GreyNoise
GreyNoise is a cybersecurity platform that collects and analyzes Internet-wide scan and attack traffic. With this integration, users can contextualize existing alerts, filter false-positives, identify compromised devices, and track emerging threats. This integration was integrated and tested with version 0.7.0 of GreyNoise. Supported Cortex XSOAR versions: 5.0.0 and later.
#
Configure GreyNoise on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for GreyNoise.
Click Add instance to create and configure a new integration instance.
Parameter Description Required apikey API Key True insecure Trust any certificate (not secure) False proxy Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipRuns reputation on IPs.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | List of IPs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
IP.address | string | IP address. |
IP.ASN | string | The autonomous system name for the IP address. |
IP.Hostname | string | The hostname that is mapped to IP address. |
IP.Geo.Country | string | The country in which the IP address is located. |
IP.Geo.Description | string | Additional information about the location such as city and region. |
IP.Malicious.Vendor | string | The vendor reporting the IP address as malicious. |
IP.Malicious.Description | string | A description explaining why the IP address was reported as malicious. |
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.first_seen | date | The date the device was first observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.last_seen | date | The date the device was last observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.seen | boolean | IP is in record with GreyNoise. |
GreyNoise.IP.tags | array | A list of the tags the device has been assigned over the past 90 days. |
GreyNoise.IP.actor | string | The overt actor the device has been associated with. |
GreyNoise.IP.spoofable | boolean | Boolean indicates if IP is spoofable. |
GreyNoise.IP.classification | string | Whether the device has been categorized as unknown, benign, or malicious. |
GreyNoise.IP.cve | array | CVEs associated with IP. |
GreyNoise.IP.vpn | boolean | Whether the device is VPN endpoint or not. |
GreyNoise.IP.vpn_service | string | The name of the VPN service provider of the device. |
GreyNoise.IP.metadata.asn | string | The autonomous system identification number. |
GreyNoise.IP.metadata.city | string | The city the device is geographically located in. |
GreyNoise.IP.metadata.region | string | The full name of the region the device is geographically located in. |
GreyNoise.IP.metadata.country | string | The full name of the country. |
GreyNoise.IP.metadata.country_code | string | The two-character country code of the country. |
GreyNoise.IP.metadata.organization | string | The organization that owns the network that the IP address belongs to. |
GreyNoise.IP.metadata.category | string | Whether the device belongs to a business, isp, hosting, education, or mobile network. |
GreyNoise.IP.metadata.tor | boolean | Whether or not the device is a known Tor exit node. |
GreyNoise.IP.metadata.rdns | string | Reverse DNS lookup of the IP address. |
GreyNoise.IP.metadata.os | string | The name of the operating system of the device. |
GreyNoise.IP.raw_data.scan.port | number | The port number(s) the devices has been observed scanning. |
GreyNoise.IP.raw_data.scan.protocol | string | The protocol of the port the device has been observed scanning. |
GreyNoise.IP.raw_data.web.paths | array | Any HTTP paths the device has been observed crawling the Internet for. |
GreyNoise.IP.raw_data.web.useragents | array | Any HTTP user-agents the device has been observed using while crawling the Internet. |
GreyNoise.IP.raw_data.ja3.fingerprint | string | The JA3 TLS/SSL fingerprint. |
GreyNoise.IP.raw_data.ja3.port | number | The corresponding TCP port for the given JA3 fingerprint. |
GreyNoise.IP.raw_data.hassh.fingerprint | string | HASSH hash fingerprint string. |
GreyNoise.IP.raw_data.hassh.port | number | TCP port connection where the HASSH hash was identified. |
#
Command Example!ip "71.6.135.131"
#
Human Readable Output#
IP: 71.6.135.131 found with Reputation: Good#
IP ContextIP | Classification | Actor | CVE | Spoofable | VPN | First Seen | Last Seen |
---|---|---|---|---|---|---|---|
71.6.135.131 | benign | Shodan.io | CVE-1999-0526, CVE-2013-6117, CVE-2019-0708 | false | false | 2017-09-20 | 2021-02-03 |
#
greynoise-ip-quick-checkCheck whether a given IP address is "Internet background noise", or has been observed scanning or attacking devices across the Internet. Note: It checks against the last 60 days of Internet scanner data.
#
Base Commandgreynoise-ip-quick-check
#
InputArgument Name | Description | Required |
---|---|---|
ip | List IP addresses to retrieve quick check about. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.noise | boolean | Whether the IP is internet background noise or attacking. |
GreyNoise.IP.code | string | Code which correlates to why GreyNoise labeled the IP as noise. |
GreyNoise.IP.code_value | string | Message which correlates to why GreyNoise labeled the IP as noise. |
#
Command Example!greynoise-ip-quick-check ip="45.83.65.120,45.83.66.18"
#
Human Readable Output#
IP Quick Check DetailsIP | Noise | Code | Code Description |
---|---|---|---|
45.83.66.18 | true | 0x01 | IP has been observed by the GreyNoise sensor network |
45.83.65.120 | true | 0x01 | IP has been observed by the GreyNoise sensor network |
#
greynoise-queryGet the information of IP based on the providence filters.
#
Base Commandgreynoise-query
#
InputArgument Name | Description | Required |
---|---|---|
classification | Classification of the device like unknown, benign, malicious. Possible values are: unknown, benign, malicious. | Optional |
spoofable | Whether the IP is spoofable or not. Possible values are: true, false. | Optional |
actor | The benign actor the device has been associated with. | Optional |
size | Maximum amount of results to grab. Default is 10. | Optional |
advanced_query | GNQL query to filter records. Note: It merges other arguments and takes higher precedence over the same argument if supplied. Example: malicious, spoofable:false SSH Scanner, spoofable:false classification:benign tags:POP3 Scanner cve:CVE-2010-0103. | Optional |
next_token | Scroll token to paginate through results. | Optional |
last_seen | The date the device was most recently observed by GreyNoise. Example: 1d, 2d, 12h, or 1m. | Optional |
organization | The organization that owns the network that the IP address belongs to. | Optional |
#
Advance QueryGNQL (GreyNoise Query Language) is a domain-specific query language that uses Lucene deep under the hood.
For more information on the syntax to write GNQL of argument advanced_query
, click here.
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.first_seen | date | The date the device was first observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.last_seen | date | The date the device was last observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.seen | boolean | IP is in record with GreyNoise. |
GreyNoise.IP.tags | array | A list of the tags the device has been assigned over the past 90 days. |
GreyNoise.IP.actor | string | The overt actor the device has been associated with. |
GreyNoise.IP.spoofable | boolean | Boolean indicates if IP is spoofable. |
GreyNoise.IP.classification | string | Whether the device has been categorized as unknown, benign, or malicious. |
GreyNoise.IP.cve | array | CVEs associated with IP. |
GreyNoise.IP.vpn | boolean | Whether the device is VPN endpoint or not. |
GreyNoise.IP.vpn_service | string | The name of the VPN service provider of the device. |
GreyNoise.IP.metadata.asn | string | The autonomous system identification number. |
GreyNoise.IP.metadata.city | string | The city the device is geographically located in. |
GreyNoise.IP.metadata.region | string | The full name of the region the device is geographically located in. |
GreyNoise.IP.metadata.country | string | The full name of the country. |
GreyNoise.IP.metadata.country_code | string | The two-character country code of the country. |
GreyNoise.IP.metadata.organization | string | The organization that owns the network that the IP address belongs to. |
GreyNoise.IP.metadata.category | string | Whether the device belongs to a business, isp, hosting, education, or mobile network. |
GreyNoise.IP.metadata.tor | boolean | Whether or not the device is a known Tor exit node. |
GreyNoise.IP.metadata.rdns | string | Reverse DNS lookup of the IP address. |
GreyNoise.IP.metadata.os | string | The name of the operating system of the device. |
GreyNoise.IP.raw_data.scan.port | number | The port number(s) the devices has been observed scanning. |
GreyNoise.IP.raw_data.scan.protocol | string | The protocol of the port the device has been observed scanning. |
GreyNoise.IP.raw_data.web.paths | array | Any HTTP paths the device has been observed crawling the Internet for. |
GreyNoise.IP.raw_data.web.useragents | array | Any HTTP user-agents the device has been observed using while crawling the Internet. |
GreyNoise.IP.raw_data.ja3.fingerprint | string | The JA3 TLS/SSL fingerprint. |
GreyNoise.IP.raw_data.ja3.port | number | The corresponding TCP port for the given JA3 fingerprint. |
GreyNoise.IP.raw_data.hassh.fingerprint | string | HASSH hash fingerprint string. |
GreyNoise.IP.raw_data.hassh.port | number | TCP port connection where the HASSH hash was identified. |
GreyNoise.Query.complete | boolean | Whether all results have been fetched or not. |
GreyNoise.Query.count | number | Count of the total matching records. |
GreyNoise.Query.message | string | Message from the API response. |
GreyNoise.Query.query | string | Query which was used to filter the records. |
GreyNoise.Query.scroll | string | Scroll token to paginate through results. |
#
Command Example!greynoise-query spoofable=true size=1 advanced_query="spoofable:false"
#
Human Readable Output#
Total findings: 2846548#
IP ContextIP | Classification | Actor | CVE | Spoofable | VPN | First Seen | Last Seen |
---|---|---|---|---|---|---|---|
71.6.135.131 | benign | Shodan.io | CVE-1999-0526, CVE-2013-6117, CVE-2019-0708 | false | false | 2017-09-20 | 2021-02-03 |
#
Next Page Token:DnF1ZXJ5VGhlbkZldGNoBQAAAAAcV1_HFkFKSExEdUc4VEtta2
To view the detailed query result please click here.
#
greynoise-statsGet aggregate statistics for the top organizations, actors, tags, ASNs, countries, classifications, and operating systems of all the results of a given GNQL query.
#
Base Commandgreynoise-stats
#
InputArgument Name | Description | Required |
---|---|---|
classification | Classification of the device like unknown, benign, malicious. Possible values are: unknown, benign, malicious. | Optional |
spoofable | Whether the IP is spoofable or not. Possible values are: true, false. | Optional |
actor | The benign actor the device has been associated with. | Optional |
size | Maximum amount of results to grab. Default is 10. | Optional |
advanced_query | GNQL query to filter records. Note: It merges other arguments and takes higher precedence over the same argument if supplied. Example: malicious, spoofable:false SSH Scanner, spoofable:false classification:benign tags:POP3 Scanner cve:CVE-2010-0103. | Optional |
last_seen | The date the device was most recently observed by GreyNoise. Example: 1d, 2d, 12h, or 1m. | Optional |
organization | The organization that owns the network that the IP address belongs to. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.Stats.query | string | The query which was used to filter the records. |
GreyNoise.Stats.count | number | Count of total aggregated records. |
GreyNoise.Stats.stats.classifications.classification | string | Classification name. |
GreyNoise.Stats.stats.classifications.count | number | Classification count. |
GreyNoise.Stats.stats.spoofable.spoofable | boolean | Whether records are spoofable or not. |
GreyNoise.Stats.stats.spoofable.count | number | Spoofable count. |
GreyNoise.Stats.stats.organizations.organization | string | Organization name. |
GreyNoise.Stats.stats.organizations.count | number | Organization count. |
GreyNoise.Stats.stats.actors.actor | string | Actor name. |
GreyNoise.Stats.stats.actors.count | number | Actor count. |
GreyNoise.Stats.stats.countries.country | string | Country name. |
GreyNoise.Stats.stats.countries.count | number | Country count. |
GreyNoise.Stats.stats.tags.tag | string | Tag name. |
GreyNoise.Stats.stats.tags.count | number | Tag count. |
GreyNoise.Stats.stats.operating_systems.operating_system | string | Operating system name. |
GreyNoise.Stats.stats.operating_systems.count | number | Operating system count. |
GreyNoise.Stats.stats.categories.category | string | Category name. |
GreyNoise.Stats.stats.categories.count | number | Category count. |
GreyNoise.Stats.stats.asns.asn | string | Asn name. |
GreyNoise.Stats.stats.asns.count | number | Asn count. |
#
Command Example!greynoise-stats spoofable=true size=2 advanced_query="spoofable:false
#
Human Readable Output#
Stats#
Query: spoofable:false Count: 2846548#
ClassificationsClassification | Count |
---|---|
unknown | 1838719 |
malicious | 998758 |
#
SpoofableSpoofable | Count |
---|---|
False | 2846548 |
#
OrganizationsOrganization | Count |
---|---|
CHINA UNICOM China169 Backbone | 252542 |
CHINANET-BACKBONE | 244599 |
#
ActorsActor | Count |
---|---|
GoogleBot | 2202 |
#
CountriesCountry | Count |
---|---|
China | 562209 |
Iran | 376353 |
#
TagsTag | Count |
---|---|
SMB Scanner | 592090 |
Web Scanner | 578058 |
#
Operating SystemsOperating System | Count |
---|---|
Linux 2.2-3.x | 1202422 |
Windows 7/8 | 727215 |
#
CategoriesCategory | Count |
---|---|
isp | 2263259 |
mobile | 348306 |
#
ASNsASN | Count |
---|---|
AS4837 | 252542 |
AS4134 | 244603 |