How is the Potentially Exploited Risk Vector Observed? Ingrid Potentially Exploited events are discovered with sinkholing technology. The hosts are identified in the course of looking for other events. An indicator that a system is either infected or misconfigured is when devices are acting suspiciously. January 15, 2020: Published. Related articles Potentially Exploited Risk Vector Sinkhole Potentially Exploited Finding Considerations Potentially Exploited Findings How is the Botnet Infections Risk Vector Observed? Feedback 0 comments Please sign in to leave a comment.