x.com Open in urlscan Pro
104.244.42.193  Public Scan

Submitted URL: https://t.co/2xJ76g7b7R
Effective URL: https://x.com/tehtris/status/1679426359817281541/photo/1?mx=2
Submission: On November 21 via api from IN — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

JAVASCRIPT IS NOT AVAILABLE.

We’ve detected that JavaScript is disabled in this browser. Please enable
JavaScript or switch to a supported browser to continue using x.com. You can see
a list of supported browsers in our Help Center.

Help Center

Terms of Service Privacy Policy Cookie Policy Imprint Ads info © 2024 X Corp.

Don’t miss what’s happening
People on X are the first to know.
Log in
Sign up
Welcome to x.com!
We are letting you know that we are changing our URL, but your privacy and data
protection settings remain the same.
For more details, see our Privacy Policy:
https://x.com/en/privacy



Settings


POST


See new posts



CONVERSATION

TEHTRIS

@tehtris

#ThreatIntel report: CVE-2023-27350 PaperCut exploit attempt CVE-2017-7577
exploit attempts Recent CVE-2023-27997 exploit feasibility study Bruteforce
attack on honeypot Top ports/protocols targeted by threat actors #CyberSecurity
https://tehtris.com/en/blog/our-selection-of-alerts-on-honeypots-report-14-july-2023/?mtm_campaign=article-blog&mtm_source=tw&mtm_medium=cm&mtm_content=honeypots-14…
Cyber Threat Alliance and 9 others

2:43 AM · Jul 13, 2023
·
1,015
Views

3
Reposts
1
Quote
6
Likes


NEW TO X?


Sign up now to get your own personalized timeline!
Sign up with Apple
Create account
By signing up, you agree to the Terms of Service and Privacy Policy, including
Cookie Use.

Something went wrong. Try reloading.
Retry
Terms of ServicePrivacy PolicyCookie PolicyAccessibilityAds info
More
© 2024 X Corp.