Investigate an IP address associated with a Microsoft Defender ATP alert
Want to experience Microsoft Defender ATP? Sign up for a free trial.
Examine possible communication between your machines and external internet protocol (IP) addresses.
Identifying all machines in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected machines.
You can find information from the following sections in the IP address view:
- IP worldwide
- Reverse DNS names
- Alerts related to this IP
- IP in organization
IP Worldwide and Reverse DNS names
The IP address details section shows attributes of the IP address such as its ASN and its Reverse DNS names.
Alerts related to this IP
The Alerts related to this IP section provides a list of alerts that are associated with the IP.
IP in organization
The IP in organization section provides details on the prevalence of the IP address in the organization.
The Prevalence section displays how many machines have connected to this IP address, and when the IP was first and last seen. You can filter the results of this section by time period; the default period is 30 days.
Most recent observed machines with IP
The Most recent observed machines with IP section provides a chronological view on the events and associated alerts that were observed on the IP address.
Investigate an external IP:
- Select IP from the Search bar drop-down menu.
- Enter the IP address in the Search field.
- Click the search icon or press Enter.
Details about the IP address are displayed, including: registration details (if available), reverse IPs (for example, domains), prevalence of machines in the organization that communicated with this IP Address (during selectable time period), and the machines in the organization that were observed communicating with this IP address.
Search results will only be returned for IP addresses observed in communication with machines in the organization.
Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all machines in the organization observed communicating with the IP address, the file associated with the communication and the last date observed.
Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events.
- View and organize the Microsoft Defender Advanced Threat Protection Alerts queue
- Manage Microsoft Defender Advanced Threat Protection alerts
- Investigate Microsoft Defender Advanced Threat Protection alerts
- Investigate a file associated with a Microsoft Defender ATP alert
- Investigate machines in the Microsoft Defender ATP Machines list
- Investigate a domain associated with a Microsoft Defender ATP alert
- Investigate a user account in Microsoft Defender ATP