Splunk Application Development
Many organizations and vendors struggle to leverage Splunk due to limited knowledge, or cross-training in other softwares, which doesn’t allow you to see the results you’re looking for. This is why Splunk is the only product we deploy and stand behind 100%, because we want to provide something of value to your business.
Our services give a wider scope of your Splunk environment. We can assist your team in expanding your Splunk use cases, supporting you in the necessary areas, and fully empowering the value of your investment.
We are the developers of several applications published on Splunkbase App store. These applications can be easily modified to match our customers requirements.
Threat Intelligence Research
Our analysts are maintaining a list of IP addresses attempting to compromise websites using various attack vectors. Each IP address is confirmed against several sources, including website logs and IDS signatures. The CSV list contains the IP address, the nature of the malicious activity, the date and the originating country. Only the IP addresses that proved to consistently attempt to attack websites are added to the list.
The list can be used as dynamic block list, in SIEM dashboards and overall verification as confirmed malicious addresses.
The list can be used free of charge as long as the source is referenced: abusers_www.csv
Last update: Jan 12, 2018
Get In Touch
Whether you are looking for general information or have a specific question, we want to help.