Darkweb Reconnaissance Monitoring
Track and analyze reconnaissance activities targeting your infrastructure
Total Reconnaissance Activities
...
+... since last month
Active
Active Scanning Attempts
...
+... since last month
High Activity
Phishing Attempts
...
+... since last month
Critical
Information Exposure Risk
...
...
Elevated
Detected Reconnaissance Techniques
MITRE ATT&CK Reconnaissance tactics detected in the last 30 days
| ID | Timestamp | Technique | Source | Target | Severity | Actions |
|---|---|---|---|---|---|---|
| RECON-001 | 5/30/2023, 2:23:45 PM | Active Scanning Vulnerability Scanning T1595.002 | External IP: 203.0.113.45 | Web Application Server | High | View details |
| RECON-002 | 5/29/2023, 9:12:33 AM | Gather Victim Identity Information Email Addresses T1589.002 | Social Media Scraper | Corporate LinkedIn Profiles | Medium | View details |
| RECON-003 | 5/28/2023, 10:45:12 PM | Search Open Technical Databases DNS/Passive DNS T1596.001 | Unknown | DNS Records | Low | View details |
| RECON-004 | 5/28/2023, 4:33:27 PM | Phishing for Information Spearphishing Link T1598.003 | Email: security-update@company-spoofed.com | IT Department Staff | Critical | View details |
| RECON-005 | 5/27/2023, 11:05:18 AM | Active Scanning Scanning IP Blocks T1595.001 | External IP: 198.51.100.78 | Corporate Network Perimeter | Medium | View details |
Top Reconnaissance Tactics
Most frequently observed MITRE ATT&CK techniques
Active Scanning
T1595
34 incidents
Phishing for Information
T1598
28 incidents
Gather Victim Identity Info
T1589
21 incidents
Search Open Technical Databases
T1596
18 incidents
Targeted Assets
Infrastructure components under reconnaissance
Web Application Servers
Production environment
Critical
Corporate Email System
Office 365 infrastructure
High
DNS Records
Public DNS infrastructure
Medium
Employee LinkedIn Profiles
Social media OSINT
Low