• Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs
  • Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs

Members

Profile picture of rashid47010

rashid47010

@rashid47010 Active 8 years, 4 months ago
I am looking for the query[timechartl] for example 50 port scan attempts with in a second against list of organization public facing IP address. View
  • Activity
  • Profile
  • Posts
  • Personal
  • Mentions
  • Favorites
  • Profile picture of rashid47010
    8 years, 11 months ago

    rashid47010 commented on the post, List of Universal Forwarders with Version

    In reply to: SplunkNinja wrote a new post The following Splunk query will return results of any host using a universal forwarder to transmit data back to a Splunk indexer. The query will return hostname, version, as well as […] View

    I am looking for some use cases regarding perimeter firewall. I have paloalto

  • Profile picture of rashid47010
    8 years, 11 months ago

    rashid47010 wrote a new post

    I am looking for the query[timechartl]
    for example 50 port scan attempts with in a second against list of organization public facing IP address.

    • Profile picture of masdeeper
      masdeeper replied 7 years, 2 months ago

      Provide log example.

    • Profile picture of pradeep577
      pradeep577 replied 5 years, 9 months ago

      | tstats allow_old_summaries=true distinct_count(All_Traffic.dest_port) as ports from datamodel=Network_Traffic.All_Traffic where
      [ inputlookup internal_ip_range]
      [| inputlookup whitelist.csv WHERE RuleName=portscan
      | fields – RuleName, description
      | format “” “NOT (” “AND” “” “)” “)”] by All_Traffic.src_ip
      | search ports > 500
      | `drop_dm_object_name(“All_Traffic”)`

    • Profile picture of MaryamSaniee
      MaryamSaniee replied 2 years, 11 months ago

      for example list of organization public facing IP address is in range 123.6.0.0/16:
      |index=firewall sourcetype=”juniper:firewall” dest=123.6.0.0/24
      |timechart span=1s dc(dest_port) as dest_port_count by src
      |where dest_port_count >50

    • Profile picture of MaryamSaniee
      MaryamSaniee replied 2 years, 11 months ago

      Or another way (better way without timechart command):
      for example list of organization public facing IP address is in range 123.6.0.0/16:
      |index=firewall sourcetype=”juniper:firewall” src!=192.168.* AND dest=123.6.0.0/24
      |bin _time span=1s
      |stats dc(dest_port) as dest_port_count by src,dest,_time
      |where dest_port_count >50

  • Profile picture of rashid47010
    8 years, 11 months ago

    rashid47010 posted an update

    I am looking for the query[timechartl]
    for example 50 port scan attempts with in a second against list of organization public facing IP address.

  • Profile picture of rashid47010
    8 years, 12 months ago

    rashid47010 became a registered member

  • Home
  • Log In
  • Register
  • About GoSplunk
  • GoSplunk FAQs
  • Contact the GoSplunk Team
  • Splunk Website
  • Splunk Documentation
  • Splunk Answers

GoSplunk is not affiliated with Splunk Inc. in any way.

© 2019 GoSplunk
  • Privacy Policy
  • Terms and Conditions
  • Forgot Password?
sponsored