network-reconnaissance

Preview image for: Unmasking the `/proxy/` Probes: A Deep Dive into Honeypot Detections and Threat Actor Reconnaissance on March 16th

Unmasking the `/proxy/` Probes: A Deep Dive into Honeypot Detections and Threat Actor Reconnaissance on March 16th

Honeypots detected widespread `/proxy/` URL scans on March 16th, revealing evolving threat actor reconnaissance for open proxy exploitation.
Preview image for: Securing the Sonic Perimeter: An OSINT & Forensics Analysis of Smart Soundbar Deployment

Securing the Sonic Perimeter: An OSINT & Forensics Analysis of Smart Soundbar Deployment

Analyzing flagship soundbars as IoT attack surfaces, focusing on network reconnaissance, data privacy, and forensic investigation techniques.
X
To give you the best possible experience, https://iplogger.org uses cookies. Using means you agree to our use of cookies. We have published a new cookies policy, which you should read to find out more about the cookies we use. View Cookies politics