Back to all articles

Network Fingerprints

5 articles tagged with "Network Fingerprints"

ELLIO threat intelligence dashboard showing IP 93.123.109.205 from Amsterdam marked as malicious, with MITRE ATT&CK tactics, CVE vulnerabilities, and various exploit detectors including Setup.php, Jenkins, and SQL injection
Network FingerprintsScanning
Threat/Vulnerability News__2 min

Analyze everything or move straight to network-level blocking?

One IP. Four days. Nearly 900 user agents. Over 3,000 probes. Sometimes a single IP address tells you everything you need to know about how industrialized internet scanning has become.

ELLIO cybersecurity stickers with ELLIO's hacker cat masquot Jack at BSides Prague.
ELLIO Community Team
Infographic showing February 2026 credential-stuffing attack on Palo Alto GlobalProtect: 8,575 unique IPs, 3 attack waves, 48-hour duration. ELLIO branding at bottom.
CVENetwork Fingerprints
Threat/Vulnerability News__4 min

Coordinated Credential-Stuffing Campaign Targets Palo Alto GlobalProtect Portals

A coordinated credential-stuffing campaign hit GlobalProtect VPN portals with 8,575 IPs in 48 hours. Three attack waves, 78 targeted usernames, one password. Our team breaks down the timeline, infrastructure, fingerprints, and what defenders can do.

ELLIO Icon
ELLIO Threat Research Lab
Hero image
Network Fingerprints
Technical Articles__2 min

Every packet tells a story: The evolution of fingerprinting and netsec

The journey began in 1969, when the very first RFC - Request for Comments - was published. Explore key milestones that shaped network security and the practice of network fingerprinting.

ELLIO Icon
ELLIO Threat Research Lab
Hero image
BSidesEvents
Technical Articles__1 min

Video: How to capture real value from network fingerprinting in practice

Learn practical tips for deploying JA4, JA3, and MuonFP fingerprints in your security operations. Get expert insights from Vlad Iliushin and discover how to unlock their full defensive value.

ELLIO Icon
ELLIO Threat Research Lab
Hero image
Network Fingerprints
Technical Articles__17 min

IP Blocking vs TCP Fingerprint Blocking: How to Use and Combine Them

Learn how combining Threat Intelligence-based IP blocking and TCP fingerprinting enhances network security by disrupting attacker reconnaissance.

Vlad Iliushin Portrait
ELLIO Icon
Vlad Iliushin, ELLIO Threat Research Lab