3000_scan_internal_external

Explanation

This NDM is designed to detect scanning for port 3000 that is exiting the customer's network. Numerous technologies have used port 3000. One noteworthy example is Grafana, an open source data visualization platform that has been subject to a number of critical vulnerability disclosures. Outbound scanning for port 3000 may be indicative of an infection and an attacker using a compromised machine on the customer network to pivot further outside of the network.

What to Look For

Scans launched from your network may be an indication that your network is compromised. Investigate hosts that are the source of this sort of activity in order to make sure that it is authorized and expected, and the hosts have not been compromised. This event could false positive in a situation where Netography has not been configured with the appropriate internal network IP address ranges.

Related MITRE ATT&CK Categories

Discovery: Network Service Discovery, Technique T1046 - Enterprise

Reconnaissance: Active Scanning, Technique T1595 - Enterprise