All Apps and Add-ons

External threat feed database lookup

jwalzerpitt
Influencer

I created a SQL server db table that contains various IPs from open source IP block lists (zeustracker, dshield, stop forum spam). I am currently in the process of creating the DB Lookup within the Splunk DB Connect v2 app.

What I'd like to do is compare either src_ip or dst_ip fields from various sourcetypes against the IP list in the lookup database. In the 'Choose the Splunk Fields to Base the Lookup on' (Step 3 of 6) should I select multiple fields (src_ip AND dst_ip), or do I need to create separate lookups for the src_ip and dst_ip fields?

Thx

0 Karma
1 Solution

jwalzerpitt
Influencer

Thx for link pointing to a great app! Absolutely awesome...

0 Karma

jwalzerpitt
Influencer

One quick question. I created the .csv file with two columns - ip_address and feedname. How do I run the query that returns both fields?

I am running the following query:

index=main [|inputlookup threatfeed.csv | fields ip_address,feedname | rename ip_address as SourceIP] | stats count by SourceIP | sort -count

but it comes back and tells me, "No results found". If I remove 'feedname' I get results with the count. I'd like to see the feedname column listed as well to see which threat feed the IP is associated with.

Thx

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...