Event JSON
{
"id": "365f7b86e322547711eec4de810d0ccbca7b74f310f23af9cb824cf84363cc90",
"pubkey": "93a2808727d996d6d2023059db190583df66981b6ec3e35187ab9fc1cc8e8928",
"created_at": 1734671035,
"kind": 1,
"tags": [
[
"p",
"74d972ae87ff9199eb1e4aec71152d6c71d05eb26fa09aedbba04eca7c4ffc93",
"wss://relay.mostr.pub"
],
[
"p",
"979a28fa43702f9be4e468836a5b120cc4265237f4295fcb4a9b28e2a71d1c6b",
"wss://relay.mostr.pub"
],
[
"e",
"fa3adde36bf2635677c97611ac7d46a13c69064a42754845f6d9a2352ceebe94",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/bontchev/statuses/113683400985531633",
"activitypub"
]
],
"content": "nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqwnvh9t58l7gen6c7ftk8z9fdd3caqh4jd7sf4mdm5p8v5lz0ljfs9nkxpq \"Targeting\"? Mirai doesn't \"target\" anything - it just sprays the Internet for services listening to Telnet and SSH ports and accepting any of its list of default or often-used login credentials.",
"sig": "d01cff63f1231dbad67d70fe2a9037a704946776942684720ca53b9316a013b7606886f71461d6cce5ac81b980c5401dd38d69c701afb67cde9c93912ab67d15"
}