{
  "version": 3,
  "sources": ["ssg:https://framerusercontent.com/modules/WmCFHkhehvXiclCyVHck/mfVqyRAKhx0h19ag8MAS/wZSe8KXi9.js"],
  "sourcesContent": ["// Generated by Framer (915daba)\nexport default function metadata(params,activeLocale){return{breakpoints:[{hash:\"1qfm5dw\",mediaQuery:\"(min-width: 1440px)\"},{hash:\"1tnydkj\",mediaQuery:\"(min-width: 810px) and (max-width: 1439px)\"},{hash:\"ciflxq\",mediaQuery:\"(max-width: 809px)\"}],description:\"Query Hunt's database using SQL to track C2 servers, phishing sites, malware, and more. Ideal for researchers, analysts, and threat hunters. Book your demo now.\",elements:{w9HssbNQv:\"scroll\"},framerSearch:{index:false},robots:\"max-image-preview:large\",serializationId:\"framer-zl00T\",socialImage:\"https://framerusercontent.com/assets/Q3183sMV0wPFLW2Nwq7BeQFPuk.png\",title:\"HuntSQL\u2122 - SQL-Driven Threat Intelligence Database Queries\",viewport:\"width=device-width\"};}export const metadataVersion=1;\nexport const __FramerMetadata__ = {\"exports\":{\"default\":{\"type\":\"function\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"metadataVersion\":{\"type\":\"variable\",\"annotations\":{\"framerContractVersion\":\"1\"}},\"__FramerMetadata__\":{\"type\":\"variable\"}}}"],
  "mappings": "AACe,SAARA,EAA0BC,EAAOC,EAAa,CAAC,MAAM,CAAC,YAAY,CAAC,CAAC,KAAK,UAAU,WAAW,qBAAqB,EAAE,CAAC,KAAK,UAAU,WAAW,4CAA4C,EAAE,CAAC,KAAK,SAAS,WAAW,oBAAoB,CAAC,EAAE,YAAY,mKAAmK,SAAS,CAAC,UAAU,QAAQ,EAAE,aAAa,CAAC,MAAM,EAAK,EAAE,OAAO,0BAA0B,gBAAgB,eAAe,YAAY,sEAAsE,MAAM,kEAA6D,SAAS,oBAAoB,CAAE,CAAQ,IAAMC,EAAgB,EACnuBC,EAAqB,CAAC,QAAU,CAAC,QAAU,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,gBAAkB,CAAC,KAAO,WAAW,YAAc,CAAC,sBAAwB,GAAG,CAAC,EAAE,mBAAqB,CAAC,KAAO,UAAU,CAAC,CAAC",
  "names": ["metadata", "params", "activeLocale", "metadataVersion", "__FramerMetadata__"]
}
