• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Outbound Connection to a Suspicious IP Address

Risk Factors

Attackers frequently set up websites and servers to distribute malware, communicate with command-and-control servers, or collect exploitable information from victims. The IP addresses associated with known malicious servers can be identified from threat intelligence, which is a collection of information curated by the security community. Network devices that communicate with suspicious IP addresses should be investigated. These devices might be vulnerable to various exploits, which could expose information or result in a persistent attack on the network.

Kill Chain

Caution

Risk Score

60

Detection diagram
Next in Caution: Outbound Connection to a Tor Node

Attack Background

N/A

Mitigation Options

Block inbound and outbound traffic from suspicious IP addresses at the network perimeter

Quarantine the device while checking for indicators of compromise, such as the presence of malware

Implement network segmentation, security zones, and firewall policies that limit how devices can communicate

MITRE ATT&CK ID

What else can RevealX do for you?