Vercel
tcp/443
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09c778888b4778888b4a904891d37b606945759f483f92ffc0b
Found 40 files trough .DS_Store spidering: /abuse.ch.png /advinfra2.png /android-chrome-192x192.png /android-chrome-512x512.png /apple-touch-icon.png /browserconfig.xml /censys.jpg /ciso_image_1.webp /ciso_image_2.webp /ciso_image_3.webp /ciso_main.png /Course-PEN-300.png /Course-TH-200.png /cozy_bear.png /cpts.webp /EXPDEV /EXPDEV/simple-buffer-overflow-practice-01 /EXPDEV/simple-buffer-overflow-practice-02 /fancy_bear.png /favicon-16x16.png /favicon-32x32.png /favicon.ico /HTB Certified Penetration Testing Specialist_page-0001.jpg /lv58zP0Nc1rigRR47QTY0v21HfHBkBGe.jpg /mid0.png /oodaloop.png /osep_blackhat.jpeg /osep_cert.png /osep_course_progress.png /osth_image_1.png /osth_image_2.png /osth_image_3.png /Pasted image 20250605215752.png /rus_disinfo.webp /SDD.png /site.webmanifest /sojubear_logo.jpg /spec_kit.webp /SPTI.png /wat.png
Severity: low
Fingerprint: 5f32cf5d6962f09cf35cbfb3f35cbfb3aae63d3c921635f93c2b631ed656b883
Found 29 files trough .DS_Store spidering: /abuse.ch.png /advinfra2.png /censys.jpg /ciso_image_1.webp /ciso_image_2.webp /ciso_image_3.webp /ciso_main.png /Course-PEN-300.png /Course-TH-200.png /cozy_bear.png /cpts.webp /fancy_bear.png /HTB Certified Penetration Testing Specialist_page-0001.jpg /lv58zP0Nc1rigRR47QTY0v21HfHBkBGe.jpg /mid0.png /oodaloop.png /osep_blackhat.jpeg /osep_cert.png /osep_course_progress.png /osth_image_1.png /osth_image_2.png /osth_image_3.png /Pasted image 20250605215752.png /rus_disinfo.webp /SDD.png /sojubear_logo.jpg /spec_kit.webp /SPTI.png /wat.png
Severity: low
Fingerprint: 5f32cf5d6962f09c7c3d3e457c3d3e45ad8e45ca93884abb88e8802c93aa6edf
Found 30 files trough .DS_Store spidering: /abuse.ch.png /advinfra2.png /censys.jpg /ciso_image_1.webp /ciso_image_2.webp /ciso_image_3.webp /ciso_main.png /Course-PEN-300.png /Course-TH-200.png /cozy_bear.png /cpts.webp /fancy_bear.png /favicons /HTB Certified Penetration Testing Specialist_page-0001.jpg /lv58zP0Nc1rigRR47QTY0v21HfHBkBGe.jpg /mid0.png /oodaloop.png /osep_blackhat.jpeg /osep_cert.png /osep_course_progress.png /osth_image_1.png /osth_image_2.png /osth_image_3.png /Pasted image 20250605215752.png /rus_disinfo.webp /SDD.png /sojubear_logo.jpg /spec_kit.webp /SPTI.png /wat.png
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09c778888b4778888b4a904891d37b606945759f483f92ffc0b
Found 40 files trough .DS_Store spidering: /abuse.ch.png /advinfra2.png /android-chrome-192x192.png /android-chrome-512x512.png /apple-touch-icon.png /browserconfig.xml /censys.jpg /ciso_image_1.webp /ciso_image_2.webp /ciso_image_3.webp /ciso_main.png /Course-PEN-300.png /Course-TH-200.png /cozy_bear.png /cpts.webp /EXPDEV /EXPDEV/simple-buffer-overflow-practice-01 /EXPDEV/simple-buffer-overflow-practice-02 /fancy_bear.png /favicon-16x16.png /favicon-32x32.png /favicon.ico /HTB Certified Penetration Testing Specialist_page-0001.jpg /lv58zP0Nc1rigRR47QTY0v21HfHBkBGe.jpg /mid0.png /oodaloop.png /osep_blackhat.jpeg /osep_cert.png /osep_course_progress.png /osth_image_1.png /osth_image_2.png /osth_image_3.png /Pasted image 20250605215752.png /rus_disinfo.webp /SDD.png /site.webmanifest /sojubear_logo.jpg /spec_kit.webp /SPTI.png /wat.png
Severity: low
Fingerprint: 5f32cf5d6962f09cf35cbfb3f35cbfb3aae63d3c921635f93c2b631ed656b883
Found 29 files trough .DS_Store spidering: /abuse.ch.png /advinfra2.png /censys.jpg /ciso_image_1.webp /ciso_image_2.webp /ciso_image_3.webp /ciso_main.png /Course-PEN-300.png /Course-TH-200.png /cozy_bear.png /cpts.webp /fancy_bear.png /HTB Certified Penetration Testing Specialist_page-0001.jpg /lv58zP0Nc1rigRR47QTY0v21HfHBkBGe.jpg /mid0.png /oodaloop.png /osep_blackhat.jpeg /osep_cert.png /osep_course_progress.png /osth_image_1.png /osth_image_2.png /osth_image_3.png /Pasted image 20250605215752.png /rus_disinfo.webp /SDD.png /sojubear_logo.jpg /spec_kit.webp /SPTI.png /wat.png
Severity: low
Fingerprint: 5f32cf5d6962f09c7c3d3e457c3d3e45ad8e45ca93884abb88e8802c93aa6edf
Found 30 files trough .DS_Store spidering: /abuse.ch.png /advinfra2.png /censys.jpg /ciso_image_1.webp /ciso_image_2.webp /ciso_image_3.webp /ciso_main.png /Course-PEN-300.png /Course-TH-200.png /cozy_bear.png /cpts.webp /fancy_bear.png /favicons /HTB Certified Penetration Testing Specialist_page-0001.jpg /lv58zP0Nc1rigRR47QTY0v21HfHBkBGe.jpg /mid0.png /oodaloop.png /osep_blackhat.jpeg /osep_cert.png /osep_course_progress.png /osth_image_1.png /osth_image_2.png /osth_image_3.png /Pasted image 20250605215752.png /rus_disinfo.webp /SDD.png /sojubear_logo.jpg /spec_kit.webp /SPTI.png /wat.png
Open service 216.150.1.129:443 · www.sojubear.dev
2026-01-09 17:12
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 808236 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40877 Content-Type: text/html; charset=utf-8 Date: Fri, 09 Jan 2026 17:12:40 GMT Etag: "b5168e05461b7560343bc6c8a4554cb8" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: fra1::v2g8f-1767978760579-8794af896104 Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/0b4d5252fada7b07.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/558-75c022ee7aa24c17.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/259-f3281228a08f0875.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.1:443 · sojubear.dev
2026-01-08 23:19
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 742370 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40877 Content-Type: text/html; charset=utf-8 Date: Thu, 08 Jan 2026 23:19:44 GMT Etag: "b5168e05461b7560343bc6c8a4554cb8" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: lhr1::5ngzb-1767914384620-09c02d86a5ac Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/0b4d5252fada7b07.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/558-75c022ee7aa24c17.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/259-f3281228a08f0875.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.129:443 · www.sojubear.dev
2026-01-02 21:49
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 220067 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40877 Content-Type: text/html; charset=utf-8 Date: Fri, 02 Jan 2026 21:49:52 GMT Etag: "b5168e05461b7560343bc6c8a4554cb8" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: iad1::8dng8-1767390592363-ad5b6c10120c Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/0b4d5252fada7b07.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/558-75c022ee7aa24c17.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/259-f3281228a08f0875.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.1:443 · sojubear.dev
2026-01-01 22:17
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 133823 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40877 Content-Type: text/html; charset=utf-8 Date: Thu, 01 Jan 2026 22:17:17 GMT Etag: "b5168e05461b7560343bc6c8a4554cb8" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: fra1::fvgcx-1767305837148-7ca123e40a07 Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/0b4d5252fada7b07.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/558-75c022ee7aa24c17.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/259-f3281228a08f0875.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_B8CyrTJQHVXXoy2XVLdv7En3uJvv" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.1:443 · sojubear.dev
2025-12-30 06:29
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 746304 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40909 Content-Type: text/html; charset=utf-8 Date: Tue, 30 Dec 2025 06:29:39 GMT Etag: "e3427bdf433aadb8720ff040de3923ec" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: fra1::sfx69-1767076179788-5c9dcaaf4442 Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/dd9da63748b4ea0a.css?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/558-47116a859aef6919.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/259-64a8b04001f87e24.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.129:443 · www.sojubear.dev
2025-12-22 22:26
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 98566 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40909 Content-Type: text/html; charset=utf-8 Date: Mon, 22 Dec 2025 22:26:29 GMT Etag: "e3427bdf433aadb8720ff040de3923ec" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: iad1::7mq5m-1766442389970-f10ae366c7ec Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/dd9da63748b4ea0a.css?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/558-47116a859aef6919.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/259-64a8b04001f87e24.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.1:443 · sojubear.dev
2025-12-22 19:47
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 102949 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40909 Content-Type: text/html; charset=utf-8 Date: Mon, 22 Dec 2025 19:47:04 GMT Etag: "e3427bdf433aadb8720ff040de3923ec" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: iad1::m2jrg-1766432824250-c3b7dc3df642 Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/dd9da63748b4ea0a.css?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/558-47116a859aef6919.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/259-64a8b04001f87e24.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_5q5cUXk8iKv2hXqzkyXZG1oXmwiE" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig
Open service 216.150.1.129:443 · www.sojubear.dev
2025-12-21 04:52
HTTP/1.1 200 OK Accept-Ranges: bytes Access-Control-Allow-Origin: * Age: 389363 Cache-Control: public, max-age=0, must-revalidate Content-Disposition: inline Content-Length: 40909 Content-Type: text/html; charset=utf-8 Date: Sun, 21 Dec 2025 04:52:42 GMT Etag: "cd69947e19a6ec8a1d8397867fa3beae" Server: Vercel Strict-Transport-Security: max-age=63072000 Vary: RSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Router-Segment-Prefetch X-Matched-Path: / X-Nextjs-Prerender: 1 X-Nextjs-Stale-Time: 4294967294 X-Vercel-Cache: HIT X-Vercel-Id: bom1::lzjz5-1766292762591-fbbac1d2437d Connection: close Page title: SOJUBEAR <!DOCTYPE html><html lang="en" class="dark"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="preload" href="/_next/static/media/028c0d39d2e8f589-s.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="preload" href="/_next/static/media/5b01f339abf2f1a5.p.woff2" as="font" crossorigin="" type="font/woff2"/><link rel="stylesheet" href="/_next/static/css/dd9da63748b4ea0a.css?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" data-precedence="next"/><link rel="stylesheet" href="/_next/static/css/6ad9841b43ad2bc9.css?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" data-precedence="next"/><link rel="preload" as="script" fetchPriority="low" href="/_next/static/chunks/webpack-ded7810c6cfaa064.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB"/><script src="/_next/static/chunks/87393535-47a74a6d6c1db530.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/558-ebfc6df75a19c828.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/main-app-df6c0805a9c08893.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/198-a856f6ac265ecffd.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/174-ad7a2eddc4843b63.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/app/layout-b30e4350bef84cd2.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/259-dc1c57a289165d6d.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><script src="/_next/static/chunks/app/page-e6321916f7f68eb9.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" async=""></script><meta name="next-size-adjust" content=""/><title>SOJUBEAR</title><meta name="description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="author" content="Sojubear"/><meta name="keywords" content="cybersecurity,threat intelligence,penetration testing,OSEP,OSCP,censys,adversary hunting,security research"/><meta name="creator" content="Sojubear"/><meta name="publisher" content="SOJUBEAR"/><meta name="robots" content="index, follow"/><meta name="googlebot" content="index, follow, max-video-preview:-1, max-image-preview:large, max-snippet:-1"/><link rel="canonical" href="https://sojubear.dev"/><meta name="format-detection" content="telephone=no, address=no, email=no"/><meta property="og:title" content="SOJUBEAR"/><meta property="og:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta property="og:url" content="https://sojubear.dev"/><meta property="og:site_name" content="SOJUBEAR"/><meta property="og:locale" content="en_US"/><meta property="og:image" content="https://sojubear.dev/sojubear_logo.jpg"/><meta property="og:image:width" content="1200"/><meta property="og:image:height" content="630"/><meta property="og:image:alt" content="SOJUBEAR"/><meta property="og:type" content="website"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:creator" content="@sojubear"/><meta name="twitter:title" content="SOJUBEAR"/><meta name="twitter:description" content="A cybersecurity and threat intelligence blog by Sojubear. Expert insights on penetration testing, adversary infrastructure hunting, and security research."/><meta name="twitter:image" content="https://sojubear.dev/sojubear_logo.jpg"/><script src="/_next/static/chunks/polyfills-42372ed130431b0a.js?dpl=dpl_4X2bXd1uy1csSwWBZBArPD3KFhpB" noModule=""></script></head><body class="font-sans __variable_fb8f2c __variable_f910ec antialiased"><!--$--><nav class="border-b border-border bg-background/95 backdrop-blur supports-[backdrop-filter]:bg-background/60 sticky top-0 z-50"><div class="container mx-auto px-4 sm:px-6 lg:px-8"><div class="flex h-16 items-center justify-between"><a class="text-xl font-semibold tracking-tig