T1595.001 Scanning IP Blocks Mappings

Adversaries may scan victim IP blocks to gather information that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses.

Adversaries may scan IP blocks in order to Gather Victim Network Information, such as which IP addresses are actively in use as well as more detailed information about hosts assigned these addresses. Scans may range from simple pings (ICMP requests and responses) to more nuanced scans that may reveal host software/versions via server banners or other network artifacts.(Citation: Botnet Scan) Information from these scans may reveal opportunities for other forms of reconnaissance (ex: Search Open Websites/Domains or Search Open Technical Databases), establishing operational resources (ex: Develop Capabilities or Obtain Capabilities), and/or initial access (ex: External Remote Services).

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
action.malware.variety.Scan network Scan or footprint network related-to T1595.001 Active Scanning: Scanning IP Blocks
value_chain.targeting.variety.Organizational Information Information on an organization such as org chart, technologies in use, financial assets, etc, used to pick them as a target related-to T1595.001 Active Scanning: Scanning IP Blocks
amazon_guardduty Amazon GuardDuty technique_scores T1595.001 Scanning IP Blocks
amazon_inspector Amazon Inspector technique_scores T1595.001 Scanning IP Blocks
amazon_virtual_private_cloud Amazon Virtual Private Cloud technique_scores T1595.001 Scanning IP Blocks
aws_web_application_firewall AWS Web Application Firewall technique_scores T1595.001 Scanning IP Blocks
aws_network_firewall AWS Network Firewall technique_scores T1595.001 Scanning IP Blocks