Splunk Enterprise Security

How to use ip_intel lookup to perform a CIDR match ?

neerajs_81
Builder

Hello Folks,
How can i perform a CIDR/Subnet match with the "ip_intel" lookup file that comes by default ?  This lookup KV store dataset has CIDR ranges and single IP's listed under "IP" column .

Basically if the Dest_IP from my search results fall in a subnet range of the "IP" column  of the lookup file , then it should display the result in a table format.  I am able to match against a single IP-address but not against CIDR  range.

How do you guys about this one ? Thanks in advance

Labels (2)
0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Incident Response: Reduce Incident Recurrence with Automated Ticket Creation

Culture extends beyond work experience and coffee roast preferences on software engineering teams. Team ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 2)

Welcome to the "Splunk Classroom Chronicles" series, created to help curious, career-minded learners get ...