Darkweb Reconnaissance Monitoring

Track and analyze reconnaissance activities targeting your infrastructure

Total Reconnaissance Activities
...

+... since last month

Active
Active Scanning Attempts
...

+... since last month

High Activity
Phishing Attempts
...

+... since last month

Critical
Information Exposure Risk
...

...

Elevated
Detected Reconnaissance Techniques
MITRE ATT&CK Reconnaissance tactics detected in the last 30 days
ID
Timestamp
TechniqueSourceTarget
Severity
Actions
RECON-0015/30/2023, 2:23:45 PM
Active Scanning
Vulnerability Scanning
T1595.002
External IP: 203.0.113.45Web Application Server
High
View details
RECON-0025/29/2023, 9:12:33 AM
Gather Victim Identity Information
Email Addresses
T1589.002
Social Media ScraperCorporate LinkedIn Profiles
Medium
View details
RECON-0035/28/2023, 10:45:12 PM
Search Open Technical Databases
DNS/Passive DNS
T1596.001
UnknownDNS Records
Low
View details
RECON-0045/28/2023, 4:33:27 PM
Phishing for Information
Spearphishing Link
T1598.003
Email: security-update@company-spoofed.comIT Department Staff
Critical
View details
RECON-0055/27/2023, 11:05:18 AM
Active Scanning
Scanning IP Blocks
T1595.001
External IP: 198.51.100.78Corporate Network Perimeter
Medium
View details
Top Reconnaissance Tactics
Most frequently observed MITRE ATT&CK techniques
Active Scanning
T1595
34 incidents
Phishing for Information
T1598
28 incidents
Gather Victim Identity Info
T1589
21 incidents
Search Open Technical Databases
T1596
18 incidents
Targeted Assets
Infrastructure components under reconnaissance
Web Application Servers
Production environment
Critical
Corporate Email System
Office 365 infrastructure
High
DNS Records
Public DNS infrastructure
Medium
Employee LinkedIn Profiles
Social media OSINT
Low