Network foot printing is an organized collection of information about a targeted network environment. The attackers, before attacks a network, collect the information such as the IP address of the targeted organization is called:____________.