Can you determine evidences of port scan activity?
**https://app.letsdefend.io/challenge/port-scan-activity**

we observe multiple SYN packets originating from 10.42.42.253 and targeting the same ports across different IP addresses. This pattern is characteristic of a TCP port scan.
80(HTTP).389(LDAP).This confirms that 10.42.42.253 is actively scanning the environment for open services.

To identify which host responded to the attacker’s scan, I applied the following Wireshark filter:
ip.dst == 10.42.42.253 && tcp.flags.syn == 1 && tcp.flags.ack == 1
This filter captures packets sent back to the attacker (10.42.42.253) where the flags contain both SYN and ACK. A SYN+ACK response is the standard reply from a host when the scanned port is open.
From the results, 10.42.42.50 responded