After a breach involving the exfiltration of a large amount of sensitive data, a security analyst is reviewing the following firewall logs to determine how the breach occurred.
Which of the following IP addresses does the analyst need to investigate further?
G_f_b
2 years, 1 month ago2Fish
2 years, 1 month agoAaronS1990
2 years, 2 months agoCatoFong
2 years, 2 months agoEric1234
2 years, 2 months agognnggnnggnng
2 years, 2 months agoEric1234
2 years, 2 months agochuck165
2 years, 2 months agoEric1234
2 years, 2 months ago