Due to reports of unauthorized activity that was occurring on the internal network, an analyst is performing a network discovery. The analyst runs an Nmap scan against a corporate network to evaluate which devices were operating in the environment. Given the following output:
Which of the following choices should the analyst look at first?
Wole_excel
Highly Voted 7 months, 1 week agocartman_sc
Highly Voted 10 months, 1 week agobotla
Most Recent 4 days agoPatrickH
10 months, 2 weeks agocaptaintoadyo
10 months, 2 weeks agodave_delete_me
10 months, 2 weeks agoNishaw
11 months, 2 weeks agoBAMMRM
8 months, 3 weeks agodeeden
1 year, 3 months agocrackman123
1 year, 3 months agochrys
1 year, 5 months agodcdc1000
1 year, 5 months agokmordalv
1 year, 6 months ago