Total Repos
Victim Records
Env Tokens
Unique Hosts
Infection Timeline
Platform Distribution
Secret Types Distribution
Data Explorer
Since the infection doesn't have a clear "domain" or affiliation, we found the most logical way to identify compromised machines is by searching hostnames. Note: some hostnames may not be unique. If you need access to search the full dataset (not the optimized version shown here), reach out and we can help check specific IOCs.
| Type | Hostname | Category |
|---|