Watch this video on YouTube
As the Information Security Manager, you have been alerted to a series of unauthorized access attempts from the same IP address. To understand the nature and intent of these attempts, which of the following should be your immediate step?