Flagging suspect IP addresses
Any server that receives requests from clients will always be a potential target for someone to try and exploit by initiating an attack. Attacks can come in many different forms, and over time it is important to keep a history of the originating source of the attack, so we can monitor the behavior and patterns more closely and potentially use this data to block access as needed.
In the next recipe, you will learn how to store the source IP addresses of clients making erroneous web access requests as a lookup and flag them for suspect behavior. This new lookup will then be leveraged to filter a subsequent search.
Getting ready
To step through this recipe, you will need a running Splunk Enterprise server, with the sample data loaded from Chapter 1, Play Time - Getting Data In. You should be familiar with navigating the Splunk user interface.
How to do it...
Follow the steps in this recipe to create a lookup table of potentially malicious IP addresses:
- Log in to your...