IP Addresses, File Hashes, and Email
Learn how to monitor IP addresses, file hashes, and emails for cyber attacks.
We'll cover the following...
IP addresses
One of the least effective ways to identify the source of a scan or attack is to use the IP address it originates from. IP addresses are disposable and can be spoofed or routed through proxies to hide the actual source. An IP address may even lead to someone who is innocent but has a compromised device. For these reasons, attribution based on the IP address is unreliable.
Ascribing attribution to a particular part of the world can also be ...