Closed SomeInfosecGuy closed 4 years ago
No, the info is only collected with Suricata and limited to its type within ES. In the /opt/tpot/bin
folder is an example to get the top IPs, you can use as base for what you want to do. However, in most cases if Suricata did not match an event againt a known CVE it's probably a non-match.
Before you post your issue make sure it has not been answered yet and provide
basic support information
if you come to the conclusion it is a new issue.⚠️ Basic support information (commands are expected to run as
root
)lsb_release -a
anduname -a
?/install.log
/install.err
. Noglances
andhtop
.df -h
)? 1.6TBdps.sh
)? Activesystemctl status tpot
)? Runningsystemctl stop tpot
and runnetstat -tulpen
DOWN
you can rundocker logs <container-name>
for the latest log entriesFiltering by IP gives me a lot of information, but when I filter by alert keyword the information is in the Suricata logs only. I need to pull all IP address for specific IDS signatures. Is there an easy way to accomplish this?