DETECTION & RESPONSE

Speed Up
Incident Investigations

Accelerate detection and response times with GreyNoise threat context

Overview

GreyNoise accelerates investigations by adding context on IPs and CVEs seen in mass scanning and exploitation campaigns. This enrichment speeds triage, reduces manual work, and helps SOC teams more effectively investigate timelines and the scope of incidents.

How GreyNoise Speeds Up Investigations

Enriched Threat Context

GreyNoise shows whether an IP is scanning broadly or targeting specific systems, helping analysts gauge threat levels.

Identify Exploitation Attempts

CVE tags reveal which vulnerabilities are being exploited and which assets are likely targeted.

Map Attack Infrastructure

GreyNoise links IPs, ASNs, and behaviors so analysts can pivot and see the broader campaign.

Strengthen Containment Decisions

Intelligence on attacker infrastructure helps teams decide when to block, monitor, or expand containment.

Speed Up Timeline Construction

Data on first seen, last seen, and behavior give provides evidence for accurate incident timelines.

Better Documentation and Reporting

Enriched incident reports clarify what happened and why it matters.

How it Works

Explore Available Fields

Filter by category & search available IP fields and their uses with GreyNoise.
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
NAME
Description & Use
Exploitation Activity Threat IP Count (1d)
Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability today.
Exploitation Activity
Exploitation Activity Threat IP Count (30d)
Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability in the last 30 days. Useful for long-term prioritization and trend analysis.
Exploitation Activity
Exploitation Details
Exploitation-related details pertaining to attack vector category, EPSS score (Exploit Prediction Scoring System), available exploits, and KEV (Known Exploited Vulnerabilities) registration. Guides whether to prioritize based on real-world attacker use.
Exploitation Intelligence
Exploitation Details Attack Vector
The method attackers use to exploit the vulnerability (e.g., network, local, adjacent). Helps assess exposure across internet-facing vs. internal assets.
Exploitation Intelligence
Exploitation Details EPSS Score
EPSS score (Exploit Prediction Scoring System) associated with the exploitation.
Exploitation Intelligence
Exploitation Details Exploit Found
Indicates whether a working exploit is publicly available. Confirms attacker capability and should increase remediation priority.
Exploitation Intelligence
Exploitation Details Registered in KEV
Whether exploitation has been registered in the KEV (Known Exploited Vulnerabilities) database.
Exploitation Intelligence
Exploitation Stats
Statistical data about exploitation, including number of exploits available, and number of threat actors and botnets exploiting the vulnerability.
Exploitation Statistics
Exploitation Stats Number of Available Exploits
Total number of exploits available (public + commercial).
Exploitation Statistics
Exploitation Stats Number of Botnets Exploiting Vulnerability
Total number of botnets exploiting the vulnerability.
Exploitation Statistics
Exploitation Stats Number of Threat Actors Exploiting Vulnerability
Total number of known threat actors exploiting the vulnerability.
Exploitation Statistics
First Seen
Date the IP was first observed by GreyNoise. Indicates activity lifetime.
Activity Timeline
ID
Unique tag identifier.
Tag Information
ID
Unique identifier for the record. Used to track and reference the vulnerability consistently across systems and reports.
Identification & Details
IP
The observed IP address itself. Primary entity to investigate or correlate across alerts.
Identity & Ownership
Intention
Tag’s intent classification: benign, malicious, suspicious, or unknown. Adds risk context.
Tag Information
Exploitation Activity Threat IP Count (1d)
Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability today.
Exploitation Activity
Exploitation Activity Threat IP Count (30d)
Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability in the last 30 days. Useful for long-term prioritization and trend analysis.
Exploitation Activity
Exploitation Details
Exploitation-related details pertaining to attack vector category, EPSS score (Exploit Prediction Scoring System), available exploits, and KEV (Known Exploited Vulnerabilities) registration. Guides whether to prioritize based on real-world attacker use.
Exploitation Intelligence
Exploitation Details Attack Vector
The method attackers use to exploit the vulnerability (e.g., network, local, adjacent). Helps assess exposure across internet-facing vs. internal assets.
Exploitation Intelligence
Exploitation Details EPSS Score
EPSS score (Exploit Prediction Scoring System) associated with the exploitation.
Exploitation Intelligence
Exploitation Details Exploit Found
Indicates whether a working exploit is publicly available. Confirms attacker capability and should increase remediation priority.
Exploitation Intelligence
Exploitation Details Registered in KEV
Whether exploitation has been registered in the KEV (Known Exploited Vulnerabilities) database.
Exploitation Intelligence
Exploitation Stats
Statistical data about exploitation, including number of exploits available, and number of threat actors and botnets exploiting the vulnerability.
Exploitation Statistics
Exploitation Stats Number of Available Exploits
Total number of exploits available (public + commercial).
Exploitation Statistics
Exploitation Stats Number of Botnets Exploiting Vulnerability
Total number of botnets exploiting the vulnerability.
Exploitation Statistics
Exploitation Stats Number of Threat Actors Exploiting Vulnerability
Total number of known threat actors exploiting the vulnerability.
Exploitation Statistics
First Seen
Date the IP was first observed by GreyNoise. Indicates activity lifetime.
Activity Timeline
ID
Unique tag identifier.
Tag Information
ID
Unique identifier for the record. Used to track and reference the vulnerability consistently across systems and reports.
Identification & Details
IP
The observed IP address itself. Primary entity to investigate or correlate across alerts.
Identity & Ownership
Intention
Tag’s intent classification: benign, malicious, suspicious, or unknown. Adds risk context.
Tag Information

Cut the Noise. Close the Case.