[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@NoblemanPartoh Avatar @NoblemanPartoh Patric

Patric posts on X about splunk, ips, level, php the most. They currently have XX followers and X posts still getting attention that total XX engagements in the last XX hours.

Engagements: XX #

Engagements Line Chart

Mentions: X #

Mentions Line Chart

Followers: XX #

Followers Line Chart

CreatorRank: undefined #

CreatorRank Line Chart

Social Influence

Social category influence technology brands

Social topic influence splunk #58, ips, level, php, command, ip, chain, logs

Top accounts mentioned or mentioned by @splunk @tryhackme @statehousekenya @kinggeejoo

Top Social Posts

Top posts by engagements in the last XX hours

"Your first line of defense is ability to see whats happening in your systems. This is pro-active approach taking actions before: #ActNow Security analysts use SIEM tools to: Interpreting custom log data. Filtering for suspicious IP's. Trace down attack chain"
X Link 2025-12-10T21:31Z XX followers, XX engagements

"Anomaly Detection We have detected use of low level tools like curl and wget Upload of a .php file (webshell runner) and Download of passwd file which stores hashed passwords. Security is #proactive not reactive. @splunk @tryhackme #CyberSecurityAwareness"
X Link 2025-12-10T21:31Z XX followers, XX engagements

"Tracing Attack Chain Remote Code Execution happens with command 'shell.phpcmd=./bunnylock.bin' executed on our server. Firewall logs of server ip show outbound C2 communications"
X Link 2025-12-10T21:31Z XX followers, XX engagements

"This is a live lab of @tryhackme #adventofcyber2025 using @splunk to triage through an attack. #securityanayst #security #CyberSecurity #HackingStory #CyberWar #Anonymous"
X Link 2025-12-10T21:32Z XX followers, XX engagements