
Detect active exploitation & recon waves before they become Sentinel incidents.
Turn early signals into actionable detections in Microsoft Sentinel. Identify recon and exploitation waves with context-rich, behavior-driven IP intelligence.
Built for Microsoft Sentinel workflows.

Not just another threat intel feed.
Not just static indicators.
Refine analytics rules, accelerate investigations, and distinguish real threats from benign activity.
Detect emerging exploitation waves
Prioritize actively targeted vulnerabilities. Patch based on active exploitation campaigns, not on CVSS.
Suppress noise from non-exploited threats
Reduce incident and alert volume by filtering non-exploited activity. Suppress irrelevant IOC-based signals using real-time behavioral context.
Detect early-stage threats as they happen
Detect network scanning, exploit payload delivery, brute-force campaigns, and emerging attack patterns as they unfold, not after compromise.
Stop repeat attacks behind rotating IP infrastructure
Correlate distributed recon and exploitation activity across changing IP addresses to detect persistent attacker campaigns, not just individual sources. Block behavior patterns instead of chasing single IPs.
Separate what needs action from what doesn’t.
Enrich Sentinel signals with threat intelligence and behavioral context to distinguish real threats from benign activity.
High-risk exploitation traffic
IP connections linked to active mass exploitation campaigns targeting vulnerable services.
Reconnaissance & vulnerability scanning activity
Promiscuous internet scanners probing exposed assets for known weaknesses.
Suspicious authentication behavior
Login attempts originating from infrastructure associated with active reconnaissance and exploitation activity.
Financial fraud indicators
Transactions correlated with known malicious infrastructure or high-risk behavioral patterns.
Remote code execution attempts
Activity associated with exploit attempts targeting application or system-level vulnerabilities.
Botnet-driven activity
Traffic originating from opportunistic botnets used for scanning, exploitation, or secondary payload delivery.
Automated credential spraying campaigns
Large-scale “spray-and-pray” authentication attempts across multiple targets.
MITRE ATT&CK mapping context
Enrichment of security events with MITRE ATT&CK techniques and adversary behavior mapping.
Know IP behavior and threat level in Microsoft Sentinel.
{
"ip": "210.187.49.191",
"classification": "malicious",
"first_seen": "2025-12-20",
"last_seen": "2025-12-31",
"spoofable": false,
"src": {
"geo": {
"country": {
"name": "Malaysia",
"code": "MY"
},
"continent": {
"name": "Asia",
"code": "AS"
}
}
},
"dst": {
"geo": [
{
"country": {
"name": "Australia",
"code": "AU"
},
"continent": {
"name": "Oceania",
"code": "OC"
}
},
{
"country": {
"name": "France",
"code": "FR"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Singapore",
"code": "SG"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "United Arab Emirates",
"code": "AE"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "Hong Kong",
"code": "HK"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "Czechia",
"code": "CZ"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Germany",
"code": "DE"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Sweden",
"code": "SE"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Japan",
"code": "JP"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "United Kingdom",
"code": "GB"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "South Korea",
"code": "KR"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "United States",
"code": "US"
},
"continent": {
"name": "North America",
"code": "NA"
}
},
{
"country": {
"name": "India",
"code": "IN"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "Ireland",
"code": "IE"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Indonesia",
"code": "ID"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "Austria",
"code": "AT"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Greece",
"code": "GR"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "New Zealand",
"code": "NZ"
},
"continent": {
"name": "Oceania",
"code": "OC"
}
},
{
"country": {
"name": "Israel",
"code": "IL"
},
"continent": {
"name": "Asia",
"code": "AS"
}
},
{
"country": {
"name": "Poland",
"code": "PL"
},
"continent": {
"name": "Europe",
"code": "EU"
}
},
{
"country": {
"name": "Latvia",
"code": "LV"
},
"continent": {
"name": "Europe",
"code": "EU"
}
}
]
},
"network": {
"port": [
22,
23,
80,
443,
2222,
2375
],
"spoofable_port": [
23
],
"non_spoofable_port": [
22,
80,
443,
2222,
2375
]
},
"fingerprints": {
"ja3": [
"7041540a5e44ce9a1d4200c4214355aa"
],
"ja4": [
"t13i170900_5b57614c22b0_78e6aca7449b"
],
"muonfp": [
"65535:::",
"42340:2-4-8-1-3:1460:11"
]
},
"http": {
"path": [
"/",
"/V2/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"/admin/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"/api/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"/app/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"/cgi-bin/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/bin/sh",
"/containers/json",
"/index.php",
"/laravel/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php",
"/public/index.php",
"/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php"
],
"user_agent": [
"Go-http-client/1.1",
"NTRIP NtripClient/1.0",
"Hello-world"
]
},
"tag": [
"PHPUnit RCE Detector",
"ThinkPHP RCE Detector",
"Docker API Scanner",
"Apache Path Traversal",
"Laravel Detector",
"Targets GCP",
"Targets AWS",
"Fast Scanner (i.e. Masscan / ZMap)"
],
"mitre_attack": {
"tactics": [
"Reconnaissance",
"Initial Access"
],
"techniques": [
"T1595.002 - Vulnerability Scanning",
"T1190 - Exploit Public-Facing Application",
"T1592.002 - Gather Victim Software Info"
],
"sub_techniques": [
"T1595.002",
"T1592.002"
]
},
"cve": [
"CVE-2017-9841",
"CVE-2018-20062",
"CVE-2022-47945",
"CVE-2021-41773",
"CVE-2021-42013"
],
"ssh": {
"auth": [
{
"username": "root",
"password": "root"
},
{
"username": "root",
"password": "123456"
},
{
"username": "root",
"password": "admin"
},
{
"username": "admin",
"password": "admin"
},
{
"username": "admin",
"password": "1234"
},
{
"username": "ubuntu",
"password": "ubuntu"
},
{
"username": "pi",
"password": "raspberry"
},
{
"username": "oracle",
"password": "oracle"
}
]
}
} Increase detection confidence in KQL Rules
Improve signal quality in Analytics Rules by enriching detections with real attacker and exploitation context.
Prioritize real threats over alert noise
Enrich Sentinel Incidents with mass exploitation and reconnaissance intelligence so analysts can triage faster and escalate accurately.
Speed up entity investigation decisions
Enable faster analyst decisions by turning Sentinel entities into enriched, behavior-aware threat signals.
Automate response with higher trust
Feed Logic Apps playbooks with real-time threat context to automate blocking, suppression, escalation, and response actions.
Yes. Your environment is constantly scanned.
No. You don’t need every scan in your incident queue.
Reduce Sentinel noise by filtering out constant scanning activity, AI/ML scraping tools, and benign research crawlers.
Strengthen the perimeter for cleaner Sentinel signals.
Integrate ELLIO Threat Intelligence as a pre-SIEM filtering layer (IP Blocking) in Azure Firewall to improve perimeter protection and reduce unnecessary noise before it reaches Microsoft Sentinel.