Supported Cortex XSOAR versions: 5.5.0 and later.
GreyNoise tells security analysts what not to worry about. We do this by curating data on IPs that saturate security tools with noise. This unique perspective helps analysts confidently ignore irrelevant or harmless activity, creating more time to uncover and investigate true threats. The Action allows IP enrichment via the GreyNoise Community API.
This Integration is design specifically for GreyNoise Community users and only provides the subset of intel available
via the GreyNoise Community API.
The GreyNoise Integration should be used by customers with a paid subscription to GreyNoise.
This integration was integrated and tested with version 0.8.0 of GreyNoise Python SDK. Supported Cortex XSOAR versions: 5.5.0 and later.
Navigate to Settings > Integrations > Servers & Services.
Search for GreyNoise Community.
Click Add instance to create and configure a new integration instance.
Parameter Description Required api_key GreyNoise API Key True proxy Use system proxy settings False
Click Test to validate the URLs, token, and connection.
You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
Queries IPs in the GreyNoise Community API.
|List of IPs.
|The indicator that was tested.
|The actual score.
|The indicator type.
|The vendor used to calculate the score.
|Description of Malicious IP.
|Vendor Identifying IP as Malicious.
|The IP address of the scanning device IP.
|Whether the device has been categorized as unknown, benign, or malicious.
|The date the device was last observed by GreyNoise. Format is ISO8601.
|Link to the GreyNoise Visualizer record.
|Has the IP been seen scanning the Internet
|Is the IP part of a known benign service
|The overt actor the device has been associated with.
|Additional Information from API.