[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @NoblemanPartoh Patric Patric posts on X about splunk, level, php, command the most. They currently have XX followers and X posts still getting attention that total X engagements in the last XX hours. ### Engagements: X [#](/creator/twitter::866023838248833028/interactions)  - X Months XX +224% - X Year XX +50% ### Mentions: X [#](/creator/twitter::866023838248833028/posts_active)  ### Followers: XX [#](/creator/twitter::866023838248833028/followers)  - X Months XX +1.40% ### CreatorRank: undefined [#](/creator/twitter::866023838248833028/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) XX% **Social topic influence** [splunk](/topic/splunk) 50%, [level](/topic/level) 25%, [php](/topic/php) 25%, [command](/topic/command) 25%, [ip](/topic/ip) 25%, [chain](/topic/chain) 25%, [logs](/topic/logs) 25%, [ips](/topic/ips) XX% **Top accounts mentioned or mentioned by** [@splunk](/creator/undefined) [@tryhackme](/creator/undefined) ### Top Social Posts Top posts by engagements in the last XX hours "Anomaly Detection We have detected use of low level tools like curl and wget Upload of a .php file (webshell runner) and Download of passwd file which stores hashed passwords. Security is #proactive not reactive. @splunk @tryhackme #CyberSecurityAwareness" [X Link](https://x.com/NoblemanPartoh/status/1998868315360670090) 2025-12-10T21:31Z XX followers, XX engagements "Tracing Attack Chain Remote Code Execution happens with command 'shell.phpcmd=./bunnylock.bin' executed on our server. Firewall logs of server ip show outbound C2 communications" [X Link](https://x.com/NoblemanPartoh/status/1998868321413087407) 2025-12-10T21:31Z XX followers, XX engagements "Your first line of defense is ability to see whats happening in your systems. This is pro-active approach taking actions before: #ActNow Security analysts use SIEM tools to: Interpreting custom log data. Filtering for suspicious IP's. Trace down attack chain" [X Link](https://x.com/NoblemanPartoh/status/1998868309195038979) 2025-12-10T21:31Z XX followers, XX engagements "This is a live lab of @tryhackme #adventofcyber2025 using @splunk to triage through an attack. #securityanayst #security #CyberSecurity #HackingStory #CyberWar #Anonymous" [X Link](https://x.com/NoblemanPartoh/status/1998868325582123295) 2025-12-10T21:32Z XX followers, XX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@NoblemanPartoh PatricPatric posts on X about splunk, level, php, command the most. They currently have XX followers and X posts still getting attention that total X engagements in the last XX hours.
Social category influence technology brands XX%
Social topic influence splunk 50%, level 25%, php 25%, command 25%, ip 25%, chain 25%, logs 25%, ips XX%
Top accounts mentioned or mentioned by @splunk @tryhackme
Top posts by engagements in the last XX hours
"Anomaly Detection We have detected use of low level tools like curl and wget Upload of a .php file (webshell runner) and Download of passwd file which stores hashed passwords. Security is #proactive not reactive. @splunk @tryhackme #CyberSecurityAwareness"
X Link 2025-12-10T21:31Z XX followers, XX engagements
"Tracing Attack Chain Remote Code Execution happens with command 'shell.phpcmd=./bunnylock.bin' executed on our server. Firewall logs of server ip show outbound C2 communications"
X Link 2025-12-10T21:31Z XX followers, XX engagements
"Your first line of defense is ability to see whats happening in your systems. This is pro-active approach taking actions before: #ActNow Security analysts use SIEM tools to: Interpreting custom log data. Filtering for suspicious IP's. Trace down attack chain"
X Link 2025-12-10T21:31Z XX followers, XX engagements
"This is a live lab of @tryhackme #adventofcyber2025 using @splunk to triage through an attack. #securityanayst #security #CyberSecurity #HackingStory #CyberWar #Anonymous"
X Link 2025-12-10T21:32Z XX followers, XX engagements
/creator/twitter::NoblemanPartoh