GreyNoise Intelligence

@GreyNoiseIO

GreyNoise analyzes Internet background noise. Use GreyNoise to remove pointless security alerts, find compromised devices, or identify emerging threats.

Lots of different datacenters
Vrijeme pridruživanja: rujan 2017.

Tweetovi

Blokirali ste korisnika/cu @GreyNoiseIO

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GreyNoiseIO

  1. Prikvačeni tweet

    Announcing GreyNoise accounts. Create a free account, or sign in with your Google account, to run unlimited GreyNoise visualizer searches, query for "interesting" devices, receive (extremely infrequent) product update emails, and retrieve a two week GreyNoise Enterprise API key

    Prikaži ovu nit
    Poništi
  2. 16. sij

    We are observing ~50 non-benign devices opportunistically crawling the Internet for or exploiting Citrix CVE-2019-19781 cve:CVE-2019-19781 -classification:benign

    Poništi
  3. proslijedio/la je Tweet
    13. sij

    I am *INSANELY* excited to announce that Guillermo Menjivar () has joined today on the Engineering team. Guillermo and I worked closely together at Endgame for several years and I have been not-so-subtly trying to hire him since then. WELCOME ABOARD!!!!!!

    Poništi
  4. 11. sij

    GreyNoise is tagging Citrix Netscaler CVE-2019-19781. Additionally, effective tonight, GNQL now supports searching by CVE. Use the following GNQL query to identify non-benign devices opportunistically exploiting this vulnerability. cve:cve-2019-19781 -classification:benign

    Poništi
  5. proslijedio/la je Tweet
    6. sij

    Blue Team folks, analysis/filtering of scanning noise from IP log data has become an indispensable tool in my belt. So I made a cheat sheet for using the Python CLI and the Web UI 😀 Amazing tool and it's free!

    Poništi
  6. 3. sij

    We're investigating a significant spike in potentially spoofed Internet-wide port scan traffic. This thread will be updated as the situation develops. Related:

    Poništi
  7. proslijedio/la je Tweet
    23. pro 2019.

    last month we submitted a PR to update the cortex analyzer for to use their shiny v2 API and it finally got merged! 🤗

    Poništi
  8. proslijedio/la je Tweet
    20. pro 2019.

    . is now tagging Metasploit. Turns out devices geographically located in China really love using Metasploit to indiscriminately test hosts on the Internet for open web proxies. tags:"Metasploit"

    Poništi
  9. GreyNoise Python library and CLI v0.4.0 has been released. New features include: greynoise analyze - analyze unstructured log data greynoise filter - grep, but for internet background noise greynoise quick - query 1,000 IP addresses at a time pip3 install greynoise --upgrade

    Poništi
  10. Explore Internet-scan and attack traffic originating from Tor exit nodes for free in GreyNoise with the following GNQL query: tags:"Tor"

    Prikaži ovu nit
    Poništi
  11. This may be related to the following reported behavior which occurred at the same period of time:

    Prikaži ovu nit
    Poništi
  12. Yesterday GreyNoise observed a large (over 800x) spike in indiscriminate Internet-wide port scan traffic originating exclusively from Tor exit nodes. The scan traffic was probing for exclusively 80/TCP. No three-way-handshakes were completed. This traffic is no longer continuing.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    28. lis 2019.

    . is observing someone spoofing scan traffic from AS12903 Garanti BBVA in Turkey for ports 22, 25, 53, 80, 443, 465, 587, and 853 as over 7,000 unique IPs. We have observed this traffic pattern before and are almost certain it is spoofed.

    Prikaži ovu nit
    Poništi
  14. GreyNoise has gone live with self-onboard for our Enterprise API product. Create an account, review public pricing, purchase access to our product with a credit card or bank draft, upgrade/downgrade plans, and export invoices.

    Poništi
  15. GreyNoise is observing ~5,000 devices, all geographically located in mainland China, crawling the Internet for misconfigured proxy servers that are able to route to the English version of Radio Free Asia dot org. (rfa[.]org/english).

    Poništi
  16. proslijedio/la je Tweet

    Listen to our latest episode to learn how Andrew Morris, CEO of , helps companies filter out useless noise and focus time and resources on what really matters:

    Poništi
  17. GreyNoise is observing opportunistic exploitation of the recent vBulletin 5.x remote code execution vulnerability (CVE-2019-16759), starting three hours ago from several hundred devices around the Internet. Tags available now. tags:"vBulletin 5.x RCE"

    Poništi
  18. GreyNoise now visually highlights Tor exit nodes on the free web interface for all users

    Poništi
  19. Coming soon: - GreyNoise Alerts - Saved searches - PCAP download - Enterprise self-service and account management - Export search results to CSV, JSON, XML - IDS signature submission and tagging

    Prikaži ovu nit
    Poništi
  20. Find devices crawling the Internet to find systems vulnerable to the "Heartbleed" vulnerability with the following GNQL query: tags:"Heartbleed Scanner" or just heartbleed Filter out Tor nodes by adding the following operator: -tags:tor

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·