Tired of dealing with brute force attempts, web crawlers, and other scanners filling up your logs and trying to break into your infrastructure? With GreyNoise’s blocklists, you can prevent noisy scanners from hitting your perimeter, effectively shutting them out, and giving yourself time to patch when there is an emerging exploit.
Blocklists are supported within our Tags pages, and adding a dynamic blocklist to your firewall is simple. From our Tag Details page, choose the Automated ‘Block At Firewall’ action to generate the Blocklist URL. Integrate it with your next-generation firewall and you are protected!
See an example and sign up to start using blocklists for free.
Our GreyNoise research team stays on top of emerging vulnerabilities and exploits that result in internet-wide exploitation so that our users don’t miss an emerging threat. With our Trends feature, you can follow these emerging trends, and take action such as block malicious activity from your environment from our Tags page. We also publish regular reports that give customers insight into exploitation activity and threats.
It’s very easy! GreyNoise provides out-of-the-box integrations with many leading SIEM, SOAR, TIP, and other security solutions (view them here) . Customers can also use our comprehensive API to build custom integrations for their use cases. We also provide daily feeds of malicious or benign activity that can be used for bulk analysis integrations.
GreyNoise is constantly updating its databases in real-time. We have thousands of sensors across the world that monitor for internet-wide exploitation, and as soon as our sensors see activity, the behavior is tagged and visible to our customers. Our research team actively stays on top of emerging vulnerabilities to make sure GreyNoise’s NOISE database has the latest threats tagged. Our RIOT database, which labels common business services, is also refreshed regularly and updated with changes.
GreyNoise provides a variety of resources to ensure our users are successful, including documentation, in-product onboarding, and training. Our paid customers also get onboarding and support provided by our excellent Customer Success team.
GreyNoise Tags is a signature-based detection method used to capture patterns and create subsets in our data. Tags cover five primary categories: Activity, Tool, Actor, Worm, and Search Engine.
GreyNoise Trends includes the ability to access a dynamic list of IPs that can be used in the Dynamic Block List feature in many of today's firewall products.
By Jacob Fisher
On December 12th, 2022 Fortinet released a PSIRT Advisory for CVE-2022-42475 noting that it had been exploited in the wild.
By The GreyNoise Team
In today’s release of the GreyNoise Intelligence 2022 "Year of Mass Exploits" retrospective report, we showcase four of 2022's most pernicious and pwnable vulnerabilities.
By The GreyNoise Team
GreyNoise tags are described in the documentation as “a signature-based detection method used to capture patterns and create subsets in our data.”