Information left by attackers like:

  • Malicious IP address
  • Malware signatures
  • Suspicious URLS