Common Information
Type Value
Value
IP Addresses - T1590.005
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses. Information about assigned IP addresses may include a variety of details, such as which IP addresses are in use. IP addresses may also enable an adversary to derive other details about a victim, such as organizational size, physical location(s), Internet service provider, and or where/how their publicly-facing infrastructure is hosted. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about assigned IP addresses may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2029-03-27 1 AWS Introduces Global Condition Context Keys to Improve EC2 Security
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2024-12-30 27 Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware
Details Website 2024-12-17 1 Log4shell: a threat intelligence perspective — Silent Push Threat Intelligence
Details Website 2024-12-12 21 SECCON2016取证题WriteUP - lightless blog
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-11-17 4 How to Instantly Rotate Your IP Address Every 5 Seconds in Linux for Ultimate Anonymity
Details Website 2024-11-17 0 Business Logic Assessments: Testing Overview
Details Website 2024-11-17 0 Bengal’s probe into diversion of school grants focus on interstate cyber crime | Kolkata | #cybercrime | #infosec | National Cyber Security Consulting
Details Website 2024-11-17 0 From Detection to Response: The Power of XDR in Cybersecurity
Details Website 2024-11-17 0 AWS Security Essentials: Protecting Your Cloud Infrastructure
Details Website 2024-11-17 0 Is Your API a Backdoor for Hackers? Find Out Now
Details Website 2024-11-17 0 Is Surfshark Legal to Use? Unveil the Truth Today!
Details Website 2024-11-17 2 🚨 Critical RCE Zero-Day Alert: Palo Alto Networks Firewalls Under Attack 🚨
Details Website 2024-11-16 18 Browser’s Secret Diary: Memory Dumps Unveiled
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 14 Building an Integrated Threat Intelligence Platform Using Python and Kibana
Details Website 2024-11-16 4 Palo Alto Networks confirmed active exploitation of recently disclosed zero-day
Details Website 2024-11-16 0 Boost Your Cybersecurity Career With These 7 Hands-on Projects
Details Website 2024-11-16 1 Solid Security Pro Network Protection Review
Details Website 2024-11-16 1 High-speed VPN Low Prices
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide
Details Website 2024-11-16 4 Kali Linux : Footprinting using Spiderfoot
Details Website 2024-11-16 40 ‘Tis the season to be wary’: Huge online retail scam uncovered in the lead-up to Christmas. — Silent Push Threat Intelligence