Splunk Search

How to search for any source IP addresses that have more than one result and sourcetype within a 5 minute period?

502087470
New Member

I'm trying to run a search on search results. The first search would bring back various logs and sourcetypes. I want to take the finished search, look at any source IP addresses that have more than 1 result and more than 1 sourcetype within a 5 minute time period. Any idea's on how I might be able to do this?

0 Karma

esix_splunk
Splunk Employee
Splunk Employee

Without seeing your search results, these are all best guess...

... | bin span=5m _time |  stats count by source_ip sourcetype  _time | where count > 1

You can test this with internal logs easily :

index=_internal | stats count by sourcetype source _time | bin span=5m _time | where count > 1
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...