Splunk Enterprise Security

searching and alerting on ip_intel

hbfblueteam
New Member

Hi,

Does anyone know if there is an efficient way to incorporate ip_intel into a search/query. I want to set up an alert using a particular ip_intel feed for a specific index to notify me when there is traffic from high-risk IP addresses.

Currently trying the below but I get no results (saw the below as another answer but cannot get it to work)

index=reverse_proxy [|inputlookup ip_intel | return ip] | where ip=src

note: "src" is the the field name in which the IP is parsed for my index

Cheers

Labels (1)
0 Karma
1 Solution

harsmarvania57
SplunkTrust
SplunkTrust

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)

View solution in original post

0 Karma

harsmarvania57
SplunkTrust
SplunkTrust

Hi,

Please try below query

index=reverse_proxy
| lookup ip_intel ip as src OUTPUT threat_key
| where isnotnull(threat_key)
0 Karma

hbfblueteam
New Member

Thank you, that has given me some results

Regards,
Marko

0 Karma

to4kawa
Ultra Champion

https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/Return

<count>
Syntax: <int>
Description: Specify the number of rows.
Default: 1, which is the first row of results passed into the command.

see reference.

0 Karma
Get Updates on the Splunk Community!

Splunk Security Content for Threat Detection & Response, Q1 Roundup

Join Principal Threat Researcher, Michael Haag, as he walks through:An introduction to the Splunk Threat ...

Splunk Life | Happy Pride Month!

Happy Pride Month, Splunk Community! &#x1f308; In the United States, as well as many countries around the ...

SplunkTrust | Where Are They Now - Michael Uschmann

The Background Five years ago, Splunk published several videos showcasing members of the SplunkTrust to share ...