Hey @shivanshu1593 , As you suggested, What I have a tried is this: Here is my correlation search: | tstats summariesonly=true allow_old_summaries=true values(IDS_Attacks.dest) as "dest" dc(IDS_Attacks.dest) as "count" values(IDS_Attacks.signature) as signature from datamodel="Intrusion_Detection"."IDS_Attacks" where IDS_Attacks.severity!="informational" by "IDS_Attacks.src" "IDS_Attacks.severity" | rename "IDS_Attacks.src" as "src" "IDS_Attacks.severity" as severity | where 'count'>25 | search (src!=10.161.35.50 AND src!=161.16.157.154 AND src!=161.16.155.105 AND src!=161.16.156.118 AND src!=165.249.145.180 AND src!=10.160.8.170 AND src!=10.160.8.171 AND src!=10.160.8.172 AND src!=10.160.8.173 AND src!=10.172.8.170 AND src!=10.172.8.171) //Part where in want to input a lookup table | where ( NOT cidrmatch("13.59.252.0/25",src) AND NOT cidrmatch("13.56.21.128/25",src) AND NOT cidrmatch("35.177.219.0/26",src) AND NOT cidrmatch("13.210.1.64/26",src) AND NOT cidrmatch("54.175.125.192/26",src) AND NOT cidrmatch("54.219.188.128/26",src) AND NOT cidrmatch("54.93.254.128/26",src) AND NOT cidrmatch("54.255.254.0/26",src) AND NOT cidrmatch("10.161.69.43/32",src) AND NOT cidrmatch("10.161.69.44/32",src) AND NOT cidrmatch("161.16.157.80/32",src) AND NOT cidrmatch("161.16.157.64/32",src) AND NOT cidrmatch("161.16.157.138/32",src) AND NOT cidrmatch("161.16.157.213/32",src) AND NOT cidrmatch("161.16.157.216/32",src)) So here i have created a lookup table having all the CIDR BLOCKS in a excel with .csv extension. STEP1: My excel file looks like this: Step 2: Now I have converted this to .csv file Step3: Uploaded in lookup table. Step 4: Checking if file uploaded successfully: Step 5: Created a lookup definition as you suggested Go to settings -> lookups -> lookup definitions and see if a definition for your lookup exists or not (It should, cos that's required to make it available for searching.). If not there, then please create one. In the definition for your lookup, open it and click Advanced options and under Match Type, Please enter the following and click save. CIDR(cidr_match_src_ip) =è mine would be CIDR(CIDR) I have reduced the complexity let me know if this wrong or not. Step 6: Now checking if it has been successfully created Step 7: Now that every thing is in place lets run this query. | Your base search | search NOT [| inputlookup your_lookup_name.csv | rename cidr_match_src_ip as src_ip | fields src_ip] | Rest of your query. ==================MY QUERY ++++++++++++++++++++++++++++++++ | tstats summariesonly=true allow_old_summaries=true values(IDS_Attacks.dest) as "dest" dc(IDS_Attacks.dest) as "count" values(IDS_Attacks.signature) as signature from datamodel="Intrusion_Detection"."IDS_Attacks" where IDS_Attacks.severity!="informational" by "IDS_Attacks.src" "IDS_Attacks.severity" | rename "IDS_Attacks.src" as "src" "IDS_Attacks.severity" as severity | where 'count'>25 | search (src!=10.161.35.50 AND src!=161.16.157.154 AND src!=161.16.155.105 AND src!=161.16.156.118 AND src!=165.249.145.180 AND src!=10.160.8.170 AND src!=10.160.8.171 AND src!=10.160.8.172 AND src!=10.160.8.173 AND src!=10.172.8.170 AND src!=10.172.8.171) //Part where in will insert our methodology | search NOT [ | inputlookup cidr.csv | rename CIDR as src | fields src ] This does not works. ERROR I AM FACING ARE: The output stats is also not correct. If you could correct me where I am wrong would be great. Thanks, @commonman
... View more