Skip to content

splunk-soar-connectors/greynoise

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GreyNoise for SOAR

Publisher: GreyNoise
Connector Version: 2.3.3
Product Vendor: GreyNoise
Product Name: GreyNoise
Minimum Product Version: 5.5.0

This app provides investigative capabilities using the GreyNoise plugin

Configuration variables

This table lists the configuration variables required to operate GreyNoise for SOAR. These variables are specified when configuring a GreyNoise asset in Splunk SOAR.

VARIABLE REQUIRED TYPE DESCRIPTION
api_key required password API Key for GreyNoise
on_poll_query optional string GNQL query to use for the on poll action
on_poll_size optional numeric The number of results to return for the interval/schedule poll
license_type optional string GreyNoise license type

Supported Actions

test connectivity - Validate the asset configuration for connectivity using the supplied configuration
lookup ip - Lookup IP using GreyNoise API Quick Check Endpoint
riot lookup ip - Lookup IP using GreyNoise's RIOT endpoint
ip reputation - Get full GreyNoise reputation and context for a specific IP
gnql query - Use the GreyNoise Query Language to run a query
lookup ips - Lookup IPs using GreyNoise API Multi Quick Check Endpoint (comma-separated, limit 500 per request)
on poll - Get details on a specific GNQL query
community lookup ip - Lookup IP using GreyNoise's free community endpoint
similar noise ips - Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool
noise ip timeline - Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool

action: 'test connectivity'

Validate the asset configuration for connectivity using the supplied configuration

Type: test
Read only: True

Tests the connection to the paid GreyNoise API.

Action Parameters

No parameters are required for this action

Action Output

No Output

action: 'lookup ip'

Lookup IP using GreyNoise API Quick Check Endpoint

Type: investigate
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP to query string ip

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip 71.6.135.131
action_result.data.*.code string 0x00 0x01
action_result.data.*.code_message string The IP has never been observed scanning the Internet The IP has been observed by the GreyNoise sensor network
action_result.data.*.noise boolean True False
action_result.data.*.riot boolean True False
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'riot lookup ip'

Lookup IP using GreyNoise's RIOT endpoint

Type: investigate
Read only: True

RIOT identifies IPs from known benign services and organizations that commonly cause false positives in network security and threat intelligence products. The collection of IPs in RIOT is continually curated and verified to provide accurate results.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP to query string ip

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip 71.6.135.131
action_result.data.*.category string public_dns
action_result.data.*.description string Global domain name system (DNS) resolution service.
action_result.data.*.explanation string Public DNS services are used as alternatives to ISP's name servers. You may see devices on your network communicating with Public DNS over port XX/TCP or XX/UDP to resolve DNS lookups.
action_result.data.*.last_updated string 2021-05-26T17:55:35Z
action_result.data.*.name string Public DNS
action_result.data.*.reference string url https://developers.google.com/speed/public-dns/docs/isp#alternative
action_result.data.*.riot boolean True False
action_result.data.*.trust_level string 1 2
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'ip reputation'

Get full GreyNoise reputation and context for a specific IP

Type: investigate
Read only: True

Get more information about a given IP address. Returns time ranges, IP metadata (network owner, ASN, reverse DNS pointer, country), associated actors, activity tags, raw port scan, and web request information.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP to query string ip

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip 71.6.135.131
action_result.data.*.actor string Shodan.io
action_result.data.*.bot boolean True False
action_result.data.*.classification string benign malicious
action_result.data.*.cve.* string CVE-2021-12345 CVE-2023-5678
action_result.data.*.first_seen string 2020-12-25
action_result.data.*.last_seen string 2020-12-25
action_result.data.*.metadata.* string { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" }
action_result.data.*.metadata.asn string AS12345
action_result.data.*.metadata.category string isp
action_result.data.*.metadata.city string Madrid
action_result.data.*.metadata.destination_countries.* string Spain United Kingdom Turkey
action_result.data.*.metadata.destination_country_codes.* string ES GB TR
action_result.data.*.metadata.organization string Acme, Inc
action_result.data.*.metadata.os string Linux 3
action_result.data.*.metadata.rdns string bot.acme.lcl
action_result.data.*.metadata.region string Madrid
action_result.data.*.metadata.source_country string Spain
action_result.data.*.metadata.source_country_code string ES
action_result.data.*.metadata.tor boolean True False
action_result.data.*.raw_data.* string { "scan":[ 0:{ "port":80 "protocol":"TCP" } ] "web":{ "paths":[ 0:"/robots.txt" ] "useragents":[ 0:"test/5.0 (compatible; testbot/2.1; +http://www.test.com/bot.html)" ] } "ja3":[ 0:{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 } ] }
action_result.data.*.raw_data.hassh.* string [{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 }]
action_result.data.*.raw_data.ja3.* string [{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 }]
action_result.data.*.raw_data.scan.* string [ { "port":23, "protocol":"TCP" }, { "port":80, "protocol":"TCP" }, { "port":8080, "protocol":"TCP" } ]
action_result.data.*.raw_data.web.* string { "paths":[ "/" ], "useragents":[ "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36" ] }
action_result.data.*.seen boolean True False
action_result.data.*.spoofable boolean True False
action_result.data.*.tags.* string Mirai Telnet Worm
action_result.data.*.vpn boolean True False
action_result.data.*.vpn_service string PRETTY_VPN
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'gnql query'

Use the GreyNoise Query Language to run a query

Type: investigate
Read only: True

Please refer to https://docs.greynoise.io/reference/gnqlquery-1/a> for further information.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
query required GNQL query string greynoise query
size required The number of results to return (warning: returning over 1000 results may degrade widget performance) numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.query string greynoise query metadata.organization:your_organization classification:malicious 8.0.0.0/8
action_result.parameter.size numeric 1000
action_result.data.*.actor string Shodan.io
action_result.data.*.classification string benign malicious
action_result.data.*.first_seen string 2020-12-25
action_result.data.*.ip string ip 71.6.135.131
action_result.data.*.last_seen string 2020-12-25
action_result.data.*.metadata.* string { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" }
action_result.data.*.raw_data.* string { "scan":[ 0:{ "port":80 "protocol":"TCP" } ] "web":{ "paths":[ 0:"/robots.txt" ] "useragents":[ 0:"test/5.0 (compatible; testbot/2.1; +http://www.test.com/bot.html)" ] } "ja3":[ 0:{ "fingerprint":"c3a6cf0bf2e690ac8e1ecf6081f17a50" "port":443 } ] }
action_result.data.*.seen boolean True False
action_result.data.*.tags.* string Mirai Telnet Worm
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'lookup ips'

Lookup IPs using GreyNoise API Multi Quick Check Endpoint (comma-separated, limit 500 per request)

Type: investigate
Read only: True

Returns quick check information for multiple IPs.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ips required IPs to query, comma-separated list allowed string

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ips string 71.6.135.131,111.111.111.111
action_result.data.*.code string 0x00 0x01
action_result.data.*.code_message string The IP has never been observed scanning the Internet The IP has been observed by the GreyNoise sensor network
action_result.data.*.noise boolean True False
action_result.data.*.riot boolean True False
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'on poll'

Get details on a specific GNQL query

Type: ingest
Read only: True

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
start_time optional Parameter ignored in this app numeric
end_time optional Parameter ignored in this app numeric
container_count optional Maximum number of results to return for the on poll action numeric
artifact_count optional Parameter ignored in this app numeric

Action Output

No Output

action: 'community lookup ip'

Lookup IP using GreyNoise's free community endpoint

Type: investigate
Read only: True

The Community API provides community users with a free tool to query IPs in the GreyNoise dataset and retrieve a subset of the full IP context data returned by the IP Lookup API.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP to query string ip

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip 71.6.135.131
action_result.data.*.classification string benign malicious
action_result.data.*.last_seen string 2020-01-01
action_result.data.*.link string url https://viz.greynoise.io/riot/1.2.3.4
action_result.data.*.message string Success You have hit your daily rate limit of 100 requests per day. Please create a free account or upgrade your plan at https://greynoise.io/pricing.
action_result.data.*.name string Cloudflare
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'similar noise ips'

Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool

Type: investigate
Read only: True

The GreyNoise IP Similarity tool allows for analysts to identify IP addresses within the GreyNoise internet scanning dataset that are using a similar scanning profile.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP to find Similar IPs for string ip
min_score required The minimum score to return matches for, recommended is 90. numeric
limit required The maximum number of similar IP results to return. numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip 71.6.135.131
action_result.parameter.min_score numeric 90
action_result.parameter.limit numeric 50
action_result.data.*.actor string Shodan.io Censys
action_result.data.*.classification string benign malicious
action_result.data.*.fist_seen string 2020-01-01
action_result.data.*.last_seen string 2020-01-01
action_result.data.*.asn string AS2345 AS62432
action_result.data.*.city string New York Houston
action_result.data.*.country string United States Canada
action_result.data.*.country_code string US CA
action_result.data.*.organization string Microsoft Acme, Inc
action_result.data.*.similar_ips.* string { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" }
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

action: 'noise ip timeline'

Lookup Similar internet scanner IP using GreyNoise's IP Similarity tool

Type: investigate
Read only: True

The GreyNoise IP Similarity tool allows for analysts to identify IP addresses within the GreyNoise internet scanning dataset that are using a similar scanning profile.

Action Parameters

PARAMETER REQUIRED DESCRIPTION TYPE CONTAINS
ip required IP to get timeline information string ip
days required The maximum number of days to pull timeline data numeric
limit required The maximum number of results to return. numeric

Action Output

DATA PATH TYPE CONTAINS EXAMPLE VALUES
action_result.parameter.ip string ip 71.6.135.131
action_result.parameter.days numeric 30
action_result.parameter.limit numeric 50
action_result.data.*.metadata.* string { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" }
action_result.data.*.activity.* string { "country":"United States" "country_code":"US" "city":"Seattle" "organization":"Org. Name" "rdns":"crawl-66-249-79-17.testbot.com" "asn":"AS521" "tor":false "category":"education" "os":"Windows 7/8" }
action_result.status string success failed
action_result.message string
action_result.summary string
summary.total_objects numeric 1
summary.total_objects_successful numeric 1

Auto-generated Splunk SOAR Connector documentation.

Copyright 2025 Splunk Inc.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 12