Scenario 1: An internal host generates a high volume of scan probes targeting a range of IP addresses within the darknet space. Investigation reveals that the host is compromised, and the attacker is mapping the network to identify potential targets for lateral movement.
Scenario 2: A sudden spike in network traffic is detected, originating from a security team's vulnerability scanner. Verification with the IT department confirms that the activity is part of a scheduled security assessment, and the detected behavior is legitimate.