Exploring GreyNoise Query Examples

GreyNoise is a powerful search engine that allows users to investigate IP addresses for potential scanning or targeting activities on the internet. Utilizing GreyNoise Query Language (GNQL), users can refine their searches to uncover specific trends and patterns. Below are some interesting query examples that showcase the power of GreyNoise:

Attacks on Australia from China marked as malicious.

20 Search Queries Examples with GNQL:

Heartbleed Vulnerability Scans in the United States:

ja3.fingerprint:5244a012a90ad8f7e6ecbb694fda6024 country:United States raw_data.scan.protocol:TCP

Malicious Tor Exit Nodes in Germany:

tor:true classification:malicious country:Germany last_seen:>=2023-01-01

Suspicious HTTP User-Agents in San Francisco:

web.useragents:Malicious city:”San Francisco” region:California classification:unknown

Identifying Devices Scanning for SSH with Specific CVEs:

raw_data.scan.port:22 raw_data.scan.protocol:TCP (cve:CVE-2023-12345 OR cve:CVE-2023-54321)

VPN Usage by Specific Organization:

pn_service:ExpressVPN organization:”Google” classification:benign

RDP Vulnerability Scans with Bot Activity:

tags:”RDP Scanner” bot:true classification:malicious

Recent CVEs in a Single Destination Country:

(cve:CVE-2023-12345 OR cve:CVE-2023-54321) single_destination:true last_seen:>=2023-01-01

Scanning for SCADA Protocols in Europe:

(tags:”Modbus” OR tags:”DNP3″) rdns:.gov

Malicious Devices in Berlin with Specific HASSH Fingerprint:

region:Europe city:”Berlin” classification:malicious hassh.fingerprint:aabbccddeeff00112233

Devices with Specific CVEs and ASN:

(cve:CVE-2023-12345 OR cve:CVE-2023-54321) asn:AS12345 classification:malicious

Vulnerable Web Paths in the US:

web.paths:”/wp-admin/” OR web.paths:”/admin/” country_code:US classification:benign

Devices with Malicious HASSH Fingerprint in Microsoft Network:

hassh.fingerprint:aabbccddeeff00112233 organization:”Microsoft” classification:malicious

Unknown Classification in Tokyo with Specific Tags:

region:Asia city:”Tokyo” classification:unknown tags:”AdvancedPersistentThreat”

CVEs with Specific Reverse DNS in Educational Institutions:

(cve:CVE-2023-12345 OR cve:CVE-2023-54321) rdns:.edu single_destination:true

Suspicious HTTP User-Agents in Canada via Tor:

tor:true web.useragents:Suspicious country:Canada last_seen:>=2023-01-01

Specific ASN Scanning for HTTP Paths:

asn:AS12345 web.paths:”/exchange/” OR web.paths:”/owa/”

Malicious Activity in France by Siemens:

country_code:FR classification:malicious organization:”Siemens” last_seen:>=2023-01-01

Windows Devices Scanning for Port 445 with Specific Tags:

(raw_data.scan.port:445 AND raw_data.scan.protocol:TCP) os:Windows* tags:”Conficker” OR tags:”EternalBlue”

HTTP Paths with Matching JA3 Fingerprint:

web.paths:”/login/” OR web.paths:”/admin/” ja3.fingerprint:795b7ce13f60d61e9ac03611dd36d90

Specific Organization Scanning Specific Ports with Bot Activity:

organization:”Amazon” (raw_data.scan.port:80 OR raw_data.scan.port:443) bot:true last_seen:>=2023-01-01

Leave a Comment