Scan. Computer from Network A is scanned and displays 65,000 virtual ports. A hacker fades in between Network A and a computer.