1. Any Run. (2021). Wtfismyip General Info. https://any.run/report/e3d78e7428ee28a4276fbb76dee1af0d361aa7608add631e48d1066f6acb91b2/a68cc05c-55b9-4a7a-9566-9df232134fcb
2. Althouse, J. (2019). TLS Fingerprinting with JA3 and JA3S. https://engineering.salesforce.com/tls-fingerprinting-with-ja3-and-ja3s-247362855967/
3. Banerjee, U., Vashishtha, A., & Saxena, M. (2010). Evaluation of the Capabilities of WireShark as a tool for Intrusion Detection. International Journal of computer applications, 6(7), 1-5.
4. Cybersecurity Advisory. (2021). TrickBot Malware. Cybersecurity and Infrastructure Security Agency https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-076a
5. Chappell, L. (2019). GeoIP Mapping in Wireshark. https://www.chappell-university.com/post/geoip-mapping-in-wireshark