How Do Threat Hunting Tools Find Outbound Connections?