Amidst increasing phishing attempts, your team needs to ascertain the trustworthiness of certain network identifiers that are potentially linked to these attacks. How can you evaluate if these identifiers have been flagged for malicious activities previously?
Analyze internal security logs to find previous internal access attempts by these network identifiers
Execute a traceroute to each network identifier to trace the path and determine the origin of network traffic
Use a WHOIS lookup service to obtain registration and contact information for the network identifiers
Consult a well-recognized IP reputation database for records of flagged activities associated with the network identifiers