If memory serves, the tokens are limited to the following:
sid
rid
time
earliest
latest
action_name
That said if you "redirect" to the search bar, or a custom dashboard with something like the below,
"/SplunkEnterpriseSecuritySuite/search?q=search notable | search orig_sid=$sid$&earliest=-24h&latest=now"
That should pull up the notables associated with that sid (which is what incident review is basically doing already, it's just an example), you could of course change that search to go looking for IP addresses or other information - but the short answer is that those fields can't get passed into a new view from incident review - you need to figure out how to surface them manually.
... View more