You receive an email from a third-party vendor that one of their services is compromised, the vendor names a specific IP address that the compromised service was using. Where would you input this indicator to find any activity related to this IP address?
- A.IP Addresses
- B.Remote or Network Logon Activity
- C.Remote Access Graph
- D.Hash Executions