Investigate an IP address associated with a Windows Defender ATP alert

Applies to:

  • Windows 10 Enterprise
  • Windows 10 Education
  • Windows 10 Pro
  • Windows 10 Pro Education
  • Windows Defender Advanced Threat Protection (Windows Defender ATP)

Want to experience Windows Defender ATP? Sign up for a free trial.

Examine possible communication between your machines and external internet protocol (IP) addresses.

Identifying all machines in the organization that communicated with a suspected or known malicious IP address, such as Command and Control (C2) servers, helps determine the potential scope of breach, associated files, and infected machines.

You can find information from the following sections in the IP address view:

  • IP worldwide, Reverse DNS names
  • Alerts related to this IP
  • IP in organization
  • Most recent observed machines with IP

IP Worldwide and Reverse DNS names

The IP address details section shows attributes of the IP address such as its ASN and its Reverse DNS names.

The Alerts related to this IP section provides a list of alerts that are associated with the IP.

IP in organization

The IP in organization section provides details on the prevalence of the IP address in the organization.

Most recent observed machines with IP

The Most recent observed machines with IP section provides a chronological view on the events and associated alerts that were observed on the IP address.

Investigate an external IP:

  1. Select IP from the Search bar drop-down menu.
  2. Enter the IP address in the Search field.
  3. Click the search icon or press Enter.

Details about the IP address are displayed, including: registration details (if available), reverse IPs (for example, domains), prevalence of machines in the organization that communicated with this IP Address (during selectable time period), and the machines in the organization that were observed communicating with this IP address.

Note

Search results will only be returned for IP addresses observed in communication with machines in the organization.

Use the search filters to define the search criteria. You can also use the timeline search box to filter the displayed results of all machines in the organization observed communicating with the IP address, the file associated with the communication and the last date observed.

Clicking any of the machine names will take you to that machine's view, where you can continue investigate reported alerts, behaviors, and events.