[{"urls": [{"server": ["122.114.8.235", "China", null, "Zhengzhou GIANT Computer Network Technology Co., Ltd\nRoom 703,Building 2,Xinghua Edifice, Hanghai Road, Jingkai District,Zhengzhou", 4837], "datetime": "21.10.2025 14:22:27", "url": ["122.114.8.235:8443", null]}, {"server": ["104.18.0.218", "United States", "San Francisco", "Cloudflare, Inc.", 13335], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr", null]}, {"server": ["104.18.1.218", "United States", "San Francisco", "Cloudflare, Inc.", 13335], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr", null]}, {"server": ["2606:4700::6812:1da", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr", null]}, {"server": ["2606:4700::6812:da", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr", null]}, {"server": ["47.242.125.238", "United States", "San Mateo", "Alibaba Cloud LLC", 45102], "datetime": "21.10.2025 15:15:57", "url": ["whois.eranet.com", null]}, {"server": ["92.113.23.158", "Germany", null, null, 47583], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com", null]}, {"server": ["92.113.16.233", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com", null]}, {"server": ["2a02:4780:43:4eb0:9b80:4d6c:e6e8:1250", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com", null]}, {"server": ["2a02:4780:42:ab74:a259:93f6:b0ea:aee6", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com", null]}, {"server": null, "datetime": "21.10.2025 15:15:57", "url": ["catcompany.info", null]}, {"server": ["104.18.0.218", "United States", "San Francisco", "Cloudflare, Inc.", 13335], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr/actualites/252496421/Ces-mysterieuses-entreprises-qui-se-font-attribuer-des-b...", null]}, {"server": ["104.18.1.218", "United States", "San Francisco", "Cloudflare, Inc.", 13335], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr/actualites/252496421/Ces-mysterieuses-entreprises-qui-se-font-attribuer-des-b...", null]}, {"server": ["2606:4700::6812:1da", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr/actualites/252496421/Ces-mysterieuses-entreprises-qui-se-font-attribuer-des-b...", null]}, {"server": ["2606:4700::6812:da", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["www.lemagit.fr/actualites/252496421/Ces-mysterieuses-entreprises-qui-se-font-attribuer-des-b...", null]}, {"server": ["92.113.23.158", "Germany", null, null, 47583], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com/bearhost-bolts-but-the-investigation-is-just-beginning/", null]}, {"server": ["92.113.16.233", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com/bearhost-bolts-but-the-investigation-is-just-beginning/", null]}, {"server": ["2a02:4780:43:4eb0:9b80:4d6c:e6e8:1250", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com/bearhost-bolts-but-the-investigation-is-just-beginning/", null]}, {"server": ["2a02:4780:42:ab74:a259:93f6:b0ea:aee6", null, null, null, null], "datetime": "21.10.2025 15:15:57", "url": ["decodecybercrime.com/bearhost-bolts-but-the-investigation-is-just-beginning/", null]}, {"server": null, "datetime": "21.10.2025 15:15:57", "url": null}], "samples": [], "date": "21.10.2025"}]