<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Query about Port Scanning attack attempts in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595746#M207361</link>
    <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for helping me. please guide me more on how we can add the destination IP as well in this query.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Apr 2022 07:37:27 GMT</pubDate>
    <dc:creator>zeeshantayyab</dc:creator>
    <dc:date>2022-04-28T07:37:27Z</dc:date>
    <item>
      <title>Splunk Query about Port Scanning attack attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595741#M207359</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;Please help me out in this case.&lt;/P&gt;&lt;P&gt;I am searching the Port Scanning attack attempts by the following query.&lt;/P&gt;&lt;LI-SPOILER&gt;index="firewall" | stats dc(destination_port) as pcount by source_ip | where pcount &amp;gt; 500&lt;/LI-SPOILER&gt;&lt;P&gt;It Shows me the results in forms only like &lt;STRONG&gt;sorce_ip &lt;/STRONG&gt;is 145.132.11.11&amp;nbsp;and &lt;STRONG&gt;p&amp;nbsp;&lt;/STRONG&gt;&lt;STRONG&gt;count&lt;/STRONG&gt;&amp;nbsp;777.&lt;/P&gt;&lt;P&gt;But I want the results in the form of&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorce_ip&amp;nbsp; &amp;nbsp; &amp;nbsp; sorce_port&amp;nbsp; &amp;nbsp; &amp;nbsp;destination_ip&amp;nbsp; &amp;nbsp; &amp;nbsp; destnation_port&amp;nbsp; &amp;nbsp; &amp;nbsp; pcount&lt;/P&gt;&lt;P&gt;So what will be the query in this regard? Waiting for your kind reply.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 07:18:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595741#M207359</guid>
      <dc:creator>zeeshantayyab</dc:creator>
      <dc:date>2022-04-28T07:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Query about Port Scanning attack attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595742#M207360</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245309"&gt;@zeeshantayyab&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I think that it isn't so readable, but you could a values option to your search, something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="firewall" 
| stats dc(destination_port) as pcount values(destination_port) AS destination_port by source_ip 
| where pcount &amp;gt; 500&lt;/LI-CODE&gt;&lt;P&gt;probably the best approach is to have a main panel with your search and, with a click, a drilldown in another panel or another dashboard with the details of al destination port and other information.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 07:23:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595742#M207360</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-28T07:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Query about Port Scanning attack attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595746#M207361</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for helping me. please guide me more on how we can add the destination IP as well in this query.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 07:37:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595746#M207361</guid>
      <dc:creator>zeeshantayyab</dc:creator>
      <dc:date>2022-04-28T07:37:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Query about Port Scanning attack attempts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595764#M207366</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/245309"&gt;@zeeshantayyab&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you could add also the destination_ip to the search using values:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="firewall" 
| stats dc(destination_port) as pcount values(destination_ip) AS destination_ip values(destination_port) AS destination_port by source_ip 
| where pcount &amp;gt; 500&lt;/LI-CODE&gt;&lt;P&gt;but in this way you have a few readable dashboard, my hint is to create a simple main search&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="firewall" 
| stats dc(destination_port) as pcount by source_ip 
| where pcount &amp;gt; 500&lt;/LI-CODE&gt;&lt;P&gt;then you can configure a drilldown in another panel of the same dashboard or in another dashboard where there's the details of your connections:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index="firewall" source_ip=$source_ip$
| stats values(destination_port) AS destination_port by destination_ip&lt;/LI-CODE&gt;&lt;P&gt;if you need help in drilldown configuration you can see in the Splunk Dashboard Examples app (&lt;A href="https://splunkbase.splunk.com/app/1603/" target="_blank"&gt;https://splunkbase.splunk.com/app/1603/&lt;/A&gt;) how to do this.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 09:57:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Query-about-Port-Scanning-attack-attempts/m-p/595764#M207366</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2022-04-28T09:57:59Z</dc:date>
    </item>
  </channel>
</rss>

