Early warning

Early Warning of Upcoming CVE Disclosures

Get ahead of new CVEs on the systems you care about.

Overview

GreyNoise research shows that spikes in traffic targeting older CVEs often precede new CVE disclosures for that same vendor within weeks. These early warnings give organizations time to harden systems, patch, monitor, or block probing IPs.

By detecting shifts in attacker reconnaissance prior to CVE disclosure, GreyNoise provides a critical window of opportunity to prepare before a threat materializes.

How GreyNoise Helps You
Prepare for New CVEs

Provides Time to Prepare

When a new CVE hits critical perimeter systems, it can trigger emergency response and disruption. Early warnings from GreyNoise let teams prepare in advance and minimize impact

Aligns Risk Assessments to Real-World Threat Activity

GreyNoise shows which vendors and technologies are seeing abnormal reconnaissance levels, keeping risk assessments aligned with real-world signals.

Improves Resource Allocation

Defenders can focus investments, patching, and monitoring on upcoming threats most likely to impact them.

Enables Proactive Blocking

Use GreyNoise query-based, dynamic blocklists to stop attacks as your organization patches exposed systems.

Explore Available Fields

Filter by category & search available IP fields and their uses with GreyNoise.
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
NAME
Description & Use
Intention
Tag’s intent classification: benign, malicious, suspicious, or unknown. Adds risk context.
Tag Information
ID
Unique tag identifier.
Tag Information
CVEs
CVEs tied to the tag behavior. Critical for identifying exploitation of known vulnerabilities.
Tag Information
Description
Human-readable explanation of what the tag represents. Adds analyst context.
Tag Information
Created At
Date the tag was first added. Indicates when this behavior was first observed.
Tag Information
Tags Count
Count of IPs associated with specific tags. Helps identify common behaviors at scale.
Stats & Aggregates
Spoofable Count
Count of spoofable vs. non-spoofable IPs. Highlights volume of potentially fake traffic.
Stats & Aggregates
Source Country Count
Count of IPs originating from each country. Useful for geo-distribution of attacks.
Stats & Aggregates
Organization Count
Count of IPs linked to each organization. Useful for assessing exposure by provider.
Stats & Aggregates
Destination Countries Count
Count of IPs targeting specific countries. Supports geo-threat monitoring.
Stats & Aggregates
Actor Count
Aggregated count of IPs per actor. Supports statistical analysis of actors.
Stats & Aggregates
Category Count
Aggregated count of IPs per category (hosting, ISP, etc.). Highlights infrastructure trends.
Stats & Aggregates
Classification Count
Aggregated count of IPs per classification. Useful for threat landscape analysis.
Stats & Aggregates
Spoofable
Shows whether the IP completed a valid TCP handshake. If false, traffic may be spoofed or fake.
Classification
Tor
Identifies if the IP is a Tor exit node. Tor traffic often indicates obfuscation or anonymization.
IP Address Metadata
Source Country Code
ISO country code for the IP’s registration country.
IP Address Metadata
ASN Count
Count of IPs grouped by ASN. Supports ASN-level threat analysis.
Stats & Aggregates
Protocol
Protocol (e.g., TCP/UDP) used in scanning activity. Adds layer-4 context.
Observed Request Data
Port
Port observed in scanning activity. Useful for identifying targeted services.
Observed Request Data
Destination ASNs
List of ASNs targeted by the IP. Helps show which networks are being scanned.
Sensor Metadata
Sensor Hits
Total number of events GreyNoise sensors recorded from this IP. Indicates activity volume.
Sensor Metadata
Source Latitude
Latitude of IP’s registered location. Useful for geo-mapping.
IP Address Metadata
Destination Cities
List of cities where scanning traffic was observed. Useful for geo-targeting analysis.
Sensor Metadata
Sensor Count
Number of distinct sensors that saw the IP. Higher values indicates wider scanning footprint.
Sensor Metadata
First Seen
Date the IP was first observed by GreyNoise. Indicates activity lifetime.
Activity Timeline
VPN Service
Name of the VPN service associated with the IP. Useful for attribution and filtering.
IP Address Metadata
VPN
Flags if the IP belongs to a VPN provider. Suggests identity masking or evasive behavior.
IP Address Metadata
Updated At
Date/time when the tag was last updated.
Tag Information
Slug
Short identifier for the tag. Useful in queries and API lookups.
Tag Information
References
References (e.g., CVE pages, docs) supporting the tag. Provides analyst enrichment sources.
Tag Information
Recommended Block
Indicates whether IPs with this tag should be blocked. Supports automated policy decisions.
Tag Information
Name
Display name of the tag. Analyst-facing label for quick recognition.
Tag Information

Don't wait until it's a CVE