GreyNoise
GreyNoise Pack.#
This Integration is part of theGreyNoise is a cybersecurity platform that collects and analyzes Internet-wide scan and attack traffic. With this integration, users can contextualize existing alerts, filter false-positives, identify compromised devices, and track emerging threats. This integration was integrated and tested with version 2.0.1 of the GreyNoise SDK. Supported Cortex XSOAR versions: 5.5.0 and later.
#
Configure GreyNoise on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for GreyNoise.
Click Add instance to create and configure a new integration instance.
Parameter Description Required apikey API Key False insecure Trust any certificate (not secure) False proxy Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
ipRuns reputation on IPs.
#
Base Commandip
#
InputArgument Name | Description | Required |
---|---|---|
ip | A comma-separated list of IPs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Score | Number | The actual score. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
IP.Address | string | IP address. |
IP.ASN | string | The autonomous system name for the IP address. |
IP.Hostname | string | The hostname that is mapped to IP address. |
IP.Geo.Country | string | The country in which the IP address is located. |
IP.Geo.Description | string | Additional information about the location such as city and region. |
IP.Malicious.Vendor | string | The vendor reporting the IP address as malicious. |
IP.Malicious.Description | string | A description explaining why the IP address was reported as malicious. |
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.first_seen | date | The date the device was first observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.last_seen | date | The date the device was last observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.seen | boolean | IP is in record with GreyNoise. |
GreyNoise.IP.tags | array | A list of the tags the device has been assigned over the past 90 days. |
GreyNoise.IP.actor | string | The overt actor the device has been associated with. |
GreyNoise.IP.spoofable | boolean | Boolean indicates if IP is spoofable. |
GreyNoise.IP.classification | string | Whether the device has been categorized as unknown, benign, or malicious. |
GreyNoise.IP.cve | array | CVEs associated with IP. |
GreyNoise.IP.metadata.asn | string | The autonomous system identification number. |
GreyNoise.IP.metadata.city | string | The city the device is geographically located in. |
GreyNoise.IP.metadata.region | string | The full name of the region the device is geographically located in. |
GreyNoise.IP.metadata.country | string | The full name of the country. |
GreyNoise.IP.metadata.country_code | string | The two-character country code of the country. |
GreyNoise.IP.metadata.organization | string | The organization that owns the network that the IP address belongs to. |
GreyNoise.IP.metadata.category | string | Whether the device belongs to a business, isp, hosting, education, or mobile network. |
GreyNoise.IP.metadata.tor | boolean | Whether or not the device is a known Tor exit node. |
GreyNoise.IP.metadata.rdns | string | Reverse DNS lookup of the IP address. |
GreyNoise.IP.metadata.os | string | The name of the operating system of the device. |
GreyNoise.IP.metadata.destination_countries | array | The list of countries targeted by scanning. |
GreyNoise.IP.vpn | boolean | Whether the device is VPN endpoint or not. |
GreyNoise.IP.vpn_service | string | The name of the VPN service provider of the device. |
GreyNoise.IP.raw_data.scan.port | number | The port number(s) the devices has been observed scanning. |
GreyNoise.IP.raw_data.scan.protocol | string | The protocol of the port the device has been observed scanning. |
GreyNoise.IP.raw_data.web.paths | array | Any HTTP paths the device has been observed crawling the Internet for. |
GreyNoise.IP.raw_data.web.useragents | array | Any HTTP user-agents the device has been observed using while crawling the Internet. |
GreyNoise.IP.raw_data.ja3.fingerprint | string | The JA3 TLS/SSL fingerprint. |
GreyNoise.IP.raw_data.ja3.port | number | The corresponding TCP port for the given JA3 fingerprint. |
GreyNoise.IP.raw_data.hassh.fingerprint | string | HASSH hash fingerprint string. |
GreyNoise.IP.raw_data.hassh.port | number | TCP port connection where the HASSH hash was identified. |
GreyNoise.IP.bot | Boolean | Whether the IP is associated with known bot activity or not. Common examples include credential stuffing, content scraping, or brute force attacks. |
#
IP: 66.249.68.82 found with Noise Reputation: Good#
GreyNoise Context IP LookupIP | Classification | Actor | Tags | Spoofable | VPN | BOT | Tor | First Seen | Last Seen |
---|---|---|---|---|---|---|---|---|---|
66.249.68.82 | benign | GoogleBot | TLS/SSL Crawler, Web Crawler | false | false | false | false | 2021-05-30 | 2021-09-16 |
#
IP: 66.249.68.82 found with RIOT Reputation: Good#
Belongs to Common Business Service: Google#
GreyNoise RIOT IP LookupIP | Category | Name | Trust Level | Description | Last Updated |
---|---|---|---|---|---|
66.249.68.82 | software | 1 - Reasonably Ignore | Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, a search engine, cloud computing, software, and hardware. | 2021-09-16T17:53:00Z |
#
greynoise-ip-quick-checkCheck whether a given IP address is "Internet background noise", or has been observed scanning or attacking devices across the Internet. Note: It checks against the last 60 days of Internet scanner data.
#
Base Commandgreynoise-ip-quick-check
#
InputArgument Name | Description | Required |
---|---|---|
ip | List IP addresses to retrieve quick check about. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.noise | boolean | Whether the IP is internet background noise or attacking. |
GreyNoise.IP.riot | string | Whether the IP is a common business service. |
GreyNoise.IP.code | string | Code which correlates to why GreyNoise labeled the IP as noise. |
GreyNoise.IP.code_value | string | Message which correlates to why GreyNoise labeled the IP as noise. |
#
Command Example!greynoise-ip-quick-check ip="45.83.65.120,45.83.66.18"
#
Human Readable Output#
IP Quick Check DetailsIP | Noise | Code | Code Description |
---|---|---|---|
45.83.66.18 | true | 0x01 | IP has been observed by the GreyNoise sensor network |
45.83.65.120 | true | 0x01 | IP has been observed by the GreyNoise sensor network |
#
greynoise-queryGet the information of IP based on the providence filters.
#
Base Commandgreynoise-query
#
InputArgument Name | Description | Required |
---|---|---|
last_seen | The date the device was most recently observed by GreyNoise. Example: 1d, 2d, 12h, or 1m. | Optional |
organization | The organization that owns the network the IP address belongs to. | Optional |
classification | Classification of the device. Possible values: unknown, benign, malicious. Possible values are: unknown, benign, malicious. | Optional |
spoofable | Whether the IP is spoofable or not. Possible values are: true, false. Default is false. | Optional |
actor | The actor the device has been associated with. | Optional |
cve | A CVE to get scanning data about, example CVE-2021-12345. | Optional |
size | Maximum amount of results to grab. Default is 10. | Optional |
advanced_query | GNQL query to filter records. Note: It merges other arguments and takes higher precedence over the same argument if supplied. Example: malicious, spoofable:false SSH Scanner, spoofable:false classification:benign tags:POP3 Scanner cve:CVE-2010-0103. | Optional |
next_token | Scroll token to paginate through results. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.first_seen | date | The date the device was first observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.last_seen | date | The date the device was last observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.seen | boolean | IP is in record with GreyNoise. |
GreyNoise.IP.tags | array | A list of the tags the device has been assigned over the past 90 days. |
GreyNoise.IP.actor | string | The overt actor the device has been associated with. |
GreyNoise.IP.spoofable | boolean | Boolean indicates if IP is spoofable. |
GreyNoise.IP.classification | string | Whether the device has been categorized as unknown, benign, or malicious. |
GreyNoise.IP.cve | array | CVEs associated with IP. |
GreyNoise.IP.metadata.asn | string | The autonomous system identification number. |
GreyNoise.IP.metadata.city | string | The city the device is geographically located in. |
GreyNoise.IP.metadata.category | string | Whether the device belongs to a business, isp, hosting, education, or mobile network. |
GreyNoise.IP.metadata.country | string | The full name of the country. |
GreyNoise.IP.metadata.country_code | string | The two-character country code of the country. |
GreyNoise.IP.metadata.destination_countries | array | The list of countries targeted by scanning. |
GreyNoise.IP.metadata.destination_county_codes | array | The list of countries (codes) targeted by scanning. |
GreyNoise.IP.metadata.organization | string | The organization that owns the network that the IP address belongs to. |
GreyNoise.IP.metadata.os | string | The name of the operating system of the device. |
GreyNoise.IP.metadata.rdns | string | Reverse DNS lookup of the IP address. |
GreyNoise.IP.metadata.region | string | The full name of the region the device is geographically located in. |
GreyNoise.IP.metadata.sensor_count | number | The number of sensors that observed activity from this IP. |
GreyNoise.IP.metadata.sensor_hits | number | The number of sensors events recorded from this IP. |
GreyNoise.IP.metadata.source_country | string | The full name of the IP source country. |
GreyNoise.IP.metadata.source_country_code | string | The country code of the IP source country. |
GreyNoise.IP.metadata.tor | boolean | Whether or not the device is a known Tor exit node. |
GreyNoise.IP.vpn | boolean | Whether the device is VPN endpoint or not. |
GreyNoise.IP.vpn_service | string | The name of the VPN service provider of the device. |
GreyNoise.IP.raw_data.scan.port | number | The port number(s) the devices has been observed scanning. |
GreyNoise.IP.raw_data.scan.protocol | string | The protocol of the port the device has been observed scanning. |
GreyNoise.IP.raw_data.web.paths | array | Any HTTP paths the device has been observed crawling the Internet for. |
GreyNoise.IP.raw_data.web.useragents | array | Any HTTP user-agents the device has been observed using while crawling the Internet. |
GreyNoise.IP.raw_data.ja3.fingerprint | string | The JA3 TLS/SSL fingerprint. |
GreyNoise.IP.raw_data.ja3.port | number | The corresponding TCP port for the given JA3 fingerprint. |
GreyNoise.IP.raw_data.hassh.fingerprint | string | HASSH hash fingerprint string. |
GreyNoise.IP.raw_data.hassh.port | number | TCP port connection where the HASSH hash was identified. |
GreyNoise.Query.complete | boolean | Whether all results have been fetched or not. |
GreyNoise.Query.count | number | Count of the total matching records. |
GreyNoise.Query.message | string | Message from the API response. |
GreyNoise.Query.query | string | Query which was used to filter the records. |
GreyNoise.Query.scroll | string | Scroll token to paginate through results. |
GreyNoise.IP.bot | Boolean | Whether the IP is associated with known bot activity or not. Common examples include credential stuffing, content scraping, or brute force attacks. |
#
Total findings: 2846548#
IP ContextIP | Classification | Actor | CVE | Spoofable | VPN | First Seen | Last Seen |
---|---|---|---|---|---|---|---|
71.6.135.131 | benign | Shodan.io | CVE-1999-0526 ,CVE-2013-6117, CVE-2019-0708 | false | false | 2017-09-20 | 2021-02-03 |
#
Next Page Token:DnF1ZXJ5VGhlbkZldGNoBQAAAAAcV1_HFkFKSExEdUc4VEtta2
To view the detailed query result please click here.
#
greynoise-statsGet aggregate statistics for the top organizations, actors, tags, ASNs, countries, classifications, and operating systems of all the results of a given GNQL query.
#
Base Commandgreynoise-stats
#
InputArgument Name | Description | Required |
---|---|---|
classification | Classification of the device like unknown, benign, malicious. Possible values are: unknown, benign, malicious. | Optional |
spoofable | Whether the IP is spoofable or not. Possible values are: true, false. | Optional |
actor | The benign actor the device has been associated with. | Optional |
size | Maximum amount of results to grab. Default is 10. | Optional |
advanced_query | GNQL query to filter records. Note: It merges other arguments and takes higher precedence over the same argument if supplied. Example: malicious, spoofable:false SSH Scanner, spoofable:false classification:benign tags:POP3 Scanner cve:CVE-2010-0103. | Optional |
last_seen | The date the device was most recently observed by GreyNoise. Example: 1d, 2d, 12h, or 1m. | Optional |
organization | The organization that owns the network that the IP address belongs to. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.Stats.query | string | The query which was used to filter the records. |
GreyNoise.Stats.count | number | Count of total aggregated records. |
GreyNoise.Stats.stats.classifications.classification | string | Classification name. |
GreyNoise.Stats.stats.classifications.count | number | Classification count. |
GreyNoise.Stats.stats.spoofable.spoofable | boolean | Whether records are spoofable or not. |
GreyNoise.Stats.stats.spoofable.count | number | Spoofable count. |
GreyNoise.Stats.stats.organizations.organization | string | Organization name. |
GreyNoise.Stats.stats.organizations.count | number | Organization count. |
GreyNoise.Stats.stats.actors.actor | string | Actor name. |
GreyNoise.Stats.stats.actors.count | number | Actor count. |
GreyNoise.Stats.stats.countries.country | string | Country name. |
GreyNoise.Stats.stats.countries.count | number | Country count. |
GreyNoise.Stats.stats.source_countries.country | string | Country name. |
GreyNoise.Stats.stats.source_countries.count | number | Country count. |
GreyNoise.Stats.stats.destination_countries.country | string | Country name. |
GreyNoise.Stats.stats.destination_countries.count | number | Country count. |
GreyNoise.Stats.stats.tags.tag | string | Tag name. |
GreyNoise.Stats.stats.tags.count | number | Tag count. |
GreyNoise.Stats.stats.operating_systems.operating_system | string | Operating system name. |
GreyNoise.Stats.stats.operating_systems.count | number | Operating system count. |
GreyNoise.Stats.stats.categories.category | string | Category name. |
GreyNoise.Stats.stats.categories.count | number | Category count. |
GreyNoise.Stats.stats.asns.asn | string | Asn name. |
GreyNoise.Stats.stats.asns.count | number | Asn count. |
#
Command Example!greynoise-stats spoofable=true size=2 advanced_query="spoofable:false
#
Human Readable Output#
Stats#
Query: spoofable:false Count: 2846548#
ClassificationsClassification | Count |
---|---|
unknown | 1838719 |
malicious | 998758 |
#
SpoofableSpoofable | Count |
---|---|
False | 2846548 |
#
OrganizationsOrganization | Count |
---|---|
CHINA UNICOM China169 Backbone | 252542 |
CHINANET-BACKBONE | 244599 |
#
ActorsActor | Count |
---|---|
GoogleBot | 2202 |
#
Source CountriesCountry | Count |
---|---|
China | 562209 |
Iran | 376353 |
#
Destination CountriesCountry | Count |
---|---|
China | 562209 |
Iran | 376353 |
#
TagsTag | Count |
---|---|
SMB Scanner | 592090 |
Web Scanner | 578058 |
#
Operating SystemsOperating System | Count |
---|---|
Linux 2.2-3.x | 1202422 |
Windows 7/8 | 727215 |
#
CategoriesCategory | Count |
---|---|
isp | 2263259 |
mobile | 348306 |
#
ASNsASN | Count |
---|---|
AS4837 | 252542 |
AS4134 | 244603 |
#
greynoise-riotIdentifies IPs from known benign services and organizations that commonly cause false positives in network security and threat intelligence products. The collection of IPs in RIOT is continually curated and verified to provide accurate results. These IPs are extremely unlikely to pose a threat to your network.
#
Base Commandgreynoise-riot
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP address to be checked if it is potentially harmful or not. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.Riot.ip | String | The IP given to check riot information about. |
GreyNoise.Riot.riot | String | The riot of the IP. "True" or "False". |
GreyNoise.Riot.category | String | The category of the IP if riot is "True". |
GreyNoise.Riot.name | String | The name of the IP if the riot is "True". |
GreyNoise.Riot.description | String | The description of the IP if riot is "True". |
GreyNoise.Riot.explanation | String | The explanation of the IP if riot is "True". |
GreyNoise.Riot.last_updated | Date | The last updated time of the IP if the riot is "True". |
GreyNoise.Riot.reference | String | The reference of the IP if riot is "True". |
GreyNoise.Riot.trust_level | String | The trust level of the IP if riot is "True". |
#
GreyNoise: IP Belongs to Common Business ServiceIP | Category | Name | Trust Level | Description | Last Updated |
---|---|---|---|---|---|
8.8.8.8 | public_dns | Google Public DNS | 1 - Reasonably Ignore | Google's global domain name system (DNS) resolution service. | 2021-04-12T05:55:35Z |
!greynoise-riot ip="114.119.130.178"
#
Human Readable Output#
GreyNoise: IP Not Found in RIOTIP | RIOT |
---|---|
114.119.130.178 | false |
#
greynoise-contextIdentifies IPs that have been observed mass-scanning the internet.
#
Base Commandgreynoise-context
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP address to query in GreyNoise Context Command. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.IP.address | string | The IP address of the scanning device IP. |
GreyNoise.IP.first_seen | date | The date the device was first observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.last_seen | date | The date the device was last observed by GreyNoise. Format is ISO8601. |
GreyNoise.IP.seen | boolean | IP is in record with GreyNoise. |
GreyNoise.IP.tags | array | A list of the tags the device has been assigned over the past 90 days. |
GreyNoise.IP.actor | string | The overt actor the device has been associated with. |
GreyNoise.IP.spoofable | boolean | Boolean indicates if IP is spoofable. |
GreyNoise.IP.classification | string | Whether the device has been categorized as unknown, benign, or malicious. |
GreyNoise.IP.cve | array | CVEs associated with IP. |
GreyNoise.IP.metadata.asn | string | The autonomous system identification number. |
GreyNoise.IP.metadata.city | string | The city the device is geographically located in. |
GreyNoise.IP.metadata.category | string | Whether the device belongs to a business, isp, hosting, education, or mobile network. |
GreyNoise.IP.metadata.country | string | The full name of the country. |
GreyNoise.IP.metadata.country_code | string | The two-character country code of the country. |
GreyNoise.IP.metadata.destination_countries | array | The list of countries targeted by scanning. |
GreyNoise.IP.metadata.destination_county_codes | array | The list of countries (codes) targeted by scanning. |
GreyNoise.IP.metadata.organization | string | The organization that owns the network that the IP address belongs to. |
GreyNoise.IP.metadata.os | string | The name of the operating system of the device. |
GreyNoise.IP.metadata.rdns | string | Reverse DNS lookup of the IP address. |
GreyNoise.IP.metadata.region | string | The full name of the region the device is geographically located in. |
GreyNoise.IP.metadata.sensor_count | number | The number of sensors that observed activity from this IP. |
GreyNoise.IP.metadata.sensor_hits | number | The number of sensors events recorded from this IP. |
GreyNoise.IP.metadata.source_country | string | The full name of the IP source country. |
GreyNoise.IP.metadata.source_country_code | string | The country code of the IP source country. |
GreyNoise.IP.metadata.tor | boolean | Whether or not the device is a known Tor exit node. |
GreyNoise.IP.vpn | boolean | Whether the device is VPN endpoint or not. |
GreyNoise.IP.vpn_service | string | The name of the VPN service provider of the device. |
GreyNoise.IP.raw_data.scan.port | number | The port number(s) the devices has been observed scanning. |
GreyNoise.IP.raw_data.scan.protocol | string | The protocol of the port the device has been observed scanning. |
GreyNoise.IP.raw_data.web.paths | array | Any HTTP paths the device has been observed crawling the Internet for. |
GreyNoise.IP.raw_data.web.useragents | array | Any HTTP user-agents the device has been observed using while crawling the Internet. |
GreyNoise.IP.raw_data.ja3.fingerprint | string | The JA3 TLS/SSL fingerprint. |
GreyNoise.IP.raw_data.ja3.port | number | The corresponding TCP port for the given JA3 fingerprint. |
GreyNoise.IP.raw_data.hassh.fingerprint | string | HASSH hash fingerprint string. |
GreyNoise.IP.raw_data.hassh.port | number | TCP port connection where the HASSH hash was identified. |
GreyNoise.IP.bot | Boolean | Whether the IP is associated with known bot activity or not. Common examples include credential stuffing, content scraping, or brute force attacks. |
#
Benign IPIP: 66.249.68.82 found with Noise Reputation: Good
IP | Classification | Actor | Tags | Spoofable | VPN | BOT | Tor | First Seen | Last Seen |
---|---|---|---|---|---|---|---|---|---|
66.249.68.82 | 66.249.68.82 | GoogleBot | TLS/SSL Crawler, Web Crawler | false | false | false | false | 2021-05-30 | 2021-09-16 |
!greynoise-context ip="114.119.130.178"
#
Human Readable Output#
Unidentified IPIP: 103.21.244.0 No Mass-Internet Scanning Noise Found
IP | Seen |
---|---|
103.21.244.0 | false |
#
greynoise-similarityIdentify IPs with a similar internet scanning profile.
#
Base Commandgreynoise-similarity
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP address to find similar IPs for | Required |
minimum_score | The similar score to return results above. Valid from 85 to 100. Default is 90. | Optional |
maximum_results | The maximum number of similar results to return. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.Similar.ip | string | The IP address of the scanning device IP. |
GreyNoise.Similar.first_seen | date | The date the device was first observed by GreyNoise. Format is ISO8601. |
GreyNoise.Similar.last_seen | date | The date the device was last observed by GreyNoise. Format is ISO8601. |
GreyNoise.Similar.actor | string | The overt actor the device has been associated with. |
GreyNoise.Similar.classification | string | Whether the device has been categorized as unknown, benign, or malicious. |
GreyNoise.Similar.asn | string | The autonomous system identification number. |
GreyNoise.Similar.city | string | The city the device is geographically located in. |
GreyNoise.Similar.country | string | The full name of the country. |
GreyNoise.Similar.country_code | string | The two-character country code of the country. |
GreyNoise.Similar.organization | string | The organization that owns the network that the IP address belongs to. |
GreyNoise.Similar.similar_ips | array | Details of similar IPs |
#
Command Example !greynoise-similarity ip="1.2.3.4" minimum_score="90" maximum_results="50"
#
Human Readable OutputIP: 59.88.225.2 - Similar Internet Scanners found in GreyNoise Total Similar IPs with Score above 90%: 100 Displaying 50 results below. To see all results, visit the GreyNoise Visualizer. GreyNoise Similar IPs
IP | Score | Classification | Actor | Organization | Last Seen | Similarity Features |
---|---|---|---|---|---|---|
1.2.3.4 | 100 | malicious | unknown | GoogleBot | 2023-04-05 | ports,spoofable_bool |
!greynoise-similarity ip="114.119.130.178"
#
Human Readable OutputGreyNoise Similarity Lookup returned No Results.
#
greynoise-similarityIdentify IPs with a similar internet scanning profile.
#
Base Commandgreynoise-similarity
#
InputArgument Name | Description | Required |
---|---|---|
ip | The IP address to find similar IPs for | Required |
days | The number of days from today to get activity. Valid from 1 to 90. Default is 30. | Optional |
maximum_results | The maximum number of similar results to return. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
GreyNoise.Timeline.ip | string | The IP address of the scanning device IP. |
GreyNoise.Timeline.metadata.start_time | date | The start time of the activity period |
GreyNoise.Timeline.metadata.end_time | date | The end time of the activity period |
GreyNoise.Timeline.metadata.limit | string | Limit of activity events returned |
GreyNoise.Timeline.metadata.next_cursor | string | Cursor value to pull next page of results |
GreyNoise.Timeline.activity | array | Daily activity summaries |
#
Command Example !greynoise-timeline ip="1.1.2.2" days="30" maximum_results="30"
#
Human Readable OutputIP: 45.164.214.212 - GreyNoise IP Timeline Internet Scanner Timeline Details - Daily Activity Summary
Date | Classification | Tags | rDNS | Organization | ASN | Ports | Web Paths | User Agents |
---|---|---|---|---|---|---|---|---|
1.2.3.4 | malicious | BruteForcer | me.acme.lcl | Acme, Inc | AS12345 | ports,spoofable_bool | /root/home | MozillaFirefox |
!greynoise-timeline ip="1.1.2.2" days="30" maximum_results="30"
#
Human Readable OutputGreyNoise IP Timeline Returned No Results.
#
cveQueries GreyNoise for CVE Vuln Intelligence.
#
Base Commandcve
#
InputArgument Name | Description | Required |
---|---|---|
cve | A comma-separated list of CVE IDs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
CVE.ID | string | CVE ID. |
GreyNoise.CVE.details.vulnerability_name | String | The vulnerability name. |
GreyNoise.CVE.details.vulnerability_description | String | A description of the vulnerability. |
GreyNoise.CVE.details.cve_cvss_score | Number | The CVSS score. |
GreyNoise.CVE.details.product | String | The vulnerable product. |
GreyNoise.CVE.details.vendor | String | The vendor that produces the vulnerable product. |
GreyNoise.CVE.details.published_to_nist_nvd | Boolean | Is this CVE published to NIST NVD? |
GreyNoise.CVE.timeline.cve_published_date | Date | When was the CVE published. |
GreyNoise.CVE.timeline.cve_last_updated_date | Date | When was the CVE information last updated. |
GreyNoise.CVE.timeline.first_known_published_date | Date | When first exploit associated with CVE was published. |
GreyNoise.CVE.timeline.cisa_kev_date_added | Date | When the CVE was added to KEV. |
GreyNoise.CVE.exploitation_details.attack_vector | String | The attack vector category. |
GreyNoise.CVE.exploitation_details.exploit_found | Boolean | Whether any known exploits are available. |
GreyNoise.CVE.exploitation_details.exploitation_registered_in_kev | Boolean | Whether exploitation has been registered in KEV database. |
GreyNoise.CVE.exploitation_details.epss_score | Number | EPSS score associated with this exploitation (Exploit Prediction Scoring System). |
GreyNoise.CVE.exploitation_stats.number_of_available_exploits | Number | The total number of exploits available (public + commercial). |
GreyNoise.CVE.exploitation_stats.number_of_threat_actors_exploiting_vulnerability | Number | The total number of known threat actors. |
GreyNoise.CVE.exploitation_stats.number_of_botnets_exploiting_vulnerability | Number | The total number of botnets. |
GreyNoise.CVE.exploitation_activity.activity_seen | Boolean | Whether GreyNoise has seen activity. |
GreyNoise.CVE.exploitation_activity.benign_ip_count_1d | Number | The total number of benign IP addresses GreyNoise has seen exercising (Scanning or Exploiting) this vulnerability in the last day. |
GreyNoise.CVE.exploitation_activity.benign_ip_count_10d | Number | The total number of benign IP addresses GreyNoise has seen exercising (Scanning or Exploiting) this vulnerability in the last 10 days. |
GreyNoise.CVE.exploitation_activity.benign_ip_count_30d | Number | The total number of benign IP addresses GreyNoise has seen exercising (Scanning or Exploiting) this vulnerability in the last 30 days. |
GreyNoise.CVE.exploitation_activity.threat_ip_count_1d | Number | The total number of threat IP addresses GreyNoise has seen exercising (Scanning or Exploiting) this vulnerability in the last day. |
GreyNoise.CVE.exploitation_activity.threat_ip_count_10d | Number | The total number of threat IP addresses GreyNoise has seen exercising (Scanning or Exploiting) this vulnerability in the last 10 days. |
GreyNoise.CVE.exploitation_activity.threat_ip_count_30d | Number | The total number of threat IP addresses GreyNoise has seen exercising (Scanning or Exploiting) this vulnerability in the last 30 days. |
DBotScore.Indicator | String | The indicator that was tested. |
DBotScore.Type | String | The indicator type. |
DBotScore.Vendor | String | The vendor used to calculate the score. |
DBotScore.Score | Number | The actual score. |
#
Command Example !cve cve="CVE-1950-12345"
#
Human Readable OutputCVE: CVE-2021-26086 is found GreyNoise CVE Lookup
key | value |
---|---|
CVE ID | CVE-2021-26086 |
CVSS | 5.3 |
Vendor | Atlassian |
Product | Jira Server and Data Center |
Published to NVD | true |