<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create a real-time map of attacks by Source IP? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227780#M67270</link>
    <description>&lt;P&gt;I would like to create a live map similar to the one at Norse: &lt;A href="http://map.norsecorp.com"&gt;http://map.norsecorp.com&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;Below is the search that I have, but it only works for Relative time, not Real-Time. Why is that? Also, I don't want to aggregate by Count, but rather, display the latest attacks and have them disappear as new attacks come in. How could I achieve that?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=fortios5_ips | iplocation source_ip | stats count by attack, source_ip, destination_ip, lat, lon, City, Country, Region | where Country!="United States" | geostats globallimit=5 latfield=lat longfield=lon count by Country
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 17 Sep 2015 14:52:05 GMT</pubDate>
    <dc:creator>kmedina1</dc:creator>
    <dc:date>2015-09-17T14:52:05Z</dc:date>
    <item>
      <title>How to create a real-time map of attacks by Source IP?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227780#M67270</link>
      <description>&lt;P&gt;I would like to create a live map similar to the one at Norse: &lt;A href="http://map.norsecorp.com"&gt;http://map.norsecorp.com&lt;/A&gt;.&lt;/P&gt;

&lt;P&gt;Below is the search that I have, but it only works for Relative time, not Real-Time. Why is that? Also, I don't want to aggregate by Count, but rather, display the latest attacks and have them disappear as new attacks come in. How could I achieve that?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype=fortios5_ips | iplocation source_ip | stats count by attack, source_ip, destination_ip, lat, lon, City, Country, Region | where Country!="United States" | geostats globallimit=5 latfield=lat longfield=lon count by Country
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 17 Sep 2015 14:52:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227780#M67270</guid>
      <dc:creator>kmedina1</dc:creator>
      <dc:date>2015-09-17T14:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a real-time map of attacks by Source IP?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227781#M67271</link>
      <description>&lt;P&gt;Not sure why your realtime search wouldn't work. It Could be your timerange not detecting any events.&lt;/P&gt;

&lt;P&gt;I believe the geostats command relies on the count to indicate the number of hits per geographical category (ie city/country/etc). A realtime search will show that information for the given time range so say something like this happens (let's assume your realtime search is for a 30 minute window):&lt;BR /&gt;
 1. Attack from France begins at 9:01am&lt;BR /&gt;
 2. Your dashboard panel shows an attack appear in France&lt;BR /&gt;
 3. Attack ceases at 9:09&lt;BR /&gt;
 4. France remains on your dashboard through 9:31&lt;/P&gt;

&lt;P&gt;To get around this you can shorten your real-time search time range. Something like 5 minutes or even 60 seconds might suite your needs better. Someone else might have a better solution but that's how we do it here.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2015 16:57:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227781#M67271</guid>
      <dc:creator>hagjos43</dc:creator>
      <dc:date>2015-09-17T16:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a real-time map of attacks by Source IP?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227782#M67272</link>
      <description>&lt;P&gt;Well, now it seems to be detecting events, I did changed the script a little bit. Even do I got 57 events in the last 30 minutes on &lt;IMG src="https://community.splunk.com/storage/temp/60183-screen-shot-2015-09-18-at-33113-pm.png" alt="alt text" /&gt;Real-Time, I barely see them displayed in the map (only 5 are represented, map attached). Do you know why is that? &lt;/P&gt;

&lt;P&gt;sourcetype=fortios5*  | eval source_ip_address=case(sourcetype=="fortios5_ips", source_ip, sourcetype=="fortios5_webfilter", dstip, sourcetype=="fortios5_virus", dstip, sourcetype=="fortios5_app-ctrl", destination_ip) | iplocation source_ip_address  | stats count by attack, source_ip_address, lat, lon, City, Country, Region | geostats globallimit=0 locallimit=0 latfield=lat longfield=lon count by City&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 07:28:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227782#M67272</guid>
      <dc:creator>kmedina1</dc:creator>
      <dc:date>2020-09-29T07:28:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a real-time map of attacks by Source IP?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227783#M67273</link>
      <description>&lt;P&gt;This is not really an answer to your specific question about your search, but I am supplying this information for future readers who might look here for general information about building a map of attacks by source IP. There is a &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.6/Scenarios/Goals"&gt;scenario-based tutorial&lt;/A&gt; in the Splunk Enterprise documentation, complete with sample data, that walks through how to build a dashboard that includes a drilldown map showing an attacker's IP address location, populated dynamically by clicking on an IP address in the dashboard.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2015 22:58:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227783#M67273</guid>
      <dc:creator>ChrisG</dc:creator>
      <dc:date>2015-09-18T22:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a real-time map of attacks by Source IP?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227784#M67274</link>
      <description>&lt;P&gt;what program are you using and what program language&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2018 20:49:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-a-real-time-map-of-attacks-by-Source-IP/m-p/227784#M67274</guid>
      <dc:creator>Shabalala9</dc:creator>
      <dc:date>2018-03-16T20:49:25Z</dc:date>
    </item>
  </channel>
</rss>

