Use the FAIR methodology to derive your threat assessment. The attached FAIR PDF will walk you through your analysis. To complete the FAIR document:
This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify