Splunk Search

How to identify an unusual source sending a high volume of emails, excluding VCP public wifi from the 172 Host?

AL3Z
Builder

Hi,

I'm trying to build a search query for the Unexpected Host Sending a Large Amount of Email  in which i need to Exclude the  vcp public wifi anything come from 172 Host.

| tstats `summariesonly` count from datamodel=Network_Traffic where All_Traffic.app=*smtp* ` `unexpected_host_sending_a_large_amount_of_email_filter` NOT All_Traffic.dest=167.228.0.0/16 by All_Traffic.src All_Traffic.dest All_Traffic.src_category _time span=1h | rename All_Traffic.* as * | bin _time span=1d as day | eventstats dc(day) as day_count by src | 

How to edit the search accordingly.
Thanks.

Labels (2)
0 Karma

AL3Z
Builder

@caiosalonso 

How do we exclude src_ip!=172.30.* AND FromZone!="WIRELESS_VCP_ACTIVATION" from  datamodel Network_Traffic its not working as expected.

0 Karma

caiosalonso
Path Finder

Hi,

Just to confirm, do you need to add a filter to exclude events from a specifc Source IP Address in this query?

0 Karma

AL3Z
Builder

yes

 

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...