Playbook: Investigate IP Address Performing Reconnaissance Activity

Security Splunk

Whether from an intrusion detection system or through log analysis, security devices can generate alerts when reconnaissance activity is detected.

The Phantom platform can receive these alerts and automate key investigation steps on the source IP and DNS domain. If one or both of the source attributes are determined to be malicious, Phantom can enrich the alert with the results of its investigation and escalate it up to a human analyst for further action.

Screenshot from the Phantom platform’s visual playbook editor.

As shown in the above diagram, the Phantom platform ingests the reconnaissance alert and triggers the Reconnaissance Investigation playbook automating the following steps:

Automating this process in Phantom has several benefits including:

Did you know that Phantom playbooks are Python-based? The Phantom platform interprets playbooks in order to execute your mission when you see something that you want to take action on. They hook into the Phantom platform and all of its capabilities in order to execute actions, ensuring a repeatable and auditable process around your security operations. Sample community playbooks can be customized at will and are synchronized via Git and published in our public Community GitHub repository. You can read more about the Phantom platform and playbooks here.

Interested in seeing how Phantom playbooks can help your organization? Get the free Phantom Community Edition.

----------------------------------------------------
Thanks!
Chris Simmons

Related Articles

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security
Security
3 Minute Read

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security

We worked with Peerspot to capture some of the ways customers have found success while using Splunk SOAR as part of their security stack.
Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future
Security
1 Minute Read

Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

Join Splunk at RSAC™ 2025 to discover cutting-edge security solutions for building the SOC of the Future. Explore data management, SIEM advancements, and more.
Play Now with BOTS Partner Experiences: Corelight
Security
2 Minute Read

Play Now with BOTS Partner Experiences: Corelight

With the official launch of bots.splunk.com, we're pleased to announce Partner Experiences – capture the flag (CTF) on-demand challenges, built by a Splunk technology partner, running in Splunk, hosted on the BOTS platform and available for free.