Dark | Light
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

# ![@NoblemanPartoh Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::866023838248833028.png) @NoblemanPartoh Patric

Patric posts on X about splunk, level, php, command the most. They currently have XX followers and X posts still getting attention that total X engagements in the last XX hours.

### Engagements: X [#](/creator/twitter::866023838248833028/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::866023838248833028/c:line/m:interactions.svg)

- X Months XX +224%
- X Year XX +50%

### Mentions: X [#](/creator/twitter::866023838248833028/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::866023838248833028/c:line/m:posts_active.svg)


### Followers: XX [#](/creator/twitter::866023838248833028/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::866023838248833028/c:line/m:followers.svg)

- X Months XX +1.40%

### CreatorRank: undefined [#](/creator/twitter::866023838248833028/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::866023838248833028/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  XX%

**Social topic influence**
[splunk](/topic/splunk) 50%, [level](/topic/level) 25%, [php](/topic/php) 25%, [command](/topic/command) 25%, [ip](/topic/ip) 25%, [chain](/topic/chain) 25%, [logs](/topic/logs) 25%, [ips](/topic/ips) XX%

**Top accounts mentioned or mentioned by**
[@splunk](/creator/undefined) [@tryhackme](/creator/undefined)
### Top Social Posts
Top posts by engagements in the last XX hours

"Anomaly Detection We have detected use of low level tools like curl and wget Upload of a .php file (webshell runner) and Download of passwd file which stores hashed passwords. Security is #proactive not reactive. @splunk @tryhackme #CyberSecurityAwareness"  
[X Link](https://x.com/NoblemanPartoh/status/1998868315360670090)  2025-12-10T21:31Z XX followers, XX engagements


"Tracing Attack Chain Remote Code Execution happens with command 'shell.phpcmd=./bunnylock.bin' executed on our server. Firewall logs of server ip show outbound C2 communications"  
[X Link](https://x.com/NoblemanPartoh/status/1998868321413087407)  2025-12-10T21:31Z XX followers, XX engagements


"Your first line of defense is ability to see whats happening in your systems. This is pro-active approach taking actions before: #ActNow Security analysts use SIEM tools to: Interpreting custom log data. Filtering for suspicious IP's. Trace down attack chain"  
[X Link](https://x.com/NoblemanPartoh/status/1998868309195038979)  2025-12-10T21:31Z XX followers, XX engagements


"This is a live lab of @tryhackme #adventofcyber2025 using @splunk to triage through an attack. #securityanayst #security #CyberSecurity #HackingStory #CyberWar #Anonymous"  
[X Link](https://x.com/NoblemanPartoh/status/1998868325582123295)  2025-12-10T21:32Z XX followers, XX engagements

[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]

@NoblemanPartoh Avatar @NoblemanPartoh Patric

Patric posts on X about splunk, level, php, command the most. They currently have XX followers and X posts still getting attention that total X engagements in the last XX hours.

Engagements: X #

Engagements Line Chart

  • X Months XX +224%
  • X Year XX +50%

Mentions: X #

Mentions Line Chart

Followers: XX #

Followers Line Chart

  • X Months XX +1.40%

CreatorRank: undefined #

CreatorRank Line Chart

Social Influence

Social category influence technology brands XX%

Social topic influence splunk 50%, level 25%, php 25%, command 25%, ip 25%, chain 25%, logs 25%, ips XX%

Top accounts mentioned or mentioned by @splunk @tryhackme

Top Social Posts

Top posts by engagements in the last XX hours

"Anomaly Detection We have detected use of low level tools like curl and wget Upload of a .php file (webshell runner) and Download of passwd file which stores hashed passwords. Security is #proactive not reactive. @splunk @tryhackme #CyberSecurityAwareness"
X Link 2025-12-10T21:31Z XX followers, XX engagements

"Tracing Attack Chain Remote Code Execution happens with command 'shell.phpcmd=./bunnylock.bin' executed on our server. Firewall logs of server ip show outbound C2 communications"
X Link 2025-12-10T21:31Z XX followers, XX engagements

"Your first line of defense is ability to see whats happening in your systems. This is pro-active approach taking actions before: #ActNow Security analysts use SIEM tools to: Interpreting custom log data. Filtering for suspicious IP's. Trace down attack chain"
X Link 2025-12-10T21:31Z XX followers, XX engagements

"This is a live lab of @tryhackme #adventofcyber2025 using @splunk to triage through an attack. #securityanayst #security #CyberSecurity #HackingStory #CyberWar #Anonymous"
X Link 2025-12-10T21:32Z XX followers, XX engagements

@NoblemanPartoh
/creator/twitter::NoblemanPartoh