<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASUS Router Query Super Thread in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/680059#M232471</link>
    <description>&lt;P&gt;You were correct - I added linux_secure and now src_ip is happier than "src".&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2024 14:10:30 GMT</pubDate>
    <dc:creator>ChocolateRocket</dc:creator>
    <dc:date>2024-03-08T14:10:30Z</dc:date>
    <item>
      <title>ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/676506#M231372</link>
      <description>&lt;P&gt;Since I cannot find much on querying ASUS router syslogs, and I am completely new to Splunk, I thought I'd start a thread for other Google Travelers in the far future.&lt;/P&gt;&lt;P&gt;I installed Splunk ENT yesterday and I am successfully sending syslogs.&lt;/P&gt;&lt;P&gt;In my first self-challenge, I'm trying to build a query with just dropped packets for external IP sources, but its not working.&lt;/P&gt;&lt;P&gt;source="udp:514" index="syslog" sourcetype="syslog" | where !(cidrmatch("10.0.0.0/8", src) OR cidrmatch("192.168.0.0/16", src) OR cidrmatch("172.16.0.0/12", src))&lt;/P&gt;&lt;P&gt;The Raw data is below - I wanna filter out all 192 privates and just external addresses, like that darn external HP src IP (15.73.182.64).&lt;/P&gt;&lt;P&gt;Feb 4 08:46:36 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=50 ID=43798 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D135F84C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:46:37 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=50 ID=43799 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D136188C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:46:38 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=50 ID=43800 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D136590C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:46:40 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=50 ID=43801 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D136DA0C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:46:44 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=49 ID=43802 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D137DC0C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:46:52 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=49 ID=43803 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D139E00C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:47:09 kernel: DROP IN=eth4 OUT= MAC=04:42:1a:51:a7:70:f8:5b:3b:3b:bd:e8:08:00 src=15.73.182.64 DST=192.168.1.224 LEN=82 TOS=0x00 PREC=0x00 TTL=49 ID=43804 DF PROTO=TCP SPT=5222 DPT=24639 SEQ=120455851 ACK=2704633958 WINDOW=23 RES=0x00 ACK PSH URGP=0 OPT (0101080A1D13DE80C3294ECB) MARK=0x8000000&lt;BR /&gt;Feb 4 08:47:17 kernel: DROP IN=eth4 OUT= MAC=ff:ff:ff:ff:ff:ff:28:11:a8:58:a6:ab:08:00 src=192.168.1.109 DST=192.168.1.255 LEN=78 TOS=0x00 PREC=0x00 TTL=128 ID=41571 PROTO=UDP SPT=137 DPT=137 LEN=58 MARK=0x8000000&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Next question - would anyone be able to write an app that takes the external IPs and does a lookup against the AbusePDB API or other blacklist APIs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2024 20:52:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/676506#M231372</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-02-04T20:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/676546#M231376</link>
      <description>&lt;P&gt;I think there is no need where filter. you can find external ips in search filter. Can you try this ?&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source="udp:514" index="syslog" sourcetype="syslog" NOT src IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 05 Feb 2024 08:02:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/676546#M231376</guid>
      <dc:creator>batabay</dc:creator>
      <dc:date>2024-02-05T08:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/676600#M231389</link>
      <description>&lt;P&gt;Thanks, that query is still returning private 192.168.x.x src IPs.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 15:04:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/676600#M231389</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-02-05T15:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/677491#M231669</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still trying to only get the Russian IPs. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Still pulls the private IPs. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChocolateRocket_0-1707861822142.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/29361i9BF743B80A5D1C99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChocolateRocket_0-1707861822142.png" alt="ChocolateRocket_0-1707861822142.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 22:04:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/677491#M231669</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-02-13T22:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/677827#M231775</link>
      <description>&lt;P&gt;Still trying to figure this one out....&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChocolateRocket_0-1708102965684.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/29389i5E847BF4C1B182FA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChocolateRocket_0-1708102965684.png" alt="ChocolateRocket_0-1708102965684.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2024 17:02:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/677827#M231775</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-02-16T17:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/679379#M232246</link>
      <description>&lt;P&gt;Still having issues trying to exclude private IPs.&lt;/P&gt;&lt;P&gt;This works for individual IPs:&lt;/P&gt;&lt;P&gt;index="syslog" process="kernel" SRC!=192.168.1.160 SRC!=0.0.0.0&lt;/P&gt;&lt;P&gt;But still can't exclude blocks.&lt;/P&gt;&lt;P&gt;How can I exclude with wildcard the 192.x.x.x.?&lt;/P&gt;&lt;P&gt;Tried this -&lt;/P&gt;&lt;P&gt;source="udp:514" index="syslog" sourcetype="syslog" where not like(src, "%192%")&lt;/P&gt;&lt;P&gt;Nooby blues.&lt;/P&gt;&lt;P&gt;Google is not my friend today.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2024 17:17:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/679379#M232246</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-03-02T17:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/679384#M232250</link>
      <description>&lt;P&gt;My two cents - most if not all small home routers use just linux kernel, some typical linux networking tools and custom WebUI. (Legality here is sometimes questionable).&lt;/P&gt;&lt;P&gt;So it's not "Asus router logs", it's just linux logs - in this case normal logs from the LOG module of iptables.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Mar 2024 19:09:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/679384#M232250</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-02T19:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/680057#M232470</link>
      <description>&lt;P&gt;Got it working after adding src_ip field.&lt;/P&gt;&lt;P&gt;Splunk is a long journey to learning basic stuff &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;source="udp:514" index="syslog" NOT src_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) action=DROP&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ChocolateRocket_0-1709906809573.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/29671i68EBA335A72B189B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ChocolateRocket_0-1709906809573.png" alt="ChocolateRocket_0-1709906809573.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 14:08:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/680057#M232470</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-03-08T14:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASUS Router Query Super Thread</title>
      <link>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/680059#M232471</link>
      <description>&lt;P&gt;You were correct - I added linux_secure and now src_ip is happier than "src".&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2024 14:10:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/ASUS-Router-Query-Super-Thread/m-p/680059#M232471</guid>
      <dc:creator>ChocolateRocket</dc:creator>
      <dc:date>2024-03-08T14:10:30Z</dc:date>
    </item>
  </channel>
</rss>

