Splunk Enterprise Security

searching and alerting on ip_intel

hbfblueteam
New Member

Hi,

Does anyone know if there is an efficient way to incorporate ip_intel into a search/query. I want to set up an alert using a particular ip_intel feed for a specific index to notify me when there is traffic from high-risk IP addresses.

Currently trying the below but I get no results (saw the below as another answer but cannot get it to work)

index=reverse_proxy [|inputlookup ip_intel | return ip] | where ip=src

note: "src" is the the field name in which the IP is parsed for my index

Cheers

Labels (1)
0 Karma
1 Solution

harsmarvania57
Ultra Champion

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)

View solution in original post

0 Karma

harsmarvania57
Ultra Champion

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)
0 Karma

hbfblueteam
New Member

Thank you, that has given me some results

Regards,
Marko

0 Karma

to4kawa
Ultra Champion

https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Return

<count>
Syntax: <int>
Description: Specify the number of rows.
Default: 1, which is the first row of results passed into the command.

see reference.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

&#x1f342; Fall into November with a fresh lineup of Community Office Hours, Tech Talks, and Webinars we’ve ...

Transform your security operations with Splunk Enterprise Security

Hi Splunk Community, Splunk Platform has set a great foundation for your security operations. With the ...

Splunk Admins and App Developers | Earn a $35 gift card!

Splunk, in collaboration with ESG (Enterprise Strategy Group) by TechTarget, is excited to announce a ...