Examine possible communication between your devices and external internet protocol (IP) addresses.
Identifying all devices in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected devices.
You can find information from the following sections in the IP address view:
- IP worldwide
- Reverse DNS names
- Alerts related to this IP
- IP in organization
IP Worldwide and Reverse DNS names
The IP address details section shows attributes of the IP address such as its ASN and its Reverse DNS names.
The Alerts related to this IP section provides a list of alerts that are associated with the IP.
IP in organization
The IP in organization section provides details on the prevalence of the IP address in the organization.
The Prevalence section displays how many devices have connected to this IP address, and when the IP was first and last seen. You can filter the results of this section by time period; the default period is 30 days.
Most recent observed devices with IP
The Most recent observed devices with IP section provides a chronological view on the events and associated alerts that were observed on the IP address.
Investigate an external IP:
- Select IP from the Search bar drop-down menu.
- Enter the IP address in the Search field.
- Click the search icon or press Enter.
Details about the IP address are displayed, including: registration details (if available), reverse IPs (for example, domains), prevalence of devices in the organization that communicated with this IP Address (during selectable time period), and the devices in the organization that were observed communicating with this IP address.
Search results will only be returned for IP addresses observed in communication with devices in the organization.
Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all devices in the organization observed communicating with the IP address, the file associated with the communication and the last date observed.
Clicking any of the device names will take you to that device’s view, where you can continue investigate reported alerts, behaviors, and events.