EXPLORE
← Back to Explore
T1596.005

Scan Databases

Adversaries may search within public scan databases for information about victims that can be used during targeting. Various online services continuously publish the results of Internet scans/surveys, often harvesting information such as active IP addresses, hostnames, open ports, certificates, and even server banners.(Citation: Shodan) Adversaries may search scan databases to gather actionable information. Threat actors can use online resources and lookup tools to harvest information from thes...

PRE
0
Detections
0
Sources
2
Threat Actors

THREAT ACTORS (2)

DETECTIONS (0)