Publisher: GreyNoise
Connector Version: 2.3.3
Product Vendor: GreyNoise
Product Name: GreyNoise
Minimum Product Version: 5.5.0
This app provides investigative capabilities using the GreyNoise plugin
This table lists the configuration variables required to operate GreyNoise for SOAR. These variables are specified when configuring a GreyNoise asset in Splunk SOAR.
VARIABLE | REQUIRED | TYPE | DESCRIPTION |
---|---|---|---|
api_key | required | password | API Key for GreyNoise |
on_poll_query | optional | string | GNQL query to use for the on poll action |
on_poll_size | optional | numeric | The number of results to return for the interval/schedule poll |
license_type | optional | string | GreyNoise license type |
test connectivity - Validate the asset configuration for connectivity using the supplied configuration
lookup ip - Lookup IP using GreyNoise API Quick Check Endpoint
riot lookup ip - Lookup IP using GreyNoise's RIOT endpoint
ip reputation - Get full GreyNoise reputation and context for a specific IP
gnql query - Use the GreyNoise Query Language to run a query
lookup ips - Lookup IPs using GreyNoise API Multi Quick Check Endpoint (comma-separated, limit 500 per request)
on poll - Get details on a specific GNQL query
community lookup ip - Lookup IP using GreyNoise's free community endpoint
similar noise ips - Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool
noise ip timeline - Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool
Validate the asset configuration for connectivity using the supplied configuration
Type: test
Read only: True
Tests the connection to the paid GreyNoise API.
No parameters are required for this action
No Output
Lookup IP using GreyNoise API Quick Check Endpoint
Type: investigate
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP to query | string | ip |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
71.6.135.131 |
action_result.data.*.code | string | 0x00 0x01 | |
action_result.data.*.code_message | string | The IP has never been observed scanning the Internet The IP has been observed by the GreyNoise sensor network | |
action_result.data.*.noise | boolean | True False | |
action_result.data.*.riot | boolean | True False | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Lookup IP using GreyNoise's RIOT endpoint
Type: investigate
Read only: True
RIOT identifies IPs from known benign services and organizations that commonly cause false positives in network security and threat intelligence products. The collection of IPs in RIOT is continually curated and verified to provide accurate results.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP to query | string | ip |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
71.6.135.131 |
action_result.data.*.category | string | public_dns | |
action_result.data.*.description | string | Global domain name system (DNS) resolution service. | |
action_result.data.*.explanation | string | Public DNS services are used as alternatives to ISP's name servers. You may see devices on your network communicating with Public DNS over port XX/TCP or XX/UDP to resolve DNS lookups. | |
action_result.data.*.last_updated | string | 2021-05-26T17:55:35Z | |
action_result.data.*.name | string | Public DNS | |
action_result.data.*.reference | string | url |
https://developers.google.com/speed/public-dns/docs/isp#alternative |
action_result.data.*.riot | boolean | True False | |
action_result.data.*.trust_level | string | 1 2 | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get full GreyNoise reputation and context for a specific IP
Type: investigate
Read only: True
Get more information about a given IP address. Returns time ranges, IP metadata (network owner, ASN, reverse DNS pointer, country), associated actors, activity tags, raw port scan, and web request information.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP to query | string | ip |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
71.6.135.131 |
action_result.data.*.actor | string | Shodan.io | |
action_result.data.*.bot | boolean | True False | |
action_result.data.*.classification | string | benign malicious | |
action_result.data.*.cve.* | string | CVE-2021-12345 CVE-2023-5678 | |
action_result.data.*.first_seen | string | 2020-12-25 | |
action_result.data.*.last_seen | string | 2020-12-25 | |
action_result.data.*.metadata.* | string | { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" } | |
action_result.data.*.metadata.asn | string | AS12345 | |
action_result.data.*.metadata.category | string | isp | |
action_result.data.*.metadata.city | string | Madrid | |
action_result.data.*.metadata.destination_countries.* | string | Spain United Kingdom Turkey | |
action_result.data.*.metadata.destination_country_codes.* | string | ES GB TR | |
action_result.data.*.metadata.organization | string | Acme, Inc | |
action_result.data.*.metadata.os | string | Linux 3 | |
action_result.data.*.metadata.rdns | string | bot.acme.lcl | |
action_result.data.*.metadata.region | string | Madrid | |
action_result.data.*.metadata.source_country | string | Spain | |
action_result.data.*.metadata.source_country_code | string | ES | |
action_result.data.*.metadata.tor | boolean | True False | |
action_result.data.*.raw_data.* | string | { "scan":[ 0:{ "port":80 "protocol":"TCP" } ] "web":{ "paths":[ 0:"/robots.txt" ] "useragents":[ 0:"test/5.0 (compatible; testbot/2.1; +http://www.test.com/bot.html)" ] } "ja3":[ 0:{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 } ] } | |
action_result.data.*.raw_data.hassh.* | string | [{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 }] | |
action_result.data.*.raw_data.ja3.* | string | [{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 }] | |
action_result.data.*.raw_data.scan.* | string | [ { "port":23, "protocol":"TCP" }, { "port":80, "protocol":"TCP" }, { "port":8080, "protocol":"TCP" } ] | |
action_result.data.*.raw_data.web.* | string | { "paths":[ "/" ], "useragents":[ "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36" ] } | |
action_result.data.*.seen | boolean | True False | |
action_result.data.*.spoofable | boolean | True False | |
action_result.data.*.tags.* | string | Mirai Telnet Worm | |
action_result.data.*.vpn | boolean | True False | |
action_result.data.*.vpn_service | string | PRETTY_VPN | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Use the GreyNoise Query Language to run a query
Type: investigate
Read only: True
Please refer to https://docs.greynoise.io/reference/gnqlquery-1/a> for further information.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
query | required | GNQL query | string | greynoise query |
size | required | The number of results to return (warning: returning over 1000 results may degrade widget performance) | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.query | string | greynoise query |
metadata.organization:your_organization classification:malicious 8.0.0.0/8 |
action_result.parameter.size | numeric | 1000 | |
action_result.data.*.actor | string | Shodan.io | |
action_result.data.*.classification | string | benign malicious | |
action_result.data.*.first_seen | string | 2020-12-25 | |
action_result.data.*.ip | string | ip |
71.6.135.131 |
action_result.data.*.last_seen | string | 2020-12-25 | |
action_result.data.*.metadata.* | string | { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" } | |
action_result.data.*.raw_data.* | string | { "scan":[ 0:{ "port":80 "protocol":"TCP" } ] "web":{ "paths":[ 0:"/robots.txt" ] "useragents":[ 0:"test/5.0 (compatible; testbot/2.1; +http://www.test.com/bot.html)" ] } "ja3":[ 0:{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 } ] } | |
action_result.data.*.seen | boolean | True False | |
action_result.data.*.tags.* | string | Mirai Telnet Worm | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Lookup IPs using GreyNoise API Multi Quick Check Endpoint (comma-separated, limit 500 per request)
Type: investigate
Read only: True
Returns quick check information for multiple IPs.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ips | required | IPs to query, comma-separated list allowed | string |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ips | string | 71.6.135.131,111.111.111.111 | |
action_result.data.*.code | string | 0x00 0x01 | |
action_result.data.*.code_message | string | The IP has never been observed scanning the Internet The IP has been observed by the GreyNoise sensor network | |
action_result.data.*.noise | boolean | True False | |
action_result.data.*.riot | boolean | True False | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Get details on a specific GNQL query
Type: ingest
Read only: True
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
start_time | optional | Parameter ignored in this app | numeric | |
end_time | optional | Parameter ignored in this app | numeric | |
container_count | optional | Maximum number of results to return for the on poll action | numeric | |
artifact_count | optional | Parameter ignored in this app | numeric |
No Output
Lookup IP using GreyNoise's free community endpoint
Type: investigate
Read only: True
The Community API provides community users with a free tool to query IPs in the GreyNoise dataset and retrieve a subset of the full IP context data returned by the IP Lookup API.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP to query | string | ip |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
71.6.135.131 |
action_result.data.*.classification | string | benign malicious | |
action_result.data.*.last_seen | string | 2020-01-01 | |
action_result.data.*.link | string | url |
https://viz.greynoise.io/riot/1.2.3.4 |
action_result.data.*.message | string | Success You have hit your daily rate limit of 100 requests per day. Please create a free account or upgrade your plan at https://greynoise.io/pricing. | |
action_result.data.*.name | string | Cloudflare | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool
Type: investigate
Read only: True
The GreyNoise IP Similarity tool allows for analysts to identify IP addresses within the GreyNoise internet scanning dataset that are using a similar scanning profile.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP to find Similar IPs for | string | ip |
min_score | required | The minimum score to return matches for, recommended is 90. | numeric | |
limit | required | The maximum number of similar IP results to return. | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
71.6.135.131 |
action_result.parameter.min_score | numeric | 90 | |
action_result.parameter.limit | numeric | 50 | |
action_result.data.*.actor | string | Shodan.io Censys | |
action_result.data.*.classification | string | benign malicious | |
action_result.data.*.fist_seen | string | 2020-01-01 | |
action_result.data.*.last_seen | string | 2020-01-01 | |
action_result.data.*.asn | string | AS2345 AS62432 | |
action_result.data.*.city | string | New York Houston | |
action_result.data.*.country | string | United States Canada | |
action_result.data.*.country_code | string | US CA | |
action_result.data.*.organization | string | Microsoft Acme, Inc | |
action_result.data.*.similar_ips.* | string | { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" } | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool
Type: investigate
Read only: True
The GreyNoise IP Similarity tool allows for analysts to identify IP addresses within the GreyNoise internet scanning dataset that are using a similar scanning profile.
PARAMETER | REQUIRED | DESCRIPTION | TYPE | CONTAINS |
---|---|---|---|---|
ip | required | IP to get timeline information | string | ip |
days | required | The maximum number of days to pull timeline data | numeric | |
limit | required | The maximum number of results to return. | numeric |
DATA PATH | TYPE | CONTAINS | EXAMPLE VALUES |
---|---|---|---|
action_result.parameter.ip | string | ip |
71.6.135.131 |
action_result.parameter.days | numeric | 30 | |
action_result.parameter.limit | numeric | 50 | |
action_result.data.*.metadata.* | string | { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" } | |
action_result.data.*.activity.* | string | { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" } | |
action_result.status | string | success failed | |
action_result.message | string | ||
action_result.summary | string | ||
summary.total_objects | numeric | 1 | |
summary.total_objects_successful | numeric | 1 |
Auto-generated Splunk SOAR Connector documentation.
Copyright 2025 Splunk Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.