DETECTION & RESPONSE

Speed Up
Incident Investigations

Accelerate detection and response times with GreyNoise threat context

Overview

GreyNoise accelerates investigations by adding context on IPs and CVEs seen in mass scanning and exploitation campaigns. This enrichment speeds triage, reduces manual work, and helps SOC teams more effectively investigate timelines and the scope of incidents.

How GreyNoise Speeds Up Investigations

Enriched Threat Context

GreyNoise shows whether an IP is scanning broadly or targeting specific systems, helping analysts gauge threat levels.

Identify Exploitation Attempts

CVE tags reveal which vulnerabilities are being exploited and which assets are likely targeted.

Map Attack Infrastructure

GreyNoise links IPs, ASNs, and behaviors so analysts can pivot and see the broader campaign.

Strengthen Containment Decisions

Intelligence on attacker infrastructure helps teams decide when to block, monitor, or expand containment.

Speed Up Timeline Construction

Data on first seen, last seen, and behavior give provides evidence for accurate incident timelines.

Better Documentation and Reporting

Enriched incident reports clarify what happened and why it matters.

How it Works

Explore Available Fields

Filter by category & search available IP fields and their uses with GreyNoise.
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
NAME
Description & Use
ASN
Autonomous System Number routing the IP. Helps group malicious infrastructure.
IP Address Metadata
ASN Count
Count of IPs grouped by ASN. Supports ASN-level threat analysis.
Stats & Aggregates
Actor
Known or attributed owner/operator of the IP (e.g., research org, ISP, hosting provider). Useful for attribution.
Identity & Ownership
Actor Count
Aggregated count of IPs per actor. Supports statistical analysis of actors.
Stats & Aggregates
Bot
Flags whether the IP is part of known botnet activity. Helps detect automated scanning or malware distribution.
Classification
CVEs
CVEs tied to the tag behavior. Critical for identifying exploitation of known vulnerabilities.
Tag Information
Category
High-level network type (e.g., hosting, ISP, enterprise).
IP Address Metadata
Category Count
Aggregated count of IPs per category (hosting, ISP, etc.). Highlights infrastructure trends.
Stats & Aggregates
City
Registered city of the IP. Useful for geolocation context and pivoting.
IP Address Metadata
Classification
GreyNoise’s judgment of the IP’s intent: benign, malicious, suspicious, or unknown. Most useful filter for triage.
Classification
Classification Count
Aggregated count of IPs per classification. Useful for threat landscape analysis.
Stats & Aggregates
Created At
Date the tag was first added. Indicates when this behavior was first observed.
Tag Information
Description
Human-readable explanation of what the tag represents. Adds analyst context.
Tag Information
Destination ASNs
List of ASNs targeted by the IP. Helps show which networks are being scanned.
Sensor Metadata
Destination Cities
List of cities where scanning traffic was observed. Useful for geo-targeting analysis.
Sensor Metadata
Destination Countries
Countries where GreyNoise sensors saw this IP scanning. Indicates target geography.
IP Address Metadata
Updated At
Date/time when the tag was last updated.
Tag Information
VPN
Flags if the IP belongs to a VPN provider. Suggests identity masking or evasive behavior.
IP Address Metadata
VPN Service
Name of the VPN service associated with the IP. Useful for attribution and filtering.
IP Address Metadata

Cut the Noise. Close the Case.