Unveiling the New Historical IP Timeline

ELLIO Icon
ELLIO Product Team
|4 min read

ELLIO Threat Intelligence Platform expands its capabilities with an interactive Historical IP Timeline, giving teams deep visibility into historical IP activity with flexible filtering and report-ready exports.

Traditional IP lookup vs interactive historical IP timelines. 

While standard IP lookups provide only a single snapshot of an IP’s current or past state, the interactive historical IP timeline provides essential context over time. Analysts can see how IP behavior evolves, identify patterns such as scanning or exploitation, and follow shifts in targets. Multiple data points - ports, fingerprints, HTTP paths, user agents, and geographic destinations - can be analyzed together, giving a comprehensive view that supports faster, more accurate investigations. 

How to spot patterns

Let’s look at a sample of activity from IP 5.182.209.113 as observed by the ELLIO Deception Network.

Activity timeline showing network traffic patterns across multiple ports (23, 443, 2093, 5984-5986, 8080, 8443, 57461, 59850-59859) from Oct 31 2025 to Jan 29 2026, with colored bars indicating different connection types and protocols including Telnet, HTTPS, HTTP, and user agents.

A skilled researcher or incident responder can identify a clear pattern: periods of fast scanning (MuonFP fingerprint 1025:2:1460:, spoofable scanning of multiple ports), followed by exploitation attempts (non-spoofable port activity, MuonFP fingerprint 42340:2-1-1-4-1-3:1460:13 or 42340:2-1-1-4-1-3:1460:9, trying to access HTTP path /wsman with User-Agent Go-http-client/1.1). It is also easy to spot and correlate HTTPS-focused activity by the presence of JA3 and JA4 TLS fingerprints.

ELLIO threat intelligence dashboard showing malicious IP 5.182.209.113 from Amsterdam with MITRE ATT&CK tactics, targeting cloud platforms like GCP and AWS

Following the scanning and exploitation patterns, the actual exploit is WSMAN/WinRM, which you can confirm in the overview tab.

Follow Activity Shifts

ELLIO threat intelligence dashboard showing unified activity timeline for IP 5.181.86.69 with ports, fingerprints, HTTP paths, and user agents data visualization from Oct 30 to Jan 28

ere is another example, this time illustrating how a threat actor shifts targets over time. On December 17 and 18, it checks for /remote/login and /login. On December 25, focus shifts to /global/protect/login.esp. From January 12, we see targeting of /+CSCOE+/logon.html, with a brief check for /api/sonicos/is-sslvpn-enabled on January 15.

The behavior, based on actual payloads, is properly tagged with tags like Cisco ASA/FTD WebVPN Scanner, Palo Alto GlobalProtect Exploit and SonicWall SonicOS Detector.

Threat intelligence dashboard showing malicious IP from Ukraine with MITRE ATT&CK tactics, CVEs, and security tags including Palo Alto exploits and scanner detections

These are cherry-picked examples, of course. Real behavior ranges widely. Sometimes an IP is active for just a brief period:

ELLIO Unified Activity Timeline dashboard showing network traffic data from Oct 31 2025 to Jan 29 2026, displaying IP addresses, countries, file paths, and threat indicators with color-coded timeline visualization

And sometimes an IP is active constantly - and maybe you should have just blocked it in the first place, focusing precious time on something else:

ELLIO Unified Activity Timeline showing cybersecurity threat data from IP 45.238.66.115 across October 2023-January 2024, displaying activity patterns by country, port, and protocol in a color-coded heatmap format

Presets and Filtering

ELLIO threat intelligence dashboard showing ports timeline for IP 97.107.131.224 marked as malicious, with green and red blocks indicating spoofable and non-spoofable ports over time from Oct 30 to Jan 29

Each data source type (Ports, Fingerprints, Geography, HTTP Paths, User Agents) includes both user-created and built-in presets, as well as different filtering options.

ELLIO threat intelligence dashboard showing ports timeline for IP 97.107.131.224 marked as malicious, with port scan visualization displaying green and red indicators for spoofable/non-spoofable ports over time

For ports, you can select ranges or specific ports. For fingerprints, wildcards are supported - if you are interested in MuonFP fingerprints with a single TCP option, you could use *:?:*:*, or t13d* to match all JA4 fingerprints representing TLS 1.3 connections to the domain using TCP.

For geographic destinations (specifically, in which countries the ELLIO Sensor Network observed activity coming from an IP), you can wildcard-match all countries of a specific continent or select individual countries.

For HTTP Paths and User Agents, you can filter by specific values or use wildcards to match patterns of interest. That is exactly how our built-in filters are constructed.

Network security patterns configuration interface showing URL path filters including admin, API, robots, sitemap, authentication, and dashboard endpoints

Once you have built an ultimate filter combining multiple patterns and data points, you can save it as a custom preset and re-use it in future investigations.

All of your settings - filters, enabled presets, sorting - are stored per IP and per timeline automatically. They will be there when you come back.

This feature is in technical preview and we cannot wait to hear how you use it in your CTI, IR, and analytical workflows.

Timeline Export

Export timeline interface showing unified activity timeline with color-coded threat data from Oct 2023-Jan 2024, featuring multiple export format options including screen resolutions and print layouts

Another thing that always struck us is data visualization. Once you have built your filters and adjusted your sorting, why is it so hard to use in a report or presentation?

That is why we built Timeline Export.

On any timeline, adjust your filters, presets, and ordering. Click the download button and you will see a preview with settings. You can select the format - currently we support 1080p, 4K, A4, and Letter, in both portrait and landscape, in dark and light colors.

ELLIO Unified Activity Timeline showing threat intelligence data across countries and IP addresses from Oct 2015 to Jan 2016, with export options for PNG, JPEG, SVG, and PDF formats.

You can customize:

  • Element scale - useful for preparing presentations or printed materials
  • Label width - the character count after which labels are truncated (fun fact: a JA4 fingerprint is 36 characters long, while the longest functional URL is generally considered to be around 2,048 characters; don't get us started on User-Agents -- 413)
  • Title - useful for preparing presentations

Supported output formats are PNG, JPG, SVG, and PDF (with SVG underneath for pixel-perfect scaling, every time). For multi-page exports, unless the format is PDF, each page is rendered separately and you can download a zip file containing every one of them.

You may have noticed some of the exports on this post as well.

This feature is in technical preview and we hope to gather feedback for a second iteration. During development, we encountered numerous instances of weird behaviour that has nothing to do with mass exploitation and recon research - but it is always interesting to read up about "contextual alternates" in OpenType because of bugs that just don't make any sense.

Share this article

Written by

ELLIO Icon
ELLIO Product Team

Related Articles