This event occurs when an external IP address that has been flagged as malicious by intelligence sources connects to an internal host.
Why this Event is Important
This event typically indicates that an IP address associated with various attacks is attempting to connect to an Internet-facing service in your infrastructure. These connection attempts may include automated port scanning, service discovery, brute-forcing, or application exploitation. Such an event may highlight services that have been mistakenly exposed to the Internet.
Investigate threat tags and any open source information to determine what activity has been associated with this IP address in the past. Examine the number of connections and size of data transfer for the connections to determine if meaningful data has been transferred - over 10 KB per connection. If the target application requires a password, review logs for successful login activity from the remote IP.
Determine if the activity associated with IP was successful. If successful, remediate damaged services, inspect for signs of persistence and lateral movement. If possible block future communications from the IP. Additionally, determine if the application in question should be Internet-accessible.