Threat Hunting

Needle in the haystack. Found

Quickly identify anomalous behavior and catch targeted threats

Overview

Effective threat hunting isn't just about finding more data, it’s about finding the right data. GreyNoise empowers your hunt team to adopt the PEAK Framework by correlating your internal traffic against our real-time map of internet-wide mass scanning.

By using GreyNoise to filter out opportunistic probes, benign scanners, and botnet noise, you reveal the statistically significant anomalies that represent targeted attacks. Stop chasing false positives and focus on the signals that actually threaten your perimeter.

How GreyNoise
Helps You Hunt Smarter

Focus effort on highest risks

Eliminate time-consuming research of benign and opportunistic scanning, allowing hunters to focus on infrastructure actually used by threat actors.

Supports threat research and hypothesis development

Hunters can use GreyNoise to conduct threat research, validate assumptions, and explore attack vectors in order to develop hypotheses.

Correlate isolated incidents

GreyNoise helps threat hunters link isolated incidents to larger campaigns by mapping attacker infrastructure and patterns, connecting logged IPs to those exploiting relevant vulnerabilities.

How GreyNoise Maps to the PEAK Hunting Framework

Explore Available Fields

Filter by category & search available IP fields and their uses with GreyNoise.
Categories
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
NAME
Description & Use
Last Seen Timestamp
Exact date and time the IP was last observed. Enables timeline reconstruction in investigations.
Activity Timeline
Mobile
Indicates if the IP belongs to a mobile/cellular network.
IP Address Metadata
Name
Display name of the tag. Analyst-facing label for quick recognition.
Tag Information
Organization
Organization responsible for the IP. Adds enrichment for attribution.
IP Address Metadata
Organization Count
Count of IPs linked to each organization. Useful for assessing exposure by provider.
Stats & Aggregates
Port
Port observed in scanning activity. Useful for identifying targeted services.
Observed Request Data
Protocol
Protocol (e.g., TCP/UDP) used in scanning activity. Adds layer-4 context.
Observed Request Data
RDNS
Reverse DNS value for the IP. May reveal hostnames tied to services or campaigns.
IP Address Metadata
RDNS Parent
Parent domain of the reverse DNS. Useful for clustering infrastructure.
IP Address Metadata
Recommended Block
Indicates whether IPs with this tag should be blocked. Supports automated policy decisions.
Tag Information
References
References (e.g., CVE pages, docs) supporting the tag. Provides analyst enrichment sources.
Tag Information
Region
State/province where the IP is registered. Adds sub-country geolocation context.
IP Address Metadata
SSH Key
SSH keys observed from traffic. Can reveal attacker tooling or campaigns.
Protocol Data
Sensor Count
Number of distinct sensors that saw the IP. Higher values indicates wider scanning footprint.
Sensor Metadata
Sensor Hits
Total number of events GreyNoise sensors recorded from this IP. Indicates activity volume.
Sensor Metadata
Single Destination
True if the IP only scanned one country. Suggests targeted reconnaissance.
IP Address Metadata
Last Seen Timestamp
Exact date and time the IP was last observed. Enables timeline reconstruction in investigations.
Activity Timeline
Mobile
Indicates if the IP belongs to a mobile/cellular network.
IP Address Metadata
Name
Display name of the tag. Analyst-facing label for quick recognition.
Tag Information
Organization
Organization responsible for the IP. Adds enrichment for attribution.
IP Address Metadata
Organization Count
Count of IPs linked to each organization. Useful for assessing exposure by provider.
Stats & Aggregates
Port
Port observed in scanning activity. Useful for identifying targeted services.
Observed Request Data
Protocol
Protocol (e.g., TCP/UDP) used in scanning activity. Adds layer-4 context.
Observed Request Data
RDNS
Reverse DNS value for the IP. May reveal hostnames tied to services or campaigns.
IP Address Metadata
RDNS Parent
Parent domain of the reverse DNS. Useful for clustering infrastructure.
IP Address Metadata
Recommended Block
Indicates whether IPs with this tag should be blocked. Supports automated policy decisions.
Tag Information
References
References (e.g., CVE pages, docs) supporting the tag. Provides analyst enrichment sources.
Tag Information
Region
State/province where the IP is registered. Adds sub-country geolocation context.
IP Address Metadata
SSH Key
SSH keys observed from traffic. Can reveal attacker tooling or campaigns.
Protocol Data
Sensor Count
Number of distinct sensors that saw the IP. Higher values indicates wider scanning footprint.
Sensor Metadata
Sensor Hits
Total number of events GreyNoise sensors recorded from this IP. Indicates activity volume.
Sensor Metadata
Single Destination
True if the IP only scanned one country. Suggests targeted reconnaissance.
IP Address Metadata

Find your needle.