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"119.186.208.144\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-12 01:29:26\",\"updated_at\":\"2026-04-12 01:29:26\",\"auto_import_date\":null},{\"id\":\"8451\",\"title\":\"Malware Distribution - 27.215.59.163\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.215.59.163\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-12 01:29:24\",\"updated_at\":\"2026-04-12 01:29:24\",\"auto_import_date\":null},{\"id\":\"8450\",\"title\":\"Malware Distribution - 120.28.114.23\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Philippines\",\"latitude\":\"14.6077000\",\"longitude\":\"121.0463000\",\"ip_address\":\"120.28.114.23\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Globe Telecom\",\"created_at\":\"2026-04-12 01:29:22\",\"updated_at\":\"2026-04-12 01:29:22\",\"auto_import_date\":null},{\"id\":\"8449\",\"title\":\"Malware Distribution - 112.93.200.59\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"23.0242000\",\"longitude\":\"113.1334000\",\"ip_address\":\"112.93.200.59\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Guangdong Province Network\",\"created_at\":\"2026-04-12 01:29:21\",\"updated_at\":\"2026-04-12 01:29:21\",\"auto_import_date\":null},{\"id\":\"8448\",\"title\":\"Malware Distribution - 222.139.75.213\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.0960000\",\"longitude\":\"114.3828000\",\"ip_address\":\"222.139.75.213\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:19\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 01:29:19\",\"updated_at\":\"2026-04-12 01:29:19\",\"auto_import_date\":null},{\"id\":\"8447\",\"title\":\"Malware Distribution - 122.195.50.124\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"31.2983000\",\"longitude\":\"120.5830000\",\"ip_address\":\"122.195.50.124\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Jiangsu Province Network\",\"created_at\":\"2026-04-12 01:29:17\",\"updated_at\":\"2026-04-12 01:29:17\",\"auto_import_date\":null},{\"id\":\"8446\",\"title\":\"Malware Distribution - 182.116.216.152\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.116.216.152\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 01:29:16\",\"updated_at\":\"2026-04-12 01:29:16\",\"auto_import_date\":null},{\"id\":\"8445\",\"title\":\"Malware Distribution - 105.186.92.250\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-33.9258000\",\"longitude\":\"18.4259000\",\"ip_address\":\"105.186.92.250\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:14\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-12 01:29:14\",\"updated_at\":\"2026-04-12 01:29:14\",\"auto_import_date\":null},{\"id\":\"8444\",\"title\":\"Malware Distribution - 116.138.206.235\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"39.9072000\",\"longitude\":\"116.3570000\",\"ip_address\":\"116.138.206.235\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Network\",\"created_at\":\"2026-04-12 01:29:12\",\"updated_at\":\"2026-04-12 01:29:12\",\"auto_import_date\":null},{\"id\":\"8443\",\"title\":\"Malware Distribution - 42.235.6.148\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.235.6.148\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:10\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 01:29:10\",\"updated_at\":\"2026-04-12 01:29:10\",\"auto_import_date\":null},{\"id\":\"8442\",\"title\":\"Malware Distribution - 123.5.150.52\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.5.150.52\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:09\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 01:29:09\",\"updated_at\":\"2026-04-12 01:29:09\",\"auto_import_date\":null},{\"id\":\"8441\",\"title\":\"Malware Distribution - 105.224.66.250\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-25.7570000\",\"longitude\":\"28.1443000\",\"ip_address\":\"105.224.66.250\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:07\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-12 01:29:07\",\"updated_at\":\"2026-04-12 01:29:07\",\"auto_import_date\":null},{\"id\":\"8440\",\"title\":\"Malware Distribution - 123.9.194.74\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.9.194.74\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:05\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 01:29:05\",\"updated_at\":\"2026-04-12 01:29:05\",\"auto_import_date\":null},{\"id\":\"8439\",\"title\":\"Malware Distribution - 37.28.179.42\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"55.7971000\",\"longitude\":\"37.5799000\",\"ip_address\":\"37.28.179.42\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:04\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: MegaFon-Moscow\",\"created_at\":\"2026-04-12 01:29:04\",\"updated_at\":\"2026-04-12 01:29:04\",\"auto_import_date\":null},{\"id\":\"8438\",\"title\":\"Malware Distribution - 39.87.253.39\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"39.87.253.39\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:02\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-12 01:29:02\",\"updated_at\":\"2026-04-12 01:29:02\",\"auto_import_date\":null},{\"id\":\"8437\",\"title\":\"Malware Distribution - 110.37.65.231\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.65.231\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:29:00\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-12 01:29:00\",\"updated_at\":\"2026-04-12 01:29:00\",\"auto_import_date\":null},{\"id\":\"8436\",\"title\":\"Malware Distribution - 219.156.55.224\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.156.55.224\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:28:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-12 01:28:59\",\"updated_at\":\"2026-04-12 01:28:59\",\"auto_import_date\":null},{\"id\":\"8435\",\"title\":\"Malware Distribution - 182.124.164.154\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.124.164.154\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-12 04:28:57\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-12 01:28:57\",\"updated_at\":\"2026-04-12 01:28:57\",\"auto_import_date\":null},{\"id\":\"8434\",\"title\":\"Malware Distribution - 45.94.31.102\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Netherlands\",\"latitude\":\"52.3600000\",\"longitude\":\"4.8550000\",\"ip_address\":\"45.94.31.102\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:35:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: 1337 Services GmbH\",\"created_at\":\"2026-04-11 13:35:03\",\"updated_at\":\"2026-04-11 13:35:03\",\"auto_import_date\":null},{\"id\":\"8433\",\"title\":\"Malware Distribution - 45.88.186.229\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United States\",\"latitude\":\"25.7735000\",\"longitude\":\"-80.2008000\",\"ip_address\":\"45.88.186.229\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:35:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: 1337 Services GmbH\",\"created_at\":\"2026-04-11 13:35:01\",\"updated_at\":\"2026-04-11 13:35:01\",\"auto_import_date\":null},{\"id\":\"8432\",\"title\":\"Malware Distribution - 110.37.38.88\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.38.88\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-11 13:34:59\",\"updated_at\":\"2026-04-11 13:34:59\",\"auto_import_date\":null},{\"id\":\"8431\",\"title\":\"Malware Distribution - 222.141.78.90\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.141.78.90\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 13:34:58\",\"updated_at\":\"2026-04-11 13:34:58\",\"auto_import_date\":null},{\"id\":\"8430\",\"title\":\"Malware Distribution - 123.157.162.220\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"30.2742000\",\"longitude\":\"120.1550000\",\"ip_address\":\"123.157.162.220\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Zhejiang Province Network\",\"created_at\":\"2026-04-11 13:34:56\",\"updated_at\":\"2026-04-11 13:34:56\",\"auto_import_date\":null},{\"id\":\"8429\",\"title\":\"Malware Distribution - 61.54.253.228\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"35.1874000\",\"longitude\":\"113.8025000\",\"ip_address\":\"61.54.253.228\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 13:34:54\",\"updated_at\":\"2026-04-11 13:34:54\",\"auto_import_date\":null},{\"id\":\"8428\",\"title\":\"Malware Distribution - 115.49.27.80\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.49.27.80\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 13:34:53\",\"updated_at\":\"2026-04-11 13:34:53\",\"auto_import_date\":null},{\"id\":\"8427\",\"title\":\"Malware Distribution - 110.38.201.196\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.38.201.196\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-11 13:34:51\",\"updated_at\":\"2026-04-11 13:34:51\",\"auto_import_date\":null},{\"id\":\"8426\",\"title\":\"Malware Distribution - 110.36.15.110\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"32.4926000\",\"longitude\":\"74.6124000\",\"ip_address\":\"110.36.15.110\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-11 13:34:49\",\"updated_at\":\"2026-04-11 13:34:49\",\"auto_import_date\":null},{\"id\":\"8425\",\"title\":\"Malware Distribution - 112.239.98.137\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.8644000\",\"longitude\":\"117.5527000\",\"ip_address\":\"112.239.98.137\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-11 13:34:48\",\"updated_at\":\"2026-04-11 13:34:48\",\"auto_import_date\":null},{\"id\":\"8424\",\"title\":\"Malware Distribution - 27.206.135.93\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.206.135.93\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:45\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-11 13:34:46\",\"updated_at\":\"2026-04-11 13:34:46\",\"auto_import_date\":null},{\"id\":\"8423\",\"title\":\"Malware Distribution - 110.37.65.205\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.65.205\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-11 13:34:44\",\"updated_at\":\"2026-04-11 13:34:44\",\"auto_import_date\":null},{\"id\":\"8422\",\"title\":\"Malware Distribution - 27.207.37.194\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.207.37.194\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-11 13:34:42\",\"updated_at\":\"2026-04-11 13:34:42\",\"auto_import_date\":null},{\"id\":\"8421\",\"title\":\"Malware Distribution - 27.19.217.24\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"30.5454000\",\"longitude\":\"114.3420000\",\"ip_address\":\"27.19.217.24\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-11 13:34:41\",\"updated_at\":\"2026-04-11 13:34:41\",\"auto_import_date\":null},{\"id\":\"8420\",\"title\":\"Malware Distribution - 61.53.84.218\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.84.218\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 13:34:39\",\"updated_at\":\"2026-04-11 13:34:39\",\"auto_import_date\":null},{\"id\":\"8419\",\"title\":\"Malware Distribution - 181.99.61.213\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Argentina\",\"latitude\":\"-32.8461000\",\"longitude\":\"-61.2449000\",\"ip_address\":\"181.99.61.213\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telecom Argentina S.A.\",\"created_at\":\"2026-04-11 13:34:37\",\"updated_at\":\"2026-04-11 13:34:37\",\"auto_import_date\":null},{\"id\":\"8418\",\"title\":\"Malware Distribution - 201.211.79.169\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Venezuela\",\"latitude\":\"10.4873000\",\"longitude\":\"-66.8738000\",\"ip_address\":\"201.211.79.169\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CANTV Servicios, Venezuela\",\"created_at\":\"2026-04-11 13:34:36\",\"updated_at\":\"2026-04-11 13:34:36\",\"auto_import_date\":null},{\"id\":\"8417\",\"title\":\"Malware Distribution - 95.106.18.251\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"54.6296000\",\"longitude\":\"39.6881000\",\"ip_address\":\"95.106.18.251\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Rostelecom networks\",\"created_at\":\"2026-04-11 13:34:34\",\"updated_at\":\"2026-04-11 13:34:34\",\"auto_import_date\":null},{\"id\":\"8416\",\"title\":\"Malware Distribution - 42.54.143.150\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.54.143.150\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 16:34:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-11 13:34:32\",\"updated_at\":\"2026-04-11 13:34:32\",\"auto_import_date\":null},{\"id\":\"8415\",\"title\":\"Malware Distribution - 42.238.169.132\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.238.169.132\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-11 02:01:59\",\"updated_at\":\"2026-04-11 02:01:59\",\"auto_import_date\":null},{\"id\":\"8414\",\"title\":\"Malware Distribution - 182.121.43.182\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.43.182\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:57\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-11 02:01:57\",\"updated_at\":\"2026-04-11 02:01:57\",\"auto_import_date\":null},{\"id\":\"8413\",\"title\":\"Malware Distribution - 123.10.55.176\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.55.176\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:55\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 02:01:56\",\"updated_at\":\"2026-04-11 02:01:56\",\"auto_import_date\":null},{\"id\":\"8412\",\"title\":\"Malware Distribution - 115.56.65.255\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.56.65.255\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 02:01:54\",\"updated_at\":\"2026-04-11 02:01:54\",\"auto_import_date\":null},{\"id\":\"8411\",\"title\":\"Malware Distribution - 105.224.37.14\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-25.7570000\",\"longitude\":\"28.1443000\",\"ip_address\":\"105.224.37.14\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-11 02:01:52\",\"updated_at\":\"2026-04-11 02:01:52\",\"auto_import_date\":null},{\"id\":\"8410\",\"title\":\"Malware Distribution - 85.15.123.94\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"48.4817000\",\"longitude\":\"135.0830000\",\"ip_address\":\"85.15.123.94\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:50\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Vostoktelecom Telephone Company Limited Liability Company\",\"created_at\":\"2026-04-11 02:01:51\",\"updated_at\":\"2026-04-11 02:01:51\",\"auto_import_date\":null},{\"id\":\"8409\",\"title\":\"Malware Distribution - 119.166.231.98\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.0610000\",\"longitude\":\"120.3814000\",\"ip_address\":\"119.166.231.98\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-11 02:01:49\",\"updated_at\":\"2026-04-11 02:01:49\",\"auto_import_date\":null},{\"id\":\"8408\",\"title\":\"Malware Distribution - 182.116.20.121\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.116.20.121\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-11 02:01:47\",\"updated_at\":\"2026-04-11 02:01:47\",\"auto_import_date\":null},{\"id\":\"8407\",\"title\":\"Malware Distribution - 117.252.119.164\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"17.3843000\",\"longitude\":\"78.4583000\",\"ip_address\":\"117.252.119.164\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:45\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: BSNL Internet\",\"created_at\":\"2026-04-11 02:01:46\",\"updated_at\":\"2026-04-11 02:01:46\",\"auto_import_date\":null},{\"id\":\"8406\",\"title\":\"Malware Distribution - 77.247.88.88\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Albania\",\"latitude\":\"41.3253000\",\"longitude\":\"19.8184000\",\"ip_address\":\"77.247.88.88\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Teleco First\",\"created_at\":\"2026-04-11 02:01:44\",\"updated_at\":\"2026-04-11 02:01:44\",\"auto_import_date\":null},{\"id\":\"8405\",\"title\":\"Malware Distribution - 39.90.184.170\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"39.90.184.170\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-11 02:01:42\",\"updated_at\":\"2026-04-11 02:01:42\",\"auto_import_date\":null},{\"id\":\"8404\",\"title\":\"Malware Distribution - 80.67.33.209\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Belize\",\"latitude\":\"17.2501000\",\"longitude\":\"-88.7676000\",\"ip_address\":\"80.67.33.209\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Central TV and Internet Limited\",\"created_at\":\"2026-04-11 02:01:41\",\"updated_at\":\"2026-04-11 02:01:41\",\"auto_import_date\":null},{\"id\":\"8403\",\"title\":\"Malware Distribution - 42.228.125.212\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.228.125.212\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-11 02:01:39\",\"updated_at\":\"2026-04-11 02:01:39\",\"auto_import_date\":null},{\"id\":\"8402\",\"title\":\"Malware Distribution - 42.235.102.27\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.235.102.27\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-11 02:01:37\",\"updated_at\":\"2026-04-11 02:01:37\",\"auto_import_date\":null},{\"id\":\"8401\",\"title\":\"Malware Distribution - 115.50.220.84\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.50.220.84\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-11 02:01:35\",\"updated_at\":\"2026-04-11 02:01:35\",\"auto_import_date\":null},{\"id\":\"8400\",\"title\":\"Malware Distribution - 60.23.235.117\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8357000\",\"longitude\":\"123.4290000\",\"ip_address\":\"60.23.235.117\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:33\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CHINA UNICOM China169 Backbone\",\"created_at\":\"2026-04-11 02:01:34\",\"updated_at\":\"2026-04-11 02:01:34\",\"auto_import_date\":null},{\"id\":\"8399\",\"title\":\"Malware Distribution - 95.32.41.127\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"51.7032000\",\"longitude\":\"39.1974000\",\"ip_address\":\"95.32.41.127\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CenterTelecom Voronezh ISP\",\"created_at\":\"2026-04-11 02:01:32\",\"updated_at\":\"2026-04-11 02:01:32\",\"auto_import_date\":null},{\"id\":\"8398\",\"title\":\"Malware Distribution - 110.36.19.101\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"32.4926000\",\"longitude\":\"74.6124000\",\"ip_address\":\"110.36.19.101\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-11 05:01:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-11 02:01:30\",\"updated_at\":\"2026-04-11 02:01:30\",\"auto_import_date\":null},{\"id\":\"8396\",\"title\":\"Malware Distribution - 222.141.27.195\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.141.27.195\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 20:00:55\",\"updated_at\":\"2026-04-10 20:00:55\",\"auto_import_date\":null},{\"id\":\"8395\",\"title\":\"Malware Distribution - 175.173.68.153\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"175.173.68.153\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-10 20:00:53\",\"updated_at\":\"2026-04-10 20:00:53\",\"auto_import_date\":null},{\"id\":\"8394\",\"title\":\"Malware Distribution - 81.230.148.181\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Sweden\",\"latitude\":\"59.3327000\",\"longitude\":\"18.0656000\",\"ip_address\":\"81.230.148.181\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telia Company AB\",\"created_at\":\"2026-04-10 20:00:51\",\"updated_at\":\"2026-04-10 20:00:51\",\"auto_import_date\":null},{\"id\":\"8393\",\"title\":\"Malware Distribution - 61.137.131.185\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"61.137.131.185\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-10 20:00:49\",\"updated_at\":\"2026-04-10 20:00:49\",\"auto_import_date\":null},{\"id\":\"8392\",\"title\":\"Malware Distribution - 94.154.32.80\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"94.154.32.80\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:48\",\"updated_at\":\"2026-04-10 20:00:48\",\"auto_import_date\":null},{\"id\":\"8391\",\"title\":\"Malware Distribution - 195.177.94.74\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"195.177.94.74\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:46\",\"updated_at\":\"2026-04-10 20:00:46\",\"auto_import_date\":null},{\"id\":\"8390\",\"title\":\"Malware Distribution - 94.154.32.29\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"94.154.32.29\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:44\",\"updated_at\":\"2026-04-10 20:00:44\",\"auto_import_date\":null},{\"id\":\"8389\",\"title\":\"Malware Distribution - 94.154.32.74\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"94.154.32.74\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:42\",\"updated_at\":\"2026-04-10 20:00:42\",\"auto_import_date\":null},{\"id\":\"8388\",\"title\":\"Malware Distribution - 94.154.32.32\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"94.154.32.32\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:41\",\"updated_at\":\"2026-04-10 20:00:41\",\"auto_import_date\":null},{\"id\":\"8387\",\"title\":\"Malware Distribution - 195.177.94.30\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"195.177.94.30\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:39\",\"updated_at\":\"2026-04-10 20:00:39\",\"auto_import_date\":null},{\"id\":\"8386\",\"title\":\"Malware Distribution - 104.249.10.37\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.4507000\",\"longitude\":\"5.3799000\",\"ip_address\":\"104.249.10.37\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:37\",\"updated_at\":\"2026-04-10 20:00:37\",\"auto_import_date\":null},{\"id\":\"8385\",\"title\":\"Malware Distribution - 195.177.94.41\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"195.177.94.41\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:36\",\"updated_at\":\"2026-04-10 20:00:36\",\"auto_import_date\":null},{\"id\":\"8384\",\"title\":\"Malware Distribution - 94.154.32.12\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"43.2556000\",\"longitude\":\"5.4055000\",\"ip_address\":\"94.154.32.12\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Stellar Group SAS\",\"created_at\":\"2026-04-10 20:00:34\",\"updated_at\":\"2026-04-10 20:00:34\",\"auto_import_date\":null},{\"id\":\"8383\",\"title\":\"Malware Distribution - 77.110.96.200\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Sweden\",\"latitude\":\"59.3287000\",\"longitude\":\"18.0717000\",\"ip_address\":\"77.110.96.200\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Aeza International LTD\",\"created_at\":\"2026-04-10 20:00:32\",\"updated_at\":\"2026-04-10 20:00:32\",\"auto_import_date\":null},{\"id\":\"8382\",\"title\":\"Malware Distribution - 182.119.69.113\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"182.119.69.113\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 20:00:30\",\"updated_at\":\"2026-04-10 20:00:30\",\"auto_import_date\":null},{\"id\":\"8381\",\"title\":\"Malware Distribution - 185.149.120.3\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"47.2200000\",\"longitude\":\"39.7077000\",\"ip_address\":\"185.149.120.3\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:28\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Ddos-guard LTD\",\"created_at\":\"2026-04-10 20:00:29\",\"updated_at\":\"2026-04-10 20:00:29\",\"auto_import_date\":null},{\"id\":\"8380\",\"title\":\"Malware Distribution - 110.37.120.17\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.120.17\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-10 20:00:27\",\"updated_at\":\"2026-04-10 20:00:27\",\"auto_import_date\":null},{\"id\":\"8379\",\"title\":\"Malware Distribution - 42.235.80.228\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.235.80.228\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 20:00:25\",\"updated_at\":\"2026-04-10 20:00:25\",\"auto_import_date\":null},{\"id\":\"8378\",\"title\":\"Malware Distribution - 123.4.144.180\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.4.144.180\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 23:00:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 20:00:24\",\"updated_at\":\"2026-04-10 20:00:24\",\"auto_import_date\":null},{\"id\":\"8372\",\"title\":\"Malware Distribution - 222.140.230.50\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.140.230.50\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:52\",\"updated_at\":\"2026-04-10 09:09:52\",\"auto_import_date\":null},{\"id\":\"8371\",\"title\":\"Malware Distribution - 154.242.0.41\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Algeria\",\"latitude\":\"35.5044000\",\"longitude\":\"6.0714000\",\"ip_address\":\"154.242.0.41\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:50\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: new\",\"created_at\":\"2026-04-10 09:09:50\",\"updated_at\":\"2026-04-10 09:09:50\",\"auto_import_date\":null},{\"id\":\"8370\",\"title\":\"Malware Distribution - 219.155.192.169\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.155.192.169\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:48\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:48\",\"updated_at\":\"2026-04-10 09:09:48\",\"auto_import_date\":null},{\"id\":\"8369\",\"title\":\"Malware Distribution - 113.230.28.252\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"113.230.28.252\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-10 09:09:46\",\"updated_at\":\"2026-04-10 09:09:46\",\"auto_import_date\":null},{\"id\":\"8368\",\"title\":\"Malware Distribution - 123.14.218.190\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.14.218.190\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:45\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:45\",\"updated_at\":\"2026-04-10 09:09:45\",\"auto_import_date\":null},{\"id\":\"8367\",\"title\":\"Malware Distribution - 150.255.251.198\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"20.0442000\",\"longitude\":\"110.2000000\",\"ip_address\":\"150.255.251.198\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:43\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Hainan Province Network\",\"created_at\":\"2026-04-10 09:09:43\",\"updated_at\":\"2026-04-10 09:09:43\",\"auto_import_date\":null},{\"id\":\"8366\",\"title\":\"Malware Distribution - 115.49.203.28\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.49.203.28\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:41\",\"updated_at\":\"2026-04-10 09:09:41\",\"auto_import_date\":null},{\"id\":\"8365\",\"title\":\"Malware Distribution - 36.89.252.178\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Indonesia\",\"latitude\":\"-6.1810400\",\"longitude\":\"106.8260000\",\"ip_address\":\"36.89.252.178\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PT. Telekomunikasi Indonesia\",\"created_at\":\"2026-04-10 09:09:40\",\"updated_at\":\"2026-04-10 09:09:40\",\"auto_import_date\":null},{\"id\":\"8364\",\"title\":\"Malware Distribution - 221.1.109.243\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"221.1.109.243\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:38\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-10 09:09:38\",\"updated_at\":\"2026-04-10 09:09:38\",\"auto_import_date\":null},{\"id\":\"8363\",\"title\":\"Malware Distribution - 112.113.247.136\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"25.0453000\",\"longitude\":\"102.7100000\",\"ip_address\":\"112.113.247.136\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:36\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-10 09:09:36\",\"updated_at\":\"2026-04-10 09:09:36\",\"auto_import_date\":null},{\"id\":\"8362\",\"title\":\"Malware Distribution - 179.43.182.70\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Switzerland\",\"latitude\":\"47.4505000\",\"longitude\":\"8.5255000\",\"ip_address\":\"179.43.182.70\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Private Layer INC\",\"created_at\":\"2026-04-10 09:09:35\",\"updated_at\":\"2026-04-10 09:09:35\",\"auto_import_date\":null},{\"id\":\"8361\",\"title\":\"Malware Distribution - 110.37.107.203\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.107.203\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:33\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-10 09:09:33\",\"updated_at\":\"2026-04-10 09:09:33\",\"auto_import_date\":null},{\"id\":\"8360\",\"title\":\"Malware Distribution - 125.42.116.76\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"125.42.116.76\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:31\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:31\",\"updated_at\":\"2026-04-10 09:09:31\",\"auto_import_date\":null},{\"id\":\"8359\",\"title\":\"Malware Distribution - 42.234.136.170\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.234.136.170\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 09:09:30\",\"updated_at\":\"2026-04-10 09:09:30\",\"auto_import_date\":null},{\"id\":\"8358\",\"title\":\"Malware Distribution - 115.63.187.43\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.63.187.43\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:28\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:28\",\"updated_at\":\"2026-04-10 09:09:28\",\"auto_import_date\":null},{\"id\":\"8357\",\"title\":\"Malware Distribution - 115.52.30.27\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.52.30.27\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:26\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:26\",\"updated_at\":\"2026-04-10 09:09:26\",\"auto_import_date\":null},{\"id\":\"8356\",\"title\":\"Malware Distribution - 115.56.67.4\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.56.67.4\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:24\",\"updated_at\":\"2026-04-10 09:09:24\",\"auto_import_date\":null},{\"id\":\"8355\",\"title\":\"Malware Distribution - 121.231.183.50\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"32.0607000\",\"longitude\":\"118.7630000\",\"ip_address\":\"121.231.183.50\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-10 09:09:23\",\"updated_at\":\"2026-04-10 09:09:23\",\"auto_import_date\":null},{\"id\":\"8354\",\"title\":\"Malware Distribution - 123.11.241.15\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.11.241.15\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:21\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 09:09:21\",\"updated_at\":\"2026-04-10 09:09:21\",\"auto_import_date\":null},{\"id\":\"8353\",\"title\":\"Spam Source - 23.148.144.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL680469\",\"country\":\"United States\",\"latitude\":\"41.2459000\",\"longitude\":\"-75.8818000\",\"ip_address\":\"23.148.144.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:19\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.148.144.0\\\/24\",\"created_at\":\"2026-04-10 09:09:19\",\"updated_at\":\"2026-04-10 09:09:19\",\"auto_import_date\":null},{\"id\":\"8352\",\"title\":\"Spam Source - 23.146.242.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL679712\",\"country\":\"United States\",\"latitude\":\"41.4873000\",\"longitude\":\"-75.6966000\",\"ip_address\":\"23.146.242.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:17\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.146.242.0\\\/24\",\"created_at\":\"2026-04-10 09:09:17\",\"updated_at\":\"2026-04-10 09:09:17\",\"auto_import_date\":null},{\"id\":\"8351\",\"title\":\"Spam Source - 23.146.240.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL680468\",\"country\":\"United States\",\"latitude\":\"41.2459000\",\"longitude\":\"-75.8818000\",\"ip_address\":\"23.146.240.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:15\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.146.240.0\\\/24\",\"created_at\":\"2026-04-10 09:09:16\",\"updated_at\":\"2026-04-10 09:09:16\",\"auto_import_date\":null},{\"id\":\"8350\",\"title\":\"Spam Source - 23.137.100.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL678470\",\"country\":\"Panama\",\"latitude\":\"8.9807200\",\"longitude\":\"-79.5097000\",\"ip_address\":\"23.137.100.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:14\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.137.100.0\\\/24\",\"created_at\":\"2026-04-10 09:09:14\",\"updated_at\":\"2026-04-10 09:09:14\",\"auto_import_date\":null},{\"id\":\"8349\",\"title\":\"Spam Source - 23.132.164.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL688228\",\"country\":\"United Kingdom\",\"latitude\":\"51.5272000\",\"longitude\":\"-0.0886732\",\"ip_address\":\"23.132.164.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:12\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.132.164.0\\\/24\",\"created_at\":\"2026-04-10 09:09:12\",\"updated_at\":\"2026-04-10 09:09:12\",\"auto_import_date\":null},{\"id\":\"8348\",\"title\":\"Spam Source - 23.129.252.0\\\/23\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL630797\",\"country\":\"Brazil\",\"latitude\":\"-23.5475000\",\"longitude\":\"-46.6361000\",\"ip_address\":\"23.129.252.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:10\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.129.252.0\\\/23\",\"created_at\":\"2026-04-10 09:09:10\",\"updated_at\":\"2026-04-10 09:09:10\",\"auto_import_date\":null},{\"id\":\"8347\",\"title\":\"Spam Source - 14.152.94.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL656012\",\"country\":\"China\",\"latitude\":\"23.1317000\",\"longitude\":\"113.2660000\",\"ip_address\":\"14.152.94.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:08\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 14.152.94.0\\\/24\",\"created_at\":\"2026-04-10 09:09:09\",\"updated_at\":\"2026-04-10 09:09:09\",\"auto_import_date\":null},{\"id\":\"8346\",\"title\":\"Spam Source - 14.128.48.0\\\/21\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL656501\",\"country\":\"South Korea\",\"latitude\":\"37.3835000\",\"longitude\":\"126.9340000\",\"ip_address\":\"14.128.48.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:07\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 14.128.48.0\\\/21\",\"created_at\":\"2026-04-10 09:09:07\",\"updated_at\":\"2026-04-10 09:09:07\",\"auto_import_date\":null},{\"id\":\"8345\",\"title\":\"Spam Source - 14.128.32.0\\\/20\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL657011\",\"country\":\"Hong Kong\",\"latitude\":\"22.2868000\",\"longitude\":\"114.1520000\",\"ip_address\":\"14.128.32.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:05\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 14.128.32.0\\\/20\",\"created_at\":\"2026-04-10 09:09:05\",\"updated_at\":\"2026-04-10 09:09:05\",\"auto_import_date\":null},{\"id\":\"8344\",\"title\":\"Spam Source - 5.188.236.0\\\/23\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL544034\",\"country\":\"Russia\",\"latitude\":\"59.8789000\",\"longitude\":\"30.4023000\",\"ip_address\":\"5.188.236.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:03\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.188.236.0\\\/23\",\"created_at\":\"2026-04-10 09:09:04\",\"updated_at\":\"2026-04-10 09:09:04\",\"auto_import_date\":null},{\"id\":\"8343\",\"title\":\"Spam Source - 5.183.60.0\\\/22\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL463004\",\"country\":\"United Kingdom\",\"latitude\":\"51.5273000\",\"longitude\":\"-0.0889504\",\"ip_address\":\"5.183.60.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:02\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.183.60.0\\\/22\",\"created_at\":\"2026-04-10 09:09:02\",\"updated_at\":\"2026-04-10 09:09:02\",\"auto_import_date\":null},{\"id\":\"8342\",\"title\":\"Spam Source - 5.133.101.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL681548\",\"country\":\"Turkey\",\"latitude\":\"37.0702000\",\"longitude\":\"37.3656000\",\"ip_address\":\"5.133.101.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:09:00\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.133.101.0\\\/24\",\"created_at\":\"2026-04-10 09:09:00\",\"updated_at\":\"2026-04-10 09:09:00\",\"auto_import_date\":null},{\"id\":\"8341\",\"title\":\"Spam Source - 5.105.220.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL627956\",\"country\":\"Germany\",\"latitude\":\"50.1109000\",\"longitude\":\"8.6821300\",\"ip_address\":\"5.105.220.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:58\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.105.220.0\\\/24\",\"created_at\":\"2026-04-10 09:08:58\",\"updated_at\":\"2026-04-10 09:08:58\",\"auto_import_date\":null},{\"id\":\"8340\",\"title\":\"Spam Source - 5.42.92.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL625300\",\"country\":\"Russia\",\"latitude\":\"55.0913000\",\"longitude\":\"38.7628000\",\"ip_address\":\"5.42.92.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:56\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.42.92.0\\\/24\",\"created_at\":\"2026-04-10 09:08:57\",\"updated_at\":\"2026-04-10 09:08:57\",\"auto_import_date\":null},{\"id\":\"8339\",\"title\":\"Spam Source - 2.59.152.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL688496\",\"country\":\"Hong Kong\",\"latitude\":\"22.3148000\",\"longitude\":\"114.1700000\",\"ip_address\":\"2.59.152.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:55\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 2.59.152.0\\\/24\",\"created_at\":\"2026-04-10 09:08:55\",\"updated_at\":\"2026-04-10 09:08:55\",\"auto_import_date\":null},{\"id\":\"8338\",\"title\":\"Spam Source - 2.58.56.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL687502\",\"country\":\"France\",\"latitude\":\"47.6209000\",\"longitude\":\"6.8337000\",\"ip_address\":\"2.58.56.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:53\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 2.58.56.0\\\/24\",\"created_at\":\"2026-04-10 09:08:53\",\"updated_at\":\"2026-04-10 09:08:53\",\"auto_import_date\":null},{\"id\":\"8337\",\"title\":\"Spam Source - 2.57.234.0\\\/23\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL538947\",\"country\":\"France\",\"latitude\":\"43.6107000\",\"longitude\":\"3.8809000\",\"ip_address\":\"2.57.234.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:51\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 2.57.234.0\\\/23\",\"created_at\":\"2026-04-10 09:08:51\",\"updated_at\":\"2026-04-10 09:08:51\",\"auto_import_date\":null},{\"id\":\"8336\",\"title\":\"Spam Source - 2.57.232.0\\\/23\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL538946\",\"country\":\"France\",\"latitude\":\"43.6107000\",\"longitude\":\"3.8809000\",\"ip_address\":\"2.57.232.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:50\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 2.57.232.0\\\/23\",\"created_at\":\"2026-04-10 09:08:50\",\"updated_at\":\"2026-04-10 09:08:50\",\"auto_import_date\":null},{\"id\":\"8335\",\"title\":\"Spam Source - 2.57.122.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL636050\",\"country\":\"The Netherlands\",\"latitude\":\"52.3676000\",\"longitude\":\"4.9041400\",\"ip_address\":\"2.57.122.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:48\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 2.57.122.0\\\/24\",\"created_at\":\"2026-04-10 09:08:48\",\"updated_at\":\"2026-04-10 09:08:48\",\"auto_import_date\":null},{\"id\":\"8334\",\"title\":\"Spam Source - 2.56.192.0\\\/22\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL459831\",\"country\":\"The Netherlands\",\"latitude\":\"52.0672000\",\"longitude\":\"4.3604900\",\"ip_address\":\"2.56.192.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:46\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 2.56.192.0\\\/22\",\"created_at\":\"2026-04-10 09:08:46\",\"updated_at\":\"2026-04-10 09:08:46\",\"auto_import_date\":null},{\"id\":\"8333\",\"title\":\"Spam Source - 1.32.128.0\\\/18\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL286275\",\"country\":\"Singapore\",\"latitude\":\"1.2988800\",\"longitude\":\"103.8380000\",\"ip_address\":\"1.32.128.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:44\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 1.32.128.0\\\/18\",\"created_at\":\"2026-04-10 09:08:45\",\"updated_at\":\"2026-04-10 09:08:45\",\"auto_import_date\":null},{\"id\":\"8332\",\"title\":\"Spam Source - 1.19.0.0\\\/16\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL434604\",\"country\":\"South Korea\",\"latitude\":\"35.0185000\",\"longitude\":\"126.7950000\",\"ip_address\":\"1.19.0.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:43\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 1.19.0.0\\\/16\",\"created_at\":\"2026-04-10 09:08:43\",\"updated_at\":\"2026-04-10 09:08:43\",\"auto_import_date\":null},{\"id\":\"8331\",\"title\":\"Spam Source - 1.10.16.0\\\/20\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL256894\",\"country\":\"China\",\"latitude\":\"23.1317000\",\"longitude\":\"113.2660000\",\"ip_address\":\"1.10.16.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 12:08:41\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 1.10.16.0\\\/20\",\"created_at\":\"2026-04-10 09:08:41\",\"updated_at\":\"2026-04-10 09:08:41\",\"auto_import_date\":null},{\"id\":\"8377\",\"title\":\"In-Memory Loader Drops ScreenConnect\",\"description\":\"In February 2026, an attack chain was discovered that utilized a fraudulent Adobe Acrobat Reader download page to deceive victims into installing ConnectWise's ScreenConnect, a legitimate remote access tool exploited for malicious purposes. The attack employs sophisticated evasion techniques including heavy obfuscation, .NET reflection for in-memory payload execution, and dynamic code construction. A VBScript loader initiates the chain by downloading and executing obfuscated PowerShell commands\",\"country\":\"United States\",\"latitude\":\"38.9072000\",\"longitude\":\"-77.0369000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 08:15:00\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 12\",\"created_at\":\"2026-04-10 15:03:41\",\"updated_at\":\"2026-04-10 15:03:41\",\"auto_import_date\":null},{\"id\":\"8330\",\"title\":\"Malware Distribution - 62.60.226.159\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1169000\",\"longitude\":\"8.6837000\",\"ip_address\":\"62.60.226.159\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Femo IT Solutions Limited\",\"created_at\":\"2026-04-10 02:08:43\",\"updated_at\":\"2026-04-10 02:08:43\",\"auto_import_date\":null},{\"id\":\"8329\",\"title\":\"Malware Distribution - 182.127.113.244\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.127.113.244\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 02:08:41\",\"updated_at\":\"2026-04-10 02:08:41\",\"auto_import_date\":null},{\"id\":\"8328\",\"title\":\"Malware Distribution - 123.11.79.188\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.11.79.188\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 02:08:39\",\"updated_at\":\"2026-04-10 02:08:39\",\"auto_import_date\":null},{\"id\":\"8327\",\"title\":\"Malware Distribution - 42.230.41.119\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.230.41.119\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 02:08:38\",\"updated_at\":\"2026-04-10 02:08:38\",\"auto_import_date\":null},{\"id\":\"8326\",\"title\":\"Malware Distribution - 42.7.236.21\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.7.236.21\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:36\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-10 02:08:36\",\"updated_at\":\"2026-04-10 02:08:36\",\"auto_import_date\":null},{\"id\":\"8325\",\"title\":\"Malware Distribution - 182.121.114.247\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.114.247\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 02:08:34\",\"updated_at\":\"2026-04-10 02:08:34\",\"auto_import_date\":null},{\"id\":\"8324\",\"title\":\"Malware Distribution - 145.223.68.170\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"France\",\"latitude\":\"48.8558000\",\"longitude\":\"2.3494000\",\"ip_address\":\"145.223.68.170\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Regxa Company for Information Technology Ltd\",\"created_at\":\"2026-04-10 02:08:32\",\"updated_at\":\"2026-04-10 02:08:32\",\"auto_import_date\":null},{\"id\":\"8323\",\"title\":\"Malware Distribution - 27.215.48.189\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.215.48.189\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:31\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-10 02:08:31\",\"updated_at\":\"2026-04-10 02:08:31\",\"auto_import_date\":null},{\"id\":\"8322\",\"title\":\"Malware Distribution - 117.193.111.194\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"14.4611000\",\"longitude\":\"75.9245000\",\"ip_address\":\"117.193.111.194\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: BSNL Internet\",\"created_at\":\"2026-04-10 02:08:29\",\"updated_at\":\"2026-04-10 02:08:29\",\"auto_import_date\":null},{\"id\":\"8321\",\"title\":\"Malware Distribution - 42.87.138.126\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.87.138.126\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-10 02:08:27\",\"updated_at\":\"2026-04-10 02:08:27\",\"auto_import_date\":null},{\"id\":\"8320\",\"title\":\"Malware Distribution - 219.156.124.121\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.156.124.121\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 02:08:26\",\"updated_at\":\"2026-04-10 02:08:26\",\"auto_import_date\":null},{\"id\":\"8319\",\"title\":\"Malware Distribution - 115.54.135.147\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.54.135.147\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-10 02:08:24\",\"updated_at\":\"2026-04-10 02:08:24\",\"auto_import_date\":null},{\"id\":\"8318\",\"title\":\"Malware Distribution - 182.121.253.4\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.253.4\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 02:08:22\",\"updated_at\":\"2026-04-10 02:08:22\",\"auto_import_date\":null},{\"id\":\"8317\",\"title\":\"Malware Distribution - 27.211.8.28\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6683000\",\"longitude\":\"116.9972000\",\"ip_address\":\"27.211.8.28\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-10 02:08:21\",\"updated_at\":\"2026-04-10 02:08:21\",\"auto_import_date\":null},{\"id\":\"8316\",\"title\":\"Malware Distribution - 110.37.15.58\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.15.58\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:19\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-10 02:08:19\",\"updated_at\":\"2026-04-10 02:08:19\",\"auto_import_date\":null},{\"id\":\"8315\",\"title\":\"Malware Distribution - 182.183.165.146\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"28.5541000\",\"longitude\":\"68.2267000\",\"ip_address\":\"182.183.165.146\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Triple Play Project SOUTH\",\"created_at\":\"2026-04-10 02:08:17\",\"updated_at\":\"2026-04-10 02:08:17\",\"auto_import_date\":null},{\"id\":\"8314\",\"title\":\"Malware Distribution - 85.11.167.101\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Bulgaria\",\"latitude\":\"42.6826000\",\"longitude\":\"23.3223000\",\"ip_address\":\"85.11.167.101\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: ColocaTel Inc.\",\"created_at\":\"2026-04-10 02:08:16\",\"updated_at\":\"2026-04-10 02:08:16\",\"auto_import_date\":null},{\"id\":\"8313\",\"title\":\"Malware Distribution - 182.121.191.143\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.191.143\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:14\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-10 02:08:14\",\"updated_at\":\"2026-04-10 02:08:14\",\"auto_import_date\":null},{\"id\":\"8312\",\"title\":\"Malware Distribution - 90.251.127.200\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United Kingdom\",\"latitude\":\"51.5808000\",\"longitude\":\"-0.3793000\",\"ip_address\":\"90.251.127.200\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-10 05:08:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Vodafone Limited\",\"created_at\":\"2026-04-10 02:08:12\",\"updated_at\":\"2026-04-10 02:08:12\",\"auto_import_date\":null},{\"id\":\"8306\",\"title\":\"Malware Distribution - 112.248.184.156\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"112.248.184.156\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:38:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-09 19:38:03\",\"updated_at\":\"2026-04-09 19:38:03\",\"auto_import_date\":null},{\"id\":\"8305\",\"title\":\"Malware Distribution - 42.227.201.205\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.227.201.205\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:38:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 19:38:01\",\"updated_at\":\"2026-04-09 19:38:01\",\"auto_import_date\":null},{\"id\":\"8304\",\"title\":\"Malware Distribution - 118.232.137.101\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Taiwan\",\"latitude\":\"22.9917000\",\"longitude\":\"120.2148000\",\"ip_address\":\"118.232.137.101\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: TUNGHO\",\"created_at\":\"2026-04-09 19:38:00\",\"updated_at\":\"2026-04-09 19:38:00\",\"auto_import_date\":null},{\"id\":\"8303\",\"title\":\"Malware Distribution - 105.224.82.210\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-25.7570000\",\"longitude\":\"28.1443000\",\"ip_address\":\"105.224.82.210\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-09 19:37:58\",\"updated_at\":\"2026-04-09 19:37:58\",\"auto_import_date\":null},{\"id\":\"8302\",\"title\":\"Malware Distribution - 36.249.194.99\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"24.4795000\",\"longitude\":\"118.0890000\",\"ip_address\":\"36.249.194.99\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Fujian Province Network\",\"created_at\":\"2026-04-09 19:37:56\",\"updated_at\":\"2026-04-09 19:37:56\",\"auto_import_date\":null},{\"id\":\"8301\",\"title\":\"Malware Distribution - 124.235.249.74\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"43.8800000\",\"longitude\":\"125.3247000\",\"ip_address\":\"124.235.249.74\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:54\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Telecom\",\"created_at\":\"2026-04-09 19:37:54\",\"updated_at\":\"2026-04-09 19:37:54\",\"auto_import_date\":null},{\"id\":\"8300\",\"title\":\"Malware Distribution - 182.126.89.204\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.126.89.204\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:52\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 19:37:53\",\"updated_at\":\"2026-04-09 19:37:53\",\"auto_import_date\":null},{\"id\":\"8299\",\"title\":\"Malware Distribution - 115.56.110.171\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.56.110.171\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 19:37:51\",\"updated_at\":\"2026-04-09 19:37:51\",\"auto_import_date\":null},{\"id\":\"8298\",\"title\":\"Malware Distribution - 183.23.135.140\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"23.1317000\",\"longitude\":\"113.2660000\",\"ip_address\":\"183.23.135.140\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-09 19:37:49\",\"updated_at\":\"2026-04-09 19:37:49\",\"auto_import_date\":null},{\"id\":\"8297\",\"title\":\"Malware Distribution - 27.213.177.46\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.213.177.46\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-09 19:37:48\",\"updated_at\":\"2026-04-09 19:37:48\",\"auto_import_date\":null},{\"id\":\"8296\",\"title\":\"Malware Distribution - 115.55.80.213\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.55.80.213\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 19:37:46\",\"updated_at\":\"2026-04-09 19:37:46\",\"auto_import_date\":null},{\"id\":\"8295\",\"title\":\"Malware Distribution - 42.55.1.114\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.55.1.114\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-09 19:37:44\",\"updated_at\":\"2026-04-09 19:37:44\",\"auto_import_date\":null},{\"id\":\"8294\",\"title\":\"Malware Distribution - 72.194.227.46\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United States\",\"latitude\":\"33.5038000\",\"longitude\":\"-112.0253000\",\"ip_address\":\"72.194.227.46\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Cox Communications Inc.\",\"created_at\":\"2026-04-09 19:37:42\",\"updated_at\":\"2026-04-09 19:37:42\",\"auto_import_date\":null},{\"id\":\"8293\",\"title\":\"Malware Distribution - 125.41.174.71\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"125.41.174.71\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 19:37:41\",\"updated_at\":\"2026-04-09 19:37:41\",\"auto_import_date\":null},{\"id\":\"8292\",\"title\":\"Malware Distribution - 125.43.25.32\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"125.43.25.32\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 19:37:39\",\"updated_at\":\"2026-04-09 19:37:39\",\"auto_import_date\":null},{\"id\":\"8291\",\"title\":\"Malware Distribution - 42.229.168.199\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"35.1874000\",\"longitude\":\"113.8025000\",\"ip_address\":\"42.229.168.199\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 19:37:37\",\"updated_at\":\"2026-04-09 19:37:37\",\"auto_import_date\":null},{\"id\":\"8290\",\"title\":\"Malware Distribution - 110.37.28.119\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Pakistan\",\"latitude\":\"31.5826000\",\"longitude\":\"74.3276000\",\"ip_address\":\"110.37.28.119\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Wateen Telecom Limited\",\"created_at\":\"2026-04-09 19:37:36\",\"updated_at\":\"2026-04-09 19:37:36\",\"auto_import_date\":null},{\"id\":\"8289\",\"title\":\"Malware Distribution - 114.139.213.60\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"26.5982000\",\"longitude\":\"106.7070000\",\"ip_address\":\"114.139.213.60\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-09 19:37:34\",\"updated_at\":\"2026-04-09 19:37:34\",\"auto_import_date\":null},{\"id\":\"8288\",\"title\":\"Malware Distribution - 1.10.209.143\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Thailand\",\"latitude\":\"13.7101000\",\"longitude\":\"100.4543000\",\"ip_address\":\"1.10.209.143\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 22:37:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: TOT Public Company Limited\",\"created_at\":\"2026-04-09 19:37:32\",\"updated_at\":\"2026-04-09 19:37:32\",\"auto_import_date\":null},{\"id\":\"8376\",\"title\":\"Payroll pirate attacks targeting Canadian employees\",\"description\":\"Microsoft Incident Response researchers identified Storm-2755, a financially motivated threat actor conducting payroll pirate attacks against Canadian users. The campaign uses malvertising and SEO poisoning on generic search terms like \\\"Office 365\\\" to lure victims to a fraudulent sign-in page. Through adversary-in-the-middle techniques, the actor captures authentication tokens and session cookies, bypassing MFA protections. Storm-2755 maintains persistence using Axios HTTP client to replay stole\",\"country\":\"Romania\",\"latitude\":\"44.4268000\",\"longitude\":\"26.1025000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 20:29:32\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 3\",\"created_at\":\"2026-04-10 15:03:41\",\"updated_at\":\"2026-04-10 15:03:41\",\"auto_import_date\":null},{\"id\":\"8307\",\"title\":\"Stealer Campaign Impacting SLTT macOS Users\",\"description\":\"MacSync Stealer is a macOS infostealer operating as Malware-as-a-Service (MaaS), distributed through SEO poisoning and fake ClickFix CAPTCHAs. The campaign has evolved through three iterations since November 2025, shifting from fake download sites to malicious ChatGPT conversations and finally to sophisticated shell-based loaders with dynamic AppleScript payloads. Threat actors use Google-sponsored search results to redirect victims to fake CAPTCHA pages that trick users into executing malicious\",\"country\":\"United Kingdom\",\"latitude\":\"51.5074000\",\"longitude\":\"-0.1278000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 18:17:18\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 17\",\"created_at\":\"2026-04-09 21:01:55\",\"updated_at\":\"2026-04-09 21:01:55\",\"auto_import_date\":null},{\"id\":\"8310\",\"title\":\"This fake Windows support website delivers password-stealing malware\",\"description\":\"A malicious campaign is targeting French-speaking users in an attempt to steal passwords, payment details and banking details from people across France, according to researchers at the Institute for Strategic Studies (ISS).\",\"country\":\"France\",\"latitude\":\"48.8566000\",\"longitude\":\"2.3522000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 17:48:01\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 5\",\"created_at\":\"2026-04-09 21:01:56\",\"updated_at\":\"2026-04-09 21:01:56\",\"auto_import_date\":null},{\"id\":\"8309\",\"title\":\"Hack-for-Hire Campaign Targets Journalists Across MENA Region\",\"description\":\"A hack-for-hire operation with suspected links to the Bitter threat actor targeted journalists, activists, and government officials across the Middle East and North Africa between 2023 and 2025. The campaign employed sophisticated spear-phishing attacks via LinkedIn, Apple Messages, WhatsApp, and email to compromise Apple and Google accounts. Victims included Egyptian journalists Mostafa Al-A'sar and Ahmed Eltantawy, along with a Lebanese journalist whose Apple Account was fully compromised. Att\",\"country\":\"Germany\",\"latitude\":\"52.5200000\",\"longitude\":\"13.4050000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 17:38:25\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 16\",\"created_at\":\"2026-04-09 21:01:55\",\"updated_at\":\"2026-04-09 21:01:55\",\"auto_import_date\":null},{\"id\":\"8287\",\"title\":\"Spam Source - 23.146.241.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL681852\",\"country\":\"United States\",\"latitude\":\"41.4873000\",\"longitude\":\"-75.6966000\",\"ip_address\":\"23.146.241.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 16:36:16\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.146.241.0\\\/24\",\"created_at\":\"2026-04-09 13:36:16\",\"updated_at\":\"2026-04-09 13:36:16\",\"auto_import_date\":null},{\"id\":\"8286\",\"title\":\"Malware Distribution - 121.167.209.164\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Korea\",\"latitude\":\"37.4897000\",\"longitude\":\"127.0637000\",\"ip_address\":\"121.167.209.164\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Korea Telecom\",\"created_at\":\"2026-04-09 07:49:30\",\"updated_at\":\"2026-04-09 07:49:30\",\"auto_import_date\":null},{\"id\":\"8285\",\"title\":\"Malware Distribution - 117.245.136.13\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"26.2692000\",\"longitude\":\"73.0090000\",\"ip_address\":\"117.245.136.13\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:28\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: BSNL Internet\",\"created_at\":\"2026-04-09 07:49:29\",\"updated_at\":\"2026-04-09 07:49:29\",\"auto_import_date\":null},{\"id\":\"8284\",\"title\":\"Malware Distribution - 42.228.32.25\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.228.32.25\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 07:49:27\",\"updated_at\":\"2026-04-09 07:49:27\",\"auto_import_date\":null},{\"id\":\"8283\",\"title\":\"Malware Distribution - 61.52.39.11\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.52.39.11\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 07:49:25\",\"updated_at\":\"2026-04-09 07:49:25\",\"auto_import_date\":null},{\"id\":\"8282\",\"title\":\"Malware Distribution - 105.184.9.215\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-23.9045000\",\"longitude\":\"29.4688000\",\"ip_address\":\"105.184.9.215\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-09 07:49:23\",\"updated_at\":\"2026-04-09 07:49:23\",\"auto_import_date\":null},{\"id\":\"8281\",\"title\":\"Malware Distribution - 175.173.81.202\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"175.173.81.202\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:21\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-09 07:49:22\",\"updated_at\":\"2026-04-09 07:49:22\",\"auto_import_date\":null},{\"id\":\"8280\",\"title\":\"Malware Distribution - 190.55.14.216\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Argentina\",\"latitude\":\"-34.6504000\",\"longitude\":\"-58.3878000\",\"ip_address\":\"190.55.14.216\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telecentro S.A.\",\"created_at\":\"2026-04-09 07:49:20\",\"updated_at\":\"2026-04-09 07:49:20\",\"auto_import_date\":null},{\"id\":\"8279\",\"title\":\"Malware Distribution - 60.178.147.73\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"29.9302000\",\"longitude\":\"121.5610000\",\"ip_address\":\"60.178.147.73\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:18\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-09 07:49:18\",\"updated_at\":\"2026-04-09 07:49:18\",\"auto_import_date\":null},{\"id\":\"8278\",\"title\":\"Malware Distribution - 219.156.97.19\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.156.97.19\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:16\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 07:49:17\",\"updated_at\":\"2026-04-09 07:49:17\",\"auto_import_date\":null},{\"id\":\"8277\",\"title\":\"Malware Distribution - 105.184.32.53\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-33.9140000\",\"longitude\":\"18.4129000\",\"ip_address\":\"105.184.32.53\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-09 07:49:15\",\"updated_at\":\"2026-04-09 07:49:15\",\"auto_import_date\":null},{\"id\":\"8276\",\"title\":\"Malware Distribution - 115.59.237.1\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.59.237.1\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:13\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 07:49:13\",\"updated_at\":\"2026-04-09 07:49:13\",\"auto_import_date\":null},{\"id\":\"8275\",\"title\":\"Malware Distribution - 61.53.125.145\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.125.145\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:11\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 07:49:11\",\"updated_at\":\"2026-04-09 07:49:11\",\"auto_import_date\":null},{\"id\":\"8274\",\"title\":\"Malware Distribution - 107.175.246.40\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United States\",\"latitude\":\"42.8864000\",\"longitude\":\"-78.8784000\",\"ip_address\":\"107.175.246.40\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:09\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: HostPapa\",\"created_at\":\"2026-04-09 07:49:10\",\"updated_at\":\"2026-04-09 07:49:10\",\"auto_import_date\":null},{\"id\":\"8273\",\"title\":\"Malware Distribution - 182.122.221.104\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.122.221.104\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:08\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 07:49:08\",\"updated_at\":\"2026-04-09 07:49:08\",\"auto_import_date\":null},{\"id\":\"8272\",\"title\":\"Malware Distribution - 38.240.58.33\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1049000\",\"longitude\":\"8.6295000\",\"ip_address\":\"38.240.58.33\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:06\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Hyonix\",\"created_at\":\"2026-04-09 07:49:06\",\"updated_at\":\"2026-04-09 07:49:06\",\"auto_import_date\":null},{\"id\":\"8271\",\"title\":\"Malware Distribution - 222.139.226.86\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.0960000\",\"longitude\":\"114.3828000\",\"ip_address\":\"222.139.226.86\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:04\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 07:49:05\",\"updated_at\":\"2026-04-09 07:49:05\",\"auto_import_date\":null},{\"id\":\"8270\",\"title\":\"Malware Distribution - 206.189.93.37\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Singapore\",\"latitude\":\"1.3212300\",\"longitude\":\"103.6950000\",\"ip_address\":\"206.189.93.37\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: DigitalOcean, LLC\",\"created_at\":\"2026-04-09 07:49:03\",\"updated_at\":\"2026-04-09 07:49:03\",\"auto_import_date\":null},{\"id\":\"8269\",\"title\":\"Malware Distribution - 119.163.183.73\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"119.163.183.73\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:49:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-09 07:49:01\",\"updated_at\":\"2026-04-09 07:49:01\",\"auto_import_date\":null},{\"id\":\"8268\",\"title\":\"Malware Distribution - 182.121.228.151\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.121.228.151\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:48:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 07:48:59\",\"updated_at\":\"2026-04-09 07:48:59\",\"auto_import_date\":null},{\"id\":\"8267\",\"title\":\"Malware Distribution - 42.229.155.79\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"35.1874000\",\"longitude\":\"113.8025000\",\"ip_address\":\"42.229.155.79\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 10:48:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 07:48:58\",\"updated_at\":\"2026-04-09 07:48:58\",\"auto_import_date\":null},{\"id\":\"8308\",\"title\":\"The long road to your crypto: ClipBanker and its marathon infection chain\",\"description\":\"Proxifiers are speciaized software designed to tunnel traffic for programs that do not natively support proxy servers. They are a go-to for making sure these apps are functional within secured development environments. By coincidence, Proxifier is also a name for a proprietary proxifier developed by VentoByte, which is distributed under a paid license. If you search for Proxifier (or a proxifier), one of the top results in popular search engines is a link to a GitHub repository. That\\u2019s exactly\",\"country\":\"United States\",\"latitude\":\"38.9072000\",\"longitude\":\"-77.0369000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 09:57:44\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 12\",\"created_at\":\"2026-04-09 21:01:55\",\"updated_at\":\"2026-04-09 21:01:55\",\"auto_import_date\":null},{\"id\":\"8266\",\"title\":\"Malware Distribution - 182.118.147.46\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"182.118.147.46\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 01:46:49\",\"updated_at\":\"2026-04-09 01:46:49\",\"auto_import_date\":null},{\"id\":\"8265\",\"title\":\"Malware Distribution - 182.115.234.195\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.115.234.195\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:47\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 01:46:47\",\"updated_at\":\"2026-04-09 01:46:47\",\"auto_import_date\":null},{\"id\":\"8264\",\"title\":\"Malware Distribution - 117.251.18.126\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"10.7739000\",\"longitude\":\"76.6487000\",\"ip_address\":\"117.251.18.126\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:45\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: BSNL Internet\",\"created_at\":\"2026-04-09 01:46:46\",\"updated_at\":\"2026-04-09 01:46:46\",\"auto_import_date\":null},{\"id\":\"8263\",\"title\":\"Malware Distribution - 115.63.12.243\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.63.12.243\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:44\",\"updated_at\":\"2026-04-09 01:46:44\",\"auto_import_date\":null},{\"id\":\"8262\",\"title\":\"Malware Distribution - 45.145.225.160\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1093000\",\"longitude\":\"8.7321000\",\"ip_address\":\"45.145.225.160\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Oliver Horscht is trading as \\\"SYNLINQ\\\"\",\"created_at\":\"2026-04-09 01:46:42\",\"updated_at\":\"2026-04-09 01:46:42\",\"auto_import_date\":null},{\"id\":\"8261\",\"title\":\"Malware Distribution - 42.224.101.5\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.6735000\",\"longitude\":\"112.4368000\",\"ip_address\":\"42.224.101.5\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:40\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 01:46:41\",\"updated_at\":\"2026-04-09 01:46:41\",\"auto_import_date\":null},{\"id\":\"8260\",\"title\":\"Malware Distribution - 42.230.18.82\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.230.18.82\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-09 01:46:39\",\"updated_at\":\"2026-04-09 01:46:39\",\"auto_import_date\":null},{\"id\":\"8259\",\"title\":\"Malware Distribution - 59.182.219.217\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"11.3459000\",\"longitude\":\"76.7891000\",\"ip_address\":\"59.182.219.217\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: MTNL Mumbai\",\"created_at\":\"2026-04-09 01:46:37\",\"updated_at\":\"2026-04-09 01:46:37\",\"auto_import_date\":null},{\"id\":\"8258\",\"title\":\"Malware Distribution - 125.40.121.37\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"125.40.121.37\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:36\",\"updated_at\":\"2026-04-09 01:46:36\",\"auto_import_date\":null},{\"id\":\"8257\",\"title\":\"Malware Distribution - 123.5.155.180\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.5.155.180\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:34\",\"updated_at\":\"2026-04-09 01:46:34\",\"auto_import_date\":null},{\"id\":\"8256\",\"title\":\"Malware Distribution - 61.53.119.3\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.119.3\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:32\",\"updated_at\":\"2026-04-09 01:46:32\",\"auto_import_date\":null},{\"id\":\"8255\",\"title\":\"Malware Distribution - 42.55.238.186\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.55.238.186\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-09 01:46:30\",\"updated_at\":\"2026-04-09 01:46:30\",\"auto_import_date\":null},{\"id\":\"8254\",\"title\":\"Malware Distribution - 119.179.236.13\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"119.179.236.13\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-09 01:46:29\",\"updated_at\":\"2026-04-09 01:46:29\",\"auto_import_date\":null},{\"id\":\"8253\",\"title\":\"Malware Distribution - 113.228.152.43\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"113.228.152.43\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-09 01:46:27\",\"updated_at\":\"2026-04-09 01:46:27\",\"auto_import_date\":null},{\"id\":\"8252\",\"title\":\"Malware Distribution - 125.47.237.161\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"125.47.237.161\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:25\",\"updated_at\":\"2026-04-09 01:46:25\",\"auto_import_date\":null},{\"id\":\"8251\",\"title\":\"Malware Distribution - 115.58.173.66\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.58.173.66\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:24\",\"updated_at\":\"2026-04-09 01:46:24\",\"auto_import_date\":null},{\"id\":\"8250\",\"title\":\"Malware Distribution - 115.57.232.183\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"115.57.232.183\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:22\",\"updated_at\":\"2026-04-09 01:46:22\",\"auto_import_date\":null},{\"id\":\"8249\",\"title\":\"Malware Distribution - 42.85.51.149\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.85.51.149\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-09 01:46:20\",\"updated_at\":\"2026-04-09 01:46:20\",\"auto_import_date\":null},{\"id\":\"8248\",\"title\":\"Malware Distribution - 60.23.234.163\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8357000\",\"longitude\":\"123.4290000\",\"ip_address\":\"60.23.234.163\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:18\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CHINA UNICOM China169 Backbone\",\"created_at\":\"2026-04-09 01:46:19\",\"updated_at\":\"2026-04-09 01:46:19\",\"auto_import_date\":null},{\"id\":\"8247\",\"title\":\"Malware Distribution - 125.47.34.217\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7599000\",\"longitude\":\"113.6459000\",\"ip_address\":\"125.47.34.217\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-09 01:46:17\",\"updated_at\":\"2026-04-09 01:46:17\",\"auto_import_date\":null},{\"id\":\"8246\",\"title\":\"Spam Source - 5.101.86.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL694579\",\"country\":\"Canada\",\"latitude\":\"45.5041000\",\"longitude\":\"-73.5522000\",\"ip_address\":\"5.101.86.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-09 04:46:15\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 5.101.86.0\\\/24\",\"created_at\":\"2026-04-09 01:46:15\",\"updated_at\":\"2026-04-09 01:46:15\",\"auto_import_date\":null},{\"id\":\"8243\",\"title\":\"Malware Distribution - 115.63.13.122\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.63.13.122\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:55\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 19:29:55\",\"updated_at\":\"2026-04-08 19:29:55\",\"auto_import_date\":null},{\"id\":\"8242\",\"title\":\"Malware Distribution - 117.216.31.158\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"8.4832000\",\"longitude\":\"76.9458000\",\"ip_address\":\"117.216.31.158\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:53\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: BSNL Internet\",\"created_at\":\"2026-04-08 19:29:53\",\"updated_at\":\"2026-04-08 19:29:53\",\"auto_import_date\":null},{\"id\":\"8241\",\"title\":\"Malware Distribution - 115.55.239.151\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.55.239.151\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:51\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 19:29:51\",\"updated_at\":\"2026-04-08 19:29:51\",\"auto_import_date\":null},{\"id\":\"8240\",\"title\":\"Malware Distribution - 27.204.225.246\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.204.225.246\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:49\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-08 19:29:50\",\"updated_at\":\"2026-04-08 19:29:50\",\"auto_import_date\":null},{\"id\":\"8239\",\"title\":\"Malware Distribution - 178.16.54.149\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"The Netherlands\",\"latitude\":\"52.3759000\",\"longitude\":\"4.8975000\",\"ip_address\":\"178.16.54.149\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:48\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Omegatech LTD\",\"created_at\":\"2026-04-08 19:29:48\",\"updated_at\":\"2026-04-08 19:29:48\",\"auto_import_date\":null},{\"id\":\"8238\",\"title\":\"Malware Distribution - 178.16.55.23\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"United States\",\"latitude\":\"40.7503000\",\"longitude\":\"-74.0014000\",\"ip_address\":\"178.16.55.23\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:46\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Omegatech LTD\",\"created_at\":\"2026-04-08 19:29:46\",\"updated_at\":\"2026-04-08 19:29:46\",\"auto_import_date\":null},{\"id\":\"8237\",\"title\":\"Malware Distribution - 42.234.204.183\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.234.204.183\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:44\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-08 19:29:44\",\"updated_at\":\"2026-04-08 19:29:44\",\"auto_import_date\":null},{\"id\":\"8236\",\"title\":\"Malware Distribution - 158.94.210.158\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"The Netherlands\",\"latitude\":\"52.3759000\",\"longitude\":\"4.8975000\",\"ip_address\":\"158.94.210.158\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:42\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Omegatech LTD\",\"created_at\":\"2026-04-08 19:29:43\",\"updated_at\":\"2026-04-08 19:29:43\",\"auto_import_date\":null},{\"id\":\"8235\",\"title\":\"Malware Distribution - 117.215.56.147\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"India\",\"latitude\":\"12.9753000\",\"longitude\":\"77.5910000\",\"ip_address\":\"117.215.56.147\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: BSNL Internet\",\"created_at\":\"2026-04-08 19:29:41\",\"updated_at\":\"2026-04-08 19:29:41\",\"auto_import_date\":null},{\"id\":\"8234\",\"title\":\"Malware Distribution - 123.132.186.172\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"123.132.186.172\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-08 19:29:39\",\"updated_at\":\"2026-04-08 19:29:39\",\"auto_import_date\":null},{\"id\":\"8233\",\"title\":\"Malware Distribution - 222.127.73.23\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Philippines\",\"latitude\":\"10.3099000\",\"longitude\":\"123.8930000\",\"ip_address\":\"222.127.73.23\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: INNOVE\",\"created_at\":\"2026-04-08 19:29:37\",\"updated_at\":\"2026-04-08 19:29:37\",\"auto_import_date\":null},{\"id\":\"8232\",\"title\":\"Malware Distribution - 42.228.189.140\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.228.189.140\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:35\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-08 19:29:36\",\"updated_at\":\"2026-04-08 19:29:36\",\"auto_import_date\":null},{\"id\":\"8231\",\"title\":\"Malware Distribution - 39.90.87.7\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"39.90.87.7\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-08 19:29:34\",\"updated_at\":\"2026-04-08 19:29:34\",\"auto_import_date\":null},{\"id\":\"8230\",\"title\":\"Malware Distribution - 123.5.125.8\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.5.125.8\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 19:29:32\",\"updated_at\":\"2026-04-08 19:29:32\",\"auto_import_date\":null},{\"id\":\"8229\",\"title\":\"Malware Distribution - 178.163.34.244\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"53.5323000\",\"longitude\":\"49.3435000\",\"ip_address\":\"178.163.34.244\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:30\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Infoline networks\",\"created_at\":\"2026-04-08 19:29:31\",\"updated_at\":\"2026-04-08 19:29:31\",\"auto_import_date\":null},{\"id\":\"8228\",\"title\":\"Malware Distribution - 115.52.241.15\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"115.52.241.15\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 19:29:29\",\"updated_at\":\"2026-04-08 19:29:29\",\"auto_import_date\":null},{\"id\":\"8227\",\"title\":\"Malware Distribution - 122.193.144.30\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"31.2983000\",\"longitude\":\"120.5830000\",\"ip_address\":\"122.193.144.30\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Jiangsu Province Network\",\"created_at\":\"2026-04-08 19:29:27\",\"updated_at\":\"2026-04-08 19:29:27\",\"auto_import_date\":null},{\"id\":\"8226\",\"title\":\"Malware Distribution - 87.110.15.80\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Latvia\",\"latitude\":\"56.9473000\",\"longitude\":\"24.0979000\",\"ip_address\":\"87.110.15.80\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: LATTELEKOM\",\"created_at\":\"2026-04-08 19:29:25\",\"updated_at\":\"2026-04-08 19:29:25\",\"auto_import_date\":null},{\"id\":\"8225\",\"title\":\"Malware Distribution - 42.234.232.37\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.234.232.37\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 22:29:23\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-08 19:29:24\",\"updated_at\":\"2026-04-08 19:29:24\",\"auto_import_date\":null},{\"id\":\"8311\",\"title\":\"Canis C2 Exposed: Previously Undocumented Cross-Platform ...\",\"description\":\"On March 19, a researcher on X posted a suspicious Android APK tied to a phishing page impersonating Paidy, a Japanese buy-now-pay-later service. A quick look at the infrastructure behind it revealed an unauthenticated API sitting wide open, with endpoints exposing payloads, command logs, and the C2 source code itself. The server wasn't running a simple credential harvester. Agents for Android, iOS, Windows, Linux, and macOS were present, alongside a canvas-based device fingerprinting system and\",\"country\":\"Germany\",\"latitude\":\"52.5200000\",\"longitude\":\"13.4050000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"phishing\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 19:09:00\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 12\",\"created_at\":\"2026-04-09 21:01:56\",\"updated_at\":\"2026-04-09 21:01:56\",\"auto_import_date\":null},{\"id\":\"8245\",\"title\":\"ClickFix Malware Uses macOS Script Editor to Deliver Atomic Stealer\",\"description\":\"Jamf Threat Labs discovered a ClickFix-style macOS attack that abuses the applescript:\\\/\\\/ URL scheme to launch Script Editor and deliver an Atomic Stealer infostealer payload \\u2014 bypassing Terminal entirely.\",\"country\":\"China\",\"latitude\":\"39.9042000\",\"longitude\":\"116.4074000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 14:49:01\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 5\",\"created_at\":\"2026-04-08 21:05:25\",\"updated_at\":\"2026-04-08 21:05:25\",\"auto_import_date\":null},{\"id\":\"8244\",\"title\":\"New Lua-based malware LucidRook observed in targeted attacks against Taiwanese organizations\",\"description\":\"Cisco Talos observed a spear-phishing attack delivering LucidRook, a newly identified stager that targeted a Taiwanese NGO in October 2025. The metadata in the email suggests that it was delivered via authorized mail infrastructure, which implies potential misuse of legitimate sending capabilities.\",\"country\":\"Taiwan\",\"latitude\":\"25.0693000\",\"longitude\":\"121.4626000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 13:48:46\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 22\",\"created_at\":\"2026-04-08 21:05:25\",\"updated_at\":\"2026-04-08 21:05:25\",\"auto_import_date\":null},{\"id\":\"8219\",\"title\":\"Malware Distribution - 105.186.111.196\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"South Africa\",\"latitude\":\"-25.7570000\",\"longitude\":\"28.1443000\",\"ip_address\":\"105.186.111.196\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:41\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Telkom SA Ltd\",\"created_at\":\"2026-04-08 07:47:41\",\"updated_at\":\"2026-04-08 07:47:41\",\"auto_import_date\":null},{\"id\":\"8218\",\"title\":\"Malware Distribution - 113.229.103.178\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"113.229.103.178\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:39\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-08 07:47:39\",\"updated_at\":\"2026-04-08 07:47:39\",\"auto_import_date\":null},{\"id\":\"8217\",\"title\":\"Malware Distribution - 123.10.70.44\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.10.70.44\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:37\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 07:47:38\",\"updated_at\":\"2026-04-08 07:47:38\",\"auto_import_date\":null},{\"id\":\"8216\",\"title\":\"Malware Distribution - 42.234.235.129\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.234.235.129\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:36\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-08 07:47:36\",\"updated_at\":\"2026-04-08 07:47:36\",\"auto_import_date\":null},{\"id\":\"8215\",\"title\":\"Malware Distribution - 222.141.73.174\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.141.73.174\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:34\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 07:47:34\",\"updated_at\":\"2026-04-08 07:47:34\",\"auto_import_date\":null},{\"id\":\"8214\",\"title\":\"Malware Distribution - 39.90.144.156\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"39.90.144.156\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:32\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-08 07:47:33\",\"updated_at\":\"2026-04-08 07:47:33\",\"auto_import_date\":null},{\"id\":\"8213\",\"title\":\"Malware Distribution - 94.26.90.19\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Germany\",\"latitude\":\"50.1162000\",\"longitude\":\"8.6693000\",\"ip_address\":\"94.26.90.19\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:31\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Dedik Services Limited\",\"created_at\":\"2026-04-08 07:47:31\",\"updated_at\":\"2026-04-08 07:47:31\",\"auto_import_date\":null},{\"id\":\"8212\",\"title\":\"Malware Distribution - 222.138.119.126\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.138.119.126\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:29\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 07:47:29\",\"updated_at\":\"2026-04-08 07:47:29\",\"auto_import_date\":null},{\"id\":\"8211\",\"title\":\"Malware Distribution - 42.58.167.27\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.58.167.27\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:27\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-08 07:47:27\",\"updated_at\":\"2026-04-08 07:47:27\",\"auto_import_date\":null},{\"id\":\"8210\",\"title\":\"Malware Distribution - 58.47.16.120\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"28.1142000\",\"longitude\":\"112.9830000\",\"ip_address\":\"58.47.16.120\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:25\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Chinanet\",\"created_at\":\"2026-04-08 07:47:26\",\"updated_at\":\"2026-04-08 07:47:26\",\"auto_import_date\":null},{\"id\":\"8209\",\"title\":\"Malware Distribution - 77.247.88.124\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Albania\",\"latitude\":\"41.3253000\",\"longitude\":\"19.8184000\",\"ip_address\":\"77.247.88.124\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:24\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: Teleco First\",\"created_at\":\"2026-04-08 07:47:24\",\"updated_at\":\"2026-04-08 07:47:24\",\"auto_import_date\":null},{\"id\":\"8208\",\"title\":\"Malware Distribution - 42.232.235.86\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"42.232.235.86\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:22\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-08 07:47:22\",\"updated_at\":\"2026-04-08 07:47:22\",\"auto_import_date\":null},{\"id\":\"8207\",\"title\":\"Malware Distribution - 182.126.95.117\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.126.95.117\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:20\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-08 07:47:21\",\"updated_at\":\"2026-04-08 07:47:21\",\"auto_import_date\":null},{\"id\":\"8206\",\"title\":\"Malware Distribution - 112.248.112.236\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"112.248.112.236\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:19\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom CHINA169 Shandong Province Network\",\"created_at\":\"2026-04-08 07:47:19\",\"updated_at\":\"2026-04-08 07:47:19\",\"auto_import_date\":null},{\"id\":\"8205\",\"title\":\"Malware Distribution - 220.201.24.199\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"39.9072000\",\"longitude\":\"116.3570000\",\"ip_address\":\"220.201.24.199\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:17\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Network\",\"created_at\":\"2026-04-08 07:47:17\",\"updated_at\":\"2026-04-08 07:47:17\",\"auto_import_date\":null},{\"id\":\"8204\",\"title\":\"Malware Distribution - 109.108.38.224\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"Russia\",\"latitude\":\"57.0006000\",\"longitude\":\"40.9720000\",\"ip_address\":\"109.108.38.224\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: PJSC Rostelecom\",\"created_at\":\"2026-04-08 07:47:16\",\"updated_at\":\"2026-04-08 07:47:16\",\"auto_import_date\":null},{\"id\":\"8203\",\"title\":\"Malware Distribution - 123.5.21.145\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.5.21.145\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:14\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-08 07:47:14\",\"updated_at\":\"2026-04-08 07:47:14\",\"auto_import_date\":null},{\"id\":\"8202\",\"title\":\"Malware Distribution - 39.88.7.211\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.0610000\",\"longitude\":\"120.3814000\",\"ip_address\":\"39.88.7.211\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 10:47:12\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-08 07:47:12\",\"updated_at\":\"2026-04-08 07:47:12\",\"auto_import_date\":null},{\"id\":\"8224\",\"title\":\"North Korea's Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads\",\"description\":\"A North Korean threat operation has published malicious packages across npm, PyPI, Go Modules, crates.io, and Packagist, impersonating legitimate developer tooling. The campaign uses GitHub aliases including golangorg and aokisasakidev to distribute staged malware loaders that contact actor-controlled infrastructure, retrieve payloads from Google Drive, and deliver platform-specific second-stage malware. The loaders are hidden behind normal-looking API functions in logging and utility libraries.\",\"country\":\"Russia\",\"latitude\":\"55.7558000\",\"longitude\":\"37.6173000\",\"ip_address\":null,\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"medium\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 09:17:25\",\"source\":\"AlienVault OTX\",\"import_source\":\"manual\",\"is_auto_imported\":\"0\",\"affected_systems\":\"Indicators: 4\",\"created_at\":\"2026-04-08 14:51:26\",\"updated_at\":\"2026-04-08 14:51:26\",\"auto_import_date\":null},{\"id\":\"8201\",\"title\":\"Spam Source - 23.147.52.0\\\/24\",\"description\":\"IP range listat \\u00een Spamhaus DROP pentru activitate spam. SBL: SBL689777\",\"country\":\"United States\",\"latitude\":\"39.8032000\",\"longitude\":\"-104.7610000\",\"ip_address\":\"23.147.52.0\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-08 04:39:24\",\"source\":\"Spamhaus DROP\",\"import_source\":\"spamhaus\",\"is_auto_imported\":\"1\",\"affected_systems\":\"CIDR: 23.147.52.0\\\/24\",\"created_at\":\"2026-04-08 01:39:24\",\"updated_at\":\"2026-04-08 01:39:24\",\"auto_import_date\":null},{\"id\":\"8200\",\"title\":\"Malware Distribution - 42.56.167.101\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"42.56.167.101\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:15\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Liaoning Province Network\",\"created_at\":\"2026-04-07 19:40:15\",\"updated_at\":\"2026-04-07 19:40:15\",\"auto_import_date\":null},{\"id\":\"8199\",\"title\":\"Malware Distribution - 61.53.133.127\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.133.127\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:13\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:40:13\",\"updated_at\":\"2026-04-07 19:40:13\",\"auto_import_date\":null},{\"id\":\"8198\",\"title\":\"Malware Distribution - 219.157.246.244\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"219.157.246.244\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:11\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:40:11\",\"updated_at\":\"2026-04-07 19:40:11\",\"auto_import_date\":null},{\"id\":\"8197\",\"title\":\"Malware Distribution - 61.52.57.39\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.52.57.39\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:09\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:40:10\",\"updated_at\":\"2026-04-07 19:40:10\",\"auto_import_date\":null},{\"id\":\"8196\",\"title\":\"Malware Distribution - 182.123.208.67\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"182.123.208.67\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:08\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Henan Province Network\",\"created_at\":\"2026-04-07 19:40:08\",\"updated_at\":\"2026-04-07 19:40:08\",\"auto_import_date\":null},{\"id\":\"8195\",\"title\":\"Malware Distribution - 61.163.158.60\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7657000\",\"longitude\":\"113.7530000\",\"ip_address\":\"61.163.158.60\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:06\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:40:06\",\"updated_at\":\"2026-04-07 19:40:06\",\"auto_import_date\":null},{\"id\":\"8194\",\"title\":\"Malware Distribution - 222.140.215.72\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"222.140.215.72\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:04\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:40:05\",\"updated_at\":\"2026-04-07 19:40:05\",\"auto_import_date\":null},{\"id\":\"8193\",\"title\":\"Malware Distribution - 124.94.153.235\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"41.8048000\",\"longitude\":\"123.4330000\",\"ip_address\":\"124.94.153.235\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:03\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Liaoning Province Network\",\"created_at\":\"2026-04-07 19:40:03\",\"updated_at\":\"2026-04-07 19:40:03\",\"auto_import_date\":null},{\"id\":\"8192\",\"title\":\"Malware Distribution - 123.4.245.239\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"123.4.245.239\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:40:01\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:40:01\",\"updated_at\":\"2026-04-07 19:40:01\",\"auto_import_date\":null},{\"id\":\"8191\",\"title\":\"Malware Distribution - 27.202.245.95\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.202.245.95\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:39:59\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-07 19:39:59\",\"updated_at\":\"2026-04-07 19:39:59\",\"auto_import_date\":null},{\"id\":\"8190\",\"title\":\"Malware Distribution - 27.202.117.67\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"36.6518000\",\"longitude\":\"117.1200000\",\"ip_address\":\"27.202.117.67\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:39:58\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: China Unicom Shandong Province Network\",\"created_at\":\"2026-04-07 19:39:58\",\"updated_at\":\"2026-04-07 19:39:58\",\"auto_import_date\":null},{\"id\":\"8189\",\"title\":\"Malware Distribution - 61.53.132.250\",\"description\":\"Server utilizat pentru distribuirea de malware, detectat de URLhaus. IP-ul g\\u0103zduie\\u0219te con\\u021binut mali\\u021bios.\",\"country\":\"China\",\"latitude\":\"34.7472000\",\"longitude\":\"113.6250000\",\"ip_address\":\"61.53.132.250\",\"source_ip\":null,\"source_country\":null,\"source_latitude\":null,\"source_longitude\":null,\"target_ip\":null,\"target_country\":null,\"severity\":\"high\",\"threat_type\":\"malware\",\"industry\":\"Unknown\",\"attack_duration\":\"3\",\"is_ongoing\":\"0\",\"date_detected\":\"2026-04-07 22:39:56\",\"source\":\"abuse.ch URLhaus\",\"import_source\":\"abuse_ch\",\"is_auto_imported\":\"1\",\"affected_systems\":\"ISP: CNC Group CHINA169 Henan Province Network\",\"created_at\":\"2026-04-07 19:39:56\",\"updated_at\":\"2026-04-07 19:39:56\",\"auto_import_date\":null}];\n            var lastUpdateTime = Date.now();\n            var autoRefreshInterval;\n            var existingThreatIds = new Set();\n\n            \/\/ Track existing threats\n            threats.forEach(function(threat) {\n                existingThreatIds.add(threat.id);\n            });\n\n            \/\/ Initialize data view (NO MAP)\n            function initDataView() {\n                \/\/ Populate country filter\n                populateCountryFilter();\n\n                \/\/ Render table\n                renderThreatTable();\n                updateStatistics();\n                updateLastUpdateTime();\n\n                \/\/ Start auto-refresh every 10 seconds\n                startAutoRefresh();\n            }\n\n            \/\/ Auto-refresh function\n            function startAutoRefresh() {\n                autoRefreshInterval = setInterval(function() {\n                    fetchNewThreats();\n                }, 10000); \/\/ 10 seconds\n            }\n\n            \/\/ Fetch new threats via AJAX\n            function fetchNewThreats() {\n                jQuery.ajax({\n                    url: 'https:\/\/delve.ro\/wp-admin\/admin-ajax.php',\n                    type: 'POST',\n                    data: {\n                        action: 'gpss_get_public_threats'\n                    },\n                    success: function(response) {\n                        if (response.success && response.data) {\n                            var newThreats = response.data;\n                            var hasNewThreats = false;\n\n                            \/\/ Check for new threats\n                            newThreats.forEach(function(threat) {\n                                if (!existingThreatIds.has(threat.id)) {\n                                    hasNewThreats = true;\n                                    existingThreatIds.add(threat.id);\n                                }\n                            });\n\n                            if (hasNewThreats || newThreats.length !== threats.length) {\n                                threats = newThreats;\n                                animateStatistics();\n                                renderThreatTable(true);\n                                updateLastUpdateTime();\n                            } else {\n                                updateLastUpdateTime();\n                            }\n                        }\n                    },\n                    error: function() {\n                        console.log('Failed to fetch threat updates');\n                    }\n                });\n            }\n\n            \/\/ Update last update time display\n            function updateLastUpdateTime() {\n                var now = new Date();\n                var seconds = Math.floor((now - lastUpdateTime) \/ 1000);\n\n                var timeText;\n                if (seconds < 5) {\n                    timeText = 'acum';\n                } else if (seconds < 60) {\n                    timeText = 'acum ' + seconds + ' secunde';\n                } else {\n                    var minutes = Math.floor(seconds \/ 60);\n                    timeText = 'acum ' + minutes + ' minut' + (minutes > 1 ? 'e' : '');\n                }\n\n                document.getElementById('last-update').textContent = timeText;\n                lastUpdateTime = now;\n\n                \/\/ Update time every second\n                setTimeout(function updateTime() {\n                    var currentSeconds = Math.floor((Date.now() - lastUpdateTime) \/ 1000);\n                    if (currentSeconds < 60) {\n                        var text = currentSeconds < 5 ? 'acum' : 'acum ' + currentSeconds + ' secunde';\n                        document.getElementById('last-update').textContent = text;\n                        setTimeout(updateTime, 1000);\n                    }\n                }, 1000);\n            }\n\n            \/\/ ========== THREAT TABLE RENDERING ==========\n\n            \/\/ Render threat data as table\n            function renderThreatTable(isUpdate) {\n                var container = document.getElementById('threat-table-container');\n\n                \/\/ Apply filters\n                var severityFilter = document.getElementById('filter-severity').value;\n                var typeFilter = document.getElementById('filter-type').value;\n                var countryFilter = document.getElementById('filter-country').value;\n\n                var filteredThreats = threats.filter(function(threat) {\n                    if (severityFilter !== 'all' && threat.severity !== severityFilter) return false;\n                    if (typeFilter !== 'all' && threat.threat_type !== typeFilter) return false;\n                    if (countryFilter !== 'all' && threat.country !== countryFilter && threat.target_country !== countryFilter) return false;\n                    if (!filterByPeriod(threat)) return false;\n                    return true;\n                });\n\n                if (filteredThreats.length === 0) {\n                    container.innerHTML = '<div style=\"text-align: center; padding: 60px 20px; color: #94a3b8;\"><div style=\"font-size: 48px; margin-bottom: 16px;\">\ud83d\udd0d<\/div><div style=\"font-size: 18px; font-weight: 600;\">Nu exist\u0103 amenin\u021b\u0103ri<\/div><div style=\"font-size: 14px; margin-top: 8px;\">Modific\u0103 filtrele pentru a vedea date<\/div><\/div>';\n                    return;\n                }\n\n                \/\/ Generate table HTML\n                var html = '<table style=\"width: 100%; border-collapse: collapse; background: white; box-shadow: 0 1px 3px rgba(0,0,0,0.1); border-radius: 8px; overflow: hidden;\">';\n\n                \/\/ Table header\n                html += '<thead style=\"background: linear-gradient(135deg, #667eea 0%, #764ba2 100%); color: white;\">';\n                html += '<tr>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\ud83d\udd34 SEVERITY<\/th>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\u26a0\ufe0f TITLE<\/th>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\ud83e\udda0 TYPE<\/th>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\ud83c\udf0d COUNTRY<\/th>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\ud83d\udce1 SOURCE IP<\/th>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\ud83c\udfaf TARGET IP<\/th>';\n                html += '<th style=\"padding: 16px 12px; text-align: left; font-weight: 700; font-size: 13px;\">\ud83d\udcc5 DATE<\/th>';\n                html += '<\/tr>';\n                html += '<\/thead>';\n\n                \/\/ Table body\n                html += '<tbody>';\n                filteredThreats.forEach(function(threat, index) {\n                    var bgColor = index % 2 === 0 ? '#f8fafc' : 'white';\n                    var severityColor = {\n                        'critical': '#ef4444',\n                        'high': '#f59e0b',\n                        'medium': '#eab308',\n                        'low': '#22c55e'\n                    }[threat.severity] || '#64748b';\n\n                    var icon = getThreatIcon(threat.threat_type);\n                    var dateObj = new Date(threat.date_detected);\n                    var dateStr = dateObj.toLocaleDateString('ro-RO', { year: 'numeric', month: 'short', day: 'numeric' }) + ' ' + dateObj.toLocaleTimeString('ro-RO', { hour: '2-digit', minute: '2-digit' });\n\n                    html += '<tr style=\"background: ' + bgColor + '; border-bottom: 1px solid #e2e8f0; transition: all 0.2s; cursor: pointer;\" onmouseover=\"this.style.background=\\'#e0e7ff\\'\" onmouseout=\"this.style.background=\\'' + bgColor + '\\'\">';\n\n                    \/\/ Severity\n                    html += '<td style=\"padding: 14px 12px;\"><span style=\"background: ' + severityColor + '; color: white; padding: 6px 12px; border-radius: 6px; font-size: 11px; font-weight: 700; text-transform: uppercase; display: inline-block;\">' + threat.severity + '<\/span><\/td>';\n\n                    \/\/ Title (with tooltip for full description)\n                    html += '<td style=\"padding: 14px 12px; font-weight: 600; color: #1e293b; max-width: 300px;\" title=\"' + (threat.description || '').replace(\/\"\/g, '&quot;') + '\">' + icon + ' ' + threat.title + '<\/td>';\n\n                    \/\/ Type\n                    html += '<td style=\"padding: 14px 12px;\"><span style=\"background: #e0e7ff; color: #4f46e5; padding: 4px 10px; border-radius: 4px; font-size: 12px; font-weight: 600;\">' + threat.threat_type + '<\/span><\/td>';\n\n                    \/\/ Country\n                    html += '<td style=\"padding: 14px 12px; color: #475569;\">' + (threat.country || 'N\/A') + '<\/td>';\n\n                    \/\/ Source IP\n                    html += '<td style=\"padding: 14px 12px;\"><code style=\"background: #000; color: #10b981; padding: 4px 8px; border-radius: 4px; font-size: 12px;\">' + (threat.source_ip || '-') + '<\/code><\/td>';\n\n                    \/\/ Target IP\n                    html += '<td style=\"padding: 14px 12px;\"><code style=\"background: #000; color: #f59e0b; padding: 4px 8px; border-radius: 4px; font-size: 12px;\">' + (threat.target_ip || '-') + '<\/code><\/td>';\n\n                    \/\/ Date\n                    html += '<td style=\"padding: 14px 12px; color: #64748b; font-size: 13px;\">' + dateStr + '<\/td>';\n\n                    html += '<\/tr>';\n                });\n                html += '<\/tbody>';\n                html += '<\/table>';\n\n                \/\/ ========== MOBILE CARD LAYOUT (visible only on mobile) ==========\n                html += '<div class=\"mobile-threats-container\" style=\"display: none;\">'; \/\/ Hidden on desktop by default\n\n                filteredThreats.forEach(function(threat, index) {\n                    var severityColor = {\n                        'critical': '#ef4444',\n                        'high': '#f59e0b',\n                        'medium': '#eab308',\n                        'low': '#22c55e'\n                    }[threat.severity] || '#64748b';\n\n                    var icon = getThreatIcon(threat.threat_type);\n                    var dateObj = new Date(threat.date_detected);\n                    var dateStr = dateObj.toLocaleDateString('ro-RO', { year: 'numeric', month: 'short', day: 'numeric' }) + ' ' + dateObj.toLocaleTimeString('ro-RO', { hour: '2-digit', minute: '2-digit' });\n\n                    \/\/ Mobile card\n                    html += '<div class=\"mobile-threat-card ' + threat.severity + '\">';\n\n                    \/\/ Header with title and severity badge\n                    html += '<div class=\"mobile-threat-header\">';\n                    html += '<div class=\"mobile-threat-title\">' + icon + ' ' + threat.title + '<\/div>';\n                    html += '<div class=\"mobile-threat-severity\" style=\"background: ' + severityColor + ';\">' + threat.severity + '<\/div>';\n                    html += '<\/div>';\n\n                    \/\/ Type badge\n                    html += '<div class=\"mobile-threat-type\">' + threat.threat_type + '<\/div>';\n\n                    \/\/ Meta grid\n                    html += '<div class=\"mobile-threat-meta\">';\n\n                    \/\/ Country\n                    html += '<div class=\"mobile-meta-item\">';\n                    html += '<div class=\"mobile-meta-label\">\ud83c\udf0d Country<\/div>';\n                    html += '<div class=\"mobile-meta-value\">' + (threat.country || 'N\/A') + '<\/div>';\n                    html += '<\/div>';\n\n                    \/\/ Date\n                    html += '<div class=\"mobile-meta-item\">';\n                    html += '<div class=\"mobile-meta-label\">\ud83d\udcc5 Date<\/div>';\n                    html += '<div class=\"mobile-meta-value\">' + dateStr + '<\/div>';\n                    html += '<\/div>';\n\n                    \/\/ Source IP (if exists)\n                    if (threat.source_ip) {\n                        html += '<div class=\"mobile-meta-item\">';\n                        html += '<div class=\"mobile-meta-label\">\ud83d\udce1 Source IP<\/div>';\n                        html += '<div class=\"mobile-threat-ip source\">' + threat.source_ip + '<\/div>';\n                        html += '<\/div>';\n                    }\n\n                    \/\/ Target IP (if exists)\n                    if (threat.target_ip) {\n                        html += '<div class=\"mobile-meta-item\">';\n                        html += '<div class=\"mobile-meta-label\">\ud83c\udfaf Target IP<\/div>';\n                        html += '<div class=\"mobile-threat-ip target\">' + threat.target_ip + '<\/div>';\n                        html += '<\/div>';\n                    }\n\n                    html += '<\/div>'; \/\/ End meta grid\n                    html += '<\/div>'; \/\/ End card\n                });\n\n                html += '<\/div>'; \/\/ End mobile-threats-container\n                \/\/ ========== END MOBILE CARD LAYOUT ==========\n\n                \/\/ Add count info\n                html += '<div style=\"margin-top: 20px; padding: 15px; background: #f0f9ff; border-radius: 8px; text-align: center; color: #0369a1; font-weight: 600;\">';\n                html += '\ud83d\udcca Afi\u0219ate <strong>' + filteredThreats.length + '<\/strong> amenin\u021b\u0103ri din <strong>' + threats.length + '<\/strong> total';\n                html += '<\/div>';\n\n                container.innerHTML = html;\n            }\n\n            \/\/ ========== END THREAT TABLE RENDERING ==========\n\n            \/\/ Populate country filter from threat data\n            function populateCountryFilter() {\n                var countryCount = {};\n\n                threats.forEach(function(threat) {\n                    var country = threat.country || threat.target_country;\n                    if (country) {\n                        countryCount[country] = (countryCount[country] || 0) + 1;\n                    }\n                });\n\n                \/\/ Sort countries by count (descending)\n                var sortedCountries = Object.keys(countryCount).sort(function(a, b) {\n                    return countryCount[b] - countryCount[a];\n                });\n\n                var select = document.getElementById('filter-country');\n                sortedCountries.slice(0, 20).forEach(function(country) {\n                    var option = document.createElement('option');\n                    option.value = country;\n                    option.textContent = country + ' (' + countryCount[country] + ')';\n                    select.appendChild(option);\n                });\n            }\n\n            \/\/ Filter threats by time period\n            function filterByPeriod(threat) {\n                var periodHours = parseInt(document.getElementById('filter-period').value);\n                if (!periodHours) return true;\n\n                var threatDate = new Date(threat.date_detected);\n                var now = new Date();\n                var hoursAgo = (now - threatDate) \/ (1000 * 60 * 60);\n\n                return hoursAgo <= periodHours;\n            }\n\n            \/\/ Get threat type icon\n            function getThreatIcon(type) {\n                var icons = {\n                    'malware': '\ud83e\udda0',\n                    'phishing': '\ud83c\udfa3',\n                    'ransomware': '\ud83d\udd12',\n                    'ddos': '\u26a1',\n                    'data_breach': '\ud83d\udcbe',\n                    'apt': '\ud83c\udfaf',\n                    'zero_day': '\u26a0\ufe0f',\n                    'botnet': '\ud83e\udd16'\n                };\n                return icons[type] || '\u26a0\ufe0f';\n            }\n\n            \/\/ Update statistics\n            function updateStatistics() {\n                var stats = {\n                    critical: 0,\n                    high: 0,\n                    medium: 0,\n                    low: 0,\n                    total: threats.length\n                };\n\n                threats.forEach(function(threat) {\n                    if (stats[threat.severity] !== undefined) {\n                        stats[threat.severity]++;\n                    }\n                });\n\n                document.getElementById('stat-critical').textContent = stats.critical;\n                document.getElementById('stat-high').textContent = stats.high;\n                document.getElementById('stat-medium').textContent = stats.medium;\n                document.getElementById('stat-low').textContent = stats.low;\n                document.getElementById('stat-total').textContent = stats.total;\n            }\n\n            \/\/ Animate statistics with counter effect\n            function animateStatistics() {\n                var stats = {\n                    critical: 0,\n                    high: 0,\n                    medium: 0,\n                    low: 0,\n                    total: threats.length\n                };\n\n                threats.forEach(function(threat) {\n                    if (stats[threat.severity] !== undefined) {\n                        stats[threat.severity]++;\n                    }\n                });\n\n                \/\/ Animate each counter\n                animateCounter('stat-critical', stats.critical);\n                animateCounter('stat-high', stats.high);\n                animateCounter('stat-medium', stats.medium);\n                animateCounter('stat-low', stats.low);\n                animateCounter('stat-total', stats.total);\n            }\n\n            \/\/ Counter animation helper\n            function animateCounter(elementId, targetValue) {\n                var element = document.getElementById(elementId);\n                var currentValue = parseInt(element.textContent) || 0;\n                var difference = targetValue - currentValue;\n\n                if (difference === 0) return;\n\n                var steps = 10;\n                var stepValue = difference \/ steps;\n                var currentStep = 0;\n\n                var interval = setInterval(function() {\n                    currentStep++;\n                    currentValue += stepValue;\n\n                    if (currentStep >= steps) {\n                        element.textContent = targetValue;\n                        clearInterval(interval);\n                    } else {\n                        element.textContent = Math.round(currentValue);\n                    }\n                }, 30);\n            }\n\n            \/\/ Filter handlers - update table when filters change\n            document.getElementById('filter-severity').addEventListener('change', function() {\n                renderThreatTable();\n            });\n            document.getElementById('filter-type').addEventListener('change', function() {\n                renderThreatTable();\n            });\n            document.getElementById('filter-country').addEventListener('change', function() {\n                renderThreatTable();\n            });\n            document.getElementById('filter-period').addEventListener('change', function() {\n                renderThreatTable();\n            });\n            document.getElementById('view-mode').addEventListener('change', function() {\n                renderThreatTable();\n            });\n\n            \/\/ Clickable statistics - show detailed threat list\n            document.querySelectorAll('.clickable-stat').forEach(function(statCard) {\n                statCard.addEventListener('click', function() {\n                    var severity = this.getAttribute('data-severity');\n                    showThreatDetails(severity);\n                });\n\n                \/\/ Add hover effect\n                statCard.addEventListener('mouseenter', function() {\n                    this.style.transform = 'scale(1.05)';\n                });\n                statCard.addEventListener('mouseleave', function() {\n                    this.style.transform = 'scale(1)';\n                });\n            });\n\n            \/\/ Close details panel\n            document.getElementById('close-details').addEventListener('click', function() {\n                document.getElementById('threat-details-panel').style.display = 'none';\n            });\n\n            \/\/ Show threat details panel with filtered threats\n            function showThreatDetails(severity) {\n                var detailsPanel = document.getElementById('threat-details-panel');\n                var detailsList = document.getElementById('threat-details-list');\n                var detailsTitle = document.getElementById('details-title');\n\n                \/\/ Filter threats by severity\n                var filteredThreats = threats;\n                if (severity !== 'all') {\n                    filteredThreats = threats.filter(function(threat) {\n                        return threat.severity === severity;\n                    });\n                }\n\n                \/\/ Apply current filters (period, country, type)\n                var countryFilter = document.getElementById('filter-country').value;\n                var typeFilter = document.getElementById('filter-type').value;\n\n                filteredThreats = filteredThreats.filter(function(threat) {\n                    if (countryFilter !== 'all' && threat.country !== countryFilter && threat.target_country !== countryFilter) return false;\n                    if (typeFilter !== 'all' && threat.threat_type !== typeFilter) return false;\n                    if (!filterByPeriod(threat)) return false;\n                    return true;\n                });\n\n                \/\/ Sort by date (newest first)\n                filteredThreats.sort(function(a, b) {\n                    return new Date(b.date_detected) - new Date(a.date_detected);\n                });\n\n                \/\/ Update title\n                var severityLabel = severity === 'all' ? 'Toate' : severity.charAt(0).toUpperCase() + severity.slice(1);\n                var severityEmoji = {\n                    'critical': '\ud83d\udd34',\n                    'high': '\ud83d\udfe0',\n                    'medium': '\ud83d\udfe1',\n                    'low': '\ud83d\udfe2',\n                    'all': '\ud83d\udcca'\n                };\n                detailsTitle.textContent = (severityEmoji[severity] || '\ud83d\udcca') + ' Detalii Amenin\u021b\u0103ri ' + severityLabel + ' (' + filteredThreats.length + ')';\n\n                \/\/ Generate details HTML\n                var html = '';\n                if (filteredThreats.length === 0) {\n                    html = '<div style=\"text-align: center; padding: 40px; color: #94a3b8;\">' +\n                        '<div style=\"font-size: 48px; margin-bottom: 16px;\">\ud83d\udd0d<\/div>' +\n                        '<div style=\"font-size: 16px; font-weight: 600; margin-bottom: 8px;\">Nu s-au g\u0103sit amenin\u021b\u0103ri<\/div>' +\n                        '<div style=\"font-size: 14px;\">\u00cencearc\u0103 s\u0103 modifici filtrele<\/div>' +\n                        '<\/div>';\n                } else {\n                    filteredThreats.forEach(function(threat, index) {\n                        var severityColor = {\n                            'critical': '#ef4444',\n                            'high': '#f59e0b',\n                            'medium': '#eab308',\n                            'low': '#22c55e'\n                        };\n                        var color = severityColor[threat.severity] || '#64748b';\n\n                        var typeIcon = {\n                            'malware': '\ud83e\udda0',\n                            'phishing': '\ud83c\udfa3',\n                            'ransomware': '\ud83d\udd12',\n                            'ddos': '\u26a1',\n                            'data_breach': '\ud83d\udcbe',\n                            'apt': '\ud83c\udfaf',\n                            'zero_day': '\u26a0\ufe0f',\n                            'botnet': '\ud83e\udd16'\n                        };\n                        var icon = typeIcon[threat.threat_type] || '\u26a0\ufe0f';\n\n                        var dateObj = new Date(threat.date_detected);\n                        var dateStr = dateObj.toLocaleDateString('ro-RO', {\n                            year: 'numeric',\n                            month: 'short',\n                            day: 'numeric',\n                            hour: '2-digit',\n                            minute: '2-digit'\n                        });\n\n                        html += '<div style=\"background: ' + (index % 2 === 0 ? '#f8fafc' : 'white') + '; padding: 20px; border-left: 4px solid ' + color + '; margin-bottom: 12px; border-radius: 6px; box-shadow: 0 1px 3px rgba(0,0,0,0.1);\">';\n\n                        \/\/ Header\n                        html += '<div style=\"display: flex; justify-content: space-between; align-items: start; margin-bottom: 12px;\">';\n                        html += '<h4 style=\"margin: 0; font-size: 16px; color: #1e293b; flex: 1;\">' + icon + ' ' + threat.title + '<\/h4>';\n                        html += '<span style=\"background: ' + color + '; color: white; padding: 4px 12px; border-radius: 6px; font-size: 11px; font-weight: 700; text-transform: uppercase; white-space: nowrap; margin-left: 12px;\">' + threat.severity + '<\/span>';\n                        html += '<\/div>';\n\n                        \/\/ Description\n                        html += '<p style=\"margin: 0 0 12px 0; color: #475569; font-size: 14px; line-height: 1.6;\">' + threat.description + '<\/p>';\n\n                        \/\/ Meta info\n                        html += '<div style=\"display: flex; flex-wrap: wrap; gap: 12px; font-size: 13px; color: #64748b;\">';\n                        html += '<span style=\"background: #e0e7ff; color: #4f46e5; padding: 4px 10px; border-radius: 4px; font-weight: 600;\">' + icon + ' ' + threat.threat_type + '<\/span>';\n                        html += '<span>\ud83c\udf0d ' + (threat.country || 'N\/A') + '<\/span>';\n                        if (threat.source_ip) {\n                            html += '<span>\ud83d\udce1 ' + threat.source_ip + '<\/span>';\n                        }\n                        if (threat.target_ip) {\n                            html += '<span>\ud83c\udfaf ' + threat.target_ip + '<\/span>';\n                        }\n                        html += '<span>\ud83d\udcc5 ' + dateStr + '<\/span>';\n                        html += '<\/div>';\n\n                        \/\/ Source link if available\n                        if (threat.source_url) {\n                            html += '<div style=\"margin-top: 10px;\">';\n                            html += '<a href=\"' + threat.source_url + '\" target=\"_blank\" style=\"color: #3b82f6; text-decoration: none; font-size: 13px; font-weight: 600;\">\ud83d\udd17 Vezi surs\u0103 \u2192<\/a>';\n                            html += '<\/div>';\n                        }\n\n                        html += '<\/div>';\n                    });\n                }\n\n                detailsList.innerHTML = html;\n                detailsPanel.style.display = 'block';\n\n                \/\/ Scroll to details panel\n                detailsPanel.scrollIntoView({ behavior: 'smooth', block: 'nearest' });\n            }\n\n            document.getElementById('reset-filters').addEventListener('click', function() {\n                document.getElementById('filter-severity').value = 'all';\n                document.getElementById('filter-type').value = 'all';\n                document.getElementById('filter-country').value = 'all';\n                document.getElementById('filter-period').value = '24';\n                document.getElementById('view-mode').value = 'normal';\n                renderThreatTable();\n            });\n\n            \/\/ Initialize when document is ready\n            if (document.readyState === 'loading') {\n                document.addEventListener('DOMContentLoaded', initDataView);\n            } else {\n                initDataView();\n            }\n        })();\n        <\/script>\n        \n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fd0b115 e-flex e-con-boxed e-con e-parent\" data-id=\"fd0b115\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5721ba9 elementor-widget elementor-widget-heading\" data-id=\"5721ba9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Free Consultation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8231ea9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8231ea9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e8554cc\" data-id=\"e8554cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f82c857 elementor-widget elementor-widget-template\" data-id=\"f82c857\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"section\" data-elementor-id=\"2951\" class=\"elementor elementor-2951\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0925d25 elementor-section-full_width elementor-section-content-space-between elementor-section-height-default elementor-section-height-default\" data-id=\"0925d25\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3217a40\" data-id=\"3217a40\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b710185 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"b710185\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber security services &amp;  IT Services<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0244df elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"f0244df\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f9824f8\" data-id=\"f9824f8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6bdb0c9 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6bdb0c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5e92879\" data-id=\"5e92879\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c4415b elementor-widget elementor-widget-text-editor\" data-id=\"1c4415b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We&#8217;re happy to answer any questions you may have and help you determine which of our services best fit your needs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3cc6c7f elementor-widget elementor-widget-button\" data-id=\"3cc6c7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:18003568933\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call us at:  +1 31 234 00 896<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-661fb38 elementor-widget elementor-widget-heading\" data-id=\"661fb38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Your benefits:<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8173d70 elementor-widget__width-auto elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"8173d70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Client-oriented<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Independent<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Competent<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53c75d0 elementor-widget__width-auto elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"53c75d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Results-driven<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Problem-solving <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-check-box\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Transparent<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89f0d85 elementor-widget elementor-widget-heading\" data-id=\"89f0d85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">What happens next?<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5da5408 elementor-section-full_width elementor-section-content-middle elementor-section-height-default elementor-section-height-default\" data-id=\"5da5408\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-b8421a4 elementor-invisible\" data-id=\"b8421a4\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3daf07b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3daf07b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">1<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135e6b2 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"135e6b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We Schedule a call at your convenience\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-9f0e556\" data-id=\"9f0e556\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8340781 elementor-widget__width-auto elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"8340781\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:300}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"61\" viewBox=\"0 0 12 61\"><path d=\"m.37.6.95-.3 10.21 30.62L1.31 60.57l-.95-.33 10.11-29.32z\" fill=\"\" fill-rule=\"nonzero\" fill-opacity=\"\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-0dcedc2 elementor-invisible\" data-id=\"0dcedc2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-577d59b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"577d59b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">2<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fba0314 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"fba0314\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We do a discovery and consulting meting\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-74c0b3b\" data-id=\"74c0b3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5b2107 elementor-widget__width-auto elementor-view-default elementor-invisible elementor-widget elementor-widget-icon\" data-id=\"b5b2107\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;,&quot;_animation_delay&quot;:500}\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"61\" viewBox=\"0 0 12 61\"><path d=\"m.37.6.95-.3 10.21 30.62L1.31 60.57l-.95-.33 10.11-29.32z\" fill=\"\" fill-rule=\"nonzero\" fill-opacity=\"\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-41214d0 elementor-invisible\" data-id=\"41214d0\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:600}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-be6d1e1 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"be6d1e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<span class=\"elementor-heading-title elementor-size-default\">3<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bb9b6e elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"1bb9b6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We prepare a proposal\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9a1c1b5\" data-id=\"9a1c1b5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45d8aa6 elementor-widget elementor-widget-heading\" data-id=\"45d8aa6\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"form\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Schedule a Free Consultation<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae7df5c elementor-widget__width-auto elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"ae7df5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"vamtamtheme- vamtam-theme-arrow-il\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6706deb elementor-widget__width-inherit elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6706deb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f361fbd elementor-button-align-start elementor-widget elementor-widget-form\" data-id=\"f361fbd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Next&quot;,&quot;step_previous_label&quot;:&quot;Previous&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Schedule a Free Consultation\" aria-label=\"Schedule a Free Consultation\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"2951\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"f361fbd\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"146\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-form_free_consultation_first_name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-form_free_consultation_first_name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tFirst name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[form_free_consultation_first_name]\" id=\"form-field-form_free_consultation_first_name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-form_free_consultation_last_name elementor-col-50 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-form_free_consultation_last_name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tLast name\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[form_free_consultation_last_name]\" id=\"form-field-form_free_consultation_last_name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-form_free_consultation_company_name elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-form_free_consultation_company_name\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tComapny \/ Organization\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[form_free_consultation_company_name]\" id=\"form-field-form_free_consultation_company_name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-form_free_email elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-form_free_email\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tCompany email\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[form_free_email]\" id=\"form-field-form_free_email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-tel elementor-field-group elementor-column elementor-field-group-form_free_consultation_phone elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-form_free_consultation_phone\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tPhone\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<input size=\"1\" type=\"tel\" name=\"form_fields[form_free_consultation_phone]\" id=\"form-field-form_free_consultation_phone\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" pattern=\"[0-9()#&amp;+*-=.]+\" title=\"Only numbers and phone characters (#, -, *, etc) are accepted.\">\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-select elementor-field-group elementor-column elementor-field-group-form_free_topic elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-form_free_topic\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tHow Can We Help You?\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field elementor-select-wrapper remove-before \">\n\t\t\t<div class=\"select-caret-down-wrapper\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-caret-down\"><\/i>\t\t\t<\/div>\n\t\t\t<select name=\"form_fields[form_free_topic]\" id=\"form-field-form_free_topic\" class=\"elementor-field-textual elementor-size-sm\">\n\t\t\t\t\t\t\t\t\t<option value=\"Select Option\">Select Option<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Managed Services\">Managed Services<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"IT Consulting &amp; Advisory\">IT Consulting &amp; Advisory<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Cyber Security\">Cyber Security<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Web Development\">Web Development<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Mobile Development\">Mobile Development<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Cloud Services\">Cloud Services<\/option>\n\t\t\t\t\t\t\t\t\t<option value=\"Other\">Other<\/option>\n\t\t\t\t\t\t\t<\/select>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-textarea elementor-field-group elementor-column elementor-field-group-message elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-message\" class=\"elementor-field-label\">\n\t\t\t\t\t\t\t\tMessage\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t<textarea class=\"elementor-field-textual elementor-field  elementor-size-sm\" name=\"form_fields[message]\" id=\"form-field-message\" rows=\"4\" placeholder=\"To better assist you, please describe how we can help...\"><\/textarea>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_13272ad]\" id=\"form-field-field_13272ad\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Consulta\u021bie Gratuit\u0103<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-992345","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/pages\/992345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/comments?post=992345"}],"version-history":[{"count":59,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/pages\/992345\/revisions"}],"predecessor-version":[{"id":992411,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/pages\/992345\/revisions\/992411"}],"wp:attachment":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/media?parent=992345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}