Alert REDUCTION

Not all alerts are created equal

Filter out noisy, low priority and false-positive alerts from mass internet scanners

Overview

The internet is noisy. Thousands of mass scanners scan the internet every minute, some for legitimate reasons, others to build victim pipelines. Advanced threat actors intentionally create noise to obfuscate more targeted attacks. This creates an unprecedented flood of alerts for your security team.

GreyNoise reduces alert fatigue by classifying IPs as benign, malicious, or suspicious. This instantly separates noise from real threats. Benign traffic can be deprioritized, malicious and suspicious activity escalated for investigation.

How GreyNoise Helps
Reduce Noise in Your SOC

Reduce Alert Fatigue

By classifying benign sources, GreyNoise eliminates noise from the alert triage queue, preventing wasted analyst time.

Escalate Confirmed Threats

Alerts tied to IPs classified as malicious—such as active exploitation, malware distribution, or botnet activity—can be automatically prioritized.

Smarter Automation

SOC playbooks can use GreyNoise classifications and tags to automate alert routing.

Block Unsolicited Scan Traffic

Use GreyNoise query-based, dynamic IP blocklists to block unsolicited scanning and reduce SOC noise.

How it Works

Explore Available Fields

Filter by category & search available IP fields and their uses with GreyNoise.
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
NAME
Description & Use
ASN
Autonomous System Number routing the IP. Helps group malicious infrastructure.
IP Address Metadata
Actor
Known or attributed owner/operator of the IP (e.g., research org, ISP, hosting provider). Useful for attribution.
Identity & Ownership
Actor Count
Aggregated count of IPs per actor. Supports statistical analysis of actors.
Stats & Aggregates
Bot
Flags whether the IP is part of known botnet activity. Helps detect automated scanning or malware distribution.
Classification
CVEs
CVEs tied to the tag behavior. Critical for identifying exploitation of known vulnerabilities.
Tag Information
Category
High-level network type (e.g., hosting, ISP, enterprise).
IP Address Metadata
Category Count
Aggregated count of IPs per category (hosting, ISP, etc.). Highlights infrastructure trends.
Stats & Aggregates
City
Registered city of the IP. Useful for geolocation context and pivoting.
IP Address Metadata
Classification
GreyNoise’s judgment of the IP’s intent: benign, malicious, suspicious, or unknown. Most useful filter for triage.
Classification
Classification Count
Aggregated count of IPs per classification. Useful for threat landscape analysis.
Stats & Aggregates
Created At
Date the tag was first added. Indicates when this behavior was first observed.
Tag Information
Description
Human-readable explanation of what the tag represents. Adds analyst context.
Tag Information
Destination Countries
Countries where GreyNoise sensors saw this IP scanning. Indicates target geography.
IP Address Metadata
Destination Countries Count
Count of IPs targeting specific countries. Supports geo-threat monitoring.
Stats & Aggregates
Destination Country Codes
ISO codes for countries targeted by scanning. Supports correlation with geo-based IOCs.
IP Address Metadata
Domain
Domain tied to the ASN owner. Provides higher-level ownership context.
IP Address Metadata
ID
Unique tag identifier.
Tag Information
IP
The observed IP address itself. Primary entity to investigate or correlate across alerts.
Identity & Ownership
Intention
Tag’s intent classification: benign, malicious, suspicious, or unknown. Adds risk context.
Tag Information
Last Seen
Last date the IP was observed by GreyNoise sensors. Indicates recency of activity.
Activity Timeline
Last Seen Timestamp
Exact date and time the IP was last observed. Enables timeline reconstruction in investigations.
Activity Timeline
Mobile
Indicates if the IP belongs to a mobile/cellular network.
IP Address Metadata
Name
Display name of the tag. Analyst-facing label for quick recognition.
Tag Information
Organization
Organization responsible for the IP. Adds enrichment for attribution.
IP Address Metadata
Organization Count
Count of IPs linked to each organization. Useful for assessing exposure by provider.
Stats & Aggregates
RDNS
Reverse DNS value for the IP. May reveal hostnames tied to services or campaigns.
IP Address Metadata
RDNS Parent
Parent domain of the reverse DNS. Useful for clustering infrastructure.
IP Address Metadata
Recommended Block
Indicates whether IPs with this tag should be blocked. Supports automated policy decisions.
Tag Information
References
References (e.g., CVE pages, docs) supporting the tag. Provides analyst enrichment sources.
Tag Information
Region
State/province where the IP is registered. Adds sub-country geolocation context.
IP Address Metadata
Single Destination
True if the IP only scanned one country. Suggests targeted reconnaissance.
IP Address Metadata
Slug
Short identifier for the tag. Useful in queries and API lookups.
Tag Information