Intelligence Module - Hunt

Data Dictionary: Intelligence Module - Hunt - Entitlements

This outlines the field types associated with the IP and Query endpoint responses that are entitled based on purchasing the Hunt Intelligence Module.

Last Updated: 2025-10-08

Field NameField TypeExampleDescriptionQuery Sample
actorstringunknownConfirmed owner or operator of the IP address.Sample
botbooleanfalseIndicates whether the IP is associated with known bot activity.Sample
classificationstringunknownClassification of the IP address. Possible values: benign, unknown, malicious, suspicious.Sample
cvestring list["CVE-2025-12345"]Provides a list of CVEs the IP has been observed scanning or exploiting.Sample
first_seendate2021-11-23Date when the IP was first observed on the GreyNoise sensor network (YYYY-MM-DD format).Sample
ipstring1.2.3.4IP address observed on the GreyNoise sensor network.
last_seendate2021-12-31Date when the IP was most recently observed on the GreyNoise sensor network (YYYY-MM-DD format).Sample
last_seen_timestampstring2021-12-31 05:32:53Date + Time when the IP was most recently observed on the GreyNoise sensor network (YYYY-MM-DD format).
metadataobject{"asn": "AS51747", "category": "hosting", "destination_asns": [...], ...}Additional metadata about the IP address. Items not included in this module will be empty.
metadata.asnstringAS37963ASN (Autonomous System Number) associated with the IP address.Sample
metadata.categorystringhostingCategory of the IP address such as hosting or ISP.Sample
metadata.destination_asnsstring list["AS20473", "AS44477"]List of ASNs assoictated with sensors that observed scanning traffic from this IP.
metadata.destination_citiesstring list["Hong Kong", "Elk Grove Village", "Haarlem"]List of cities where sensors that observed scanning traffic from this IP are located.
metadata.destination_countriesstring list['Belarus']List of countries where sensors that observed scanning traffic from this IP are located.Sample
metadata.destination_country_codesstring list['BY']List of country codes where sensors that observed scanning traffic from this IP are located.Sample
metadata.domainstringlionlink.netDomain associated with the IP ASN owner.Sample
metadata.mobilebooleantrueDefines if the IP is part of a known cellular network.Sample
metadata.organizationstringFranTech SolutionsOrganization associated with the IP address.Sample
metadata.osstringWindows XPOperating system associated with the IP address.Sample
metadata.rdnsstringmiamitor4.usrDNS (reverse DNS lookup) value for the IP address.Sample
metadata.rdns_parentstringacme.lclParent domain associated with the rDNS value.Sample
metadata.regionstringFloridaRegion (state or province) where the IP address is registered or operates.Sample
metadata.single_destinationbooleanTrueIndicates that the IP only scanned a single destination country.Sample
metadata.sensor_countsinteger3Number of distinct sensors that observed scanning from this IP.
metadata.sensor_hitsinteger20Number of recorded events on all sensors from this IP.
metadata.source_citystringMiamiCity where the IP address is registered or operates.Sample
metadata.source_countrystringUnited StatesCountry where the IP address is registered or operates.Sample
metadata.source_country_codestringUSCountry code of the IP address based on ISO 3166-1 alpha-2.Sample
raw_dataobject{"hassh": [...], "http": {...}, "ja3": [...], "scan": [...], "source": {...}, "ssh": {...}, "tls": {...}}Observed activity from the GreyNoise sensor network. Values not included in this module will be empty.
raw_data.hasshobject list[{"fingerprint": "acaa53e0a7d7ac7d1255103f37901306", "port": 2222}]Recorded hashing information for SSH activity observed.
raw_data.hassh.fingerprintstringa7a87fbe86774c2e40cc4a7ea2ab1b3cRecorded fingerprint value for SSH activity observed.Sample
raw_data.hassh.portstring22Associated port for SSH activity observed.Sample
raw_data.httpobject{"md5": [...], "cookie_keys": [...], "request_authorization": [...], "request_cookies": [...], "request_header": [...], "method": [...], "path": [...], "request_origin": [...], "useragent": [...]}
raw_data.http.md5string list["690e440f039d37e8098f20406f460c11"]
raw_data.http.cookie_keysstring list["T", "ssiddcsession_ref"]
raw_data.http.request_authorizationstring list["Digest username=\"dslf-config\", realm=\"HuaweiHomeGateway\", nonce=\"88645cefb1f9ede0e336e3569d75ee30\", uri=\"/ctrlt/DeviceUpgrade_1\", response=\"3612f843a42db38f48f59d2a3597e19c\", algorithm=\"MD5\", qop=\"auth\", nc=00000001, cnonce=\"248d1a2560100669\""]
raw_data.http.request_cookiesstring list["T=bozH7ydpNM81XU0zFLF4FDrSrp2v/1yRS1QFryl9hYaUbLwLcTBP6DEVdfIF7wqpkDxnvY5b8pj+wtEVhMM1dXepjVgqewc9XKjcw0hGPn5L7Ck4iQtpcoMpUGT96Z0kKULQkmAFrMuWA8CeLrWND1ljHQgcxYJ2eqJ9ciU/Lw8wlqrnfrzQVXBwWWZQW6gROiCY99M3+HnqiKKe2bZMQ+tT4hujUbMZyDQG+8P/pJvjot0+eTN8ITg="]
raw_data.http.request_headerstring list["user-agent", "accept-language"]
raw_data.http.methodstring list["GET"]
raw_data.http.pathstring list["/favicon.ico"]Observed scanning activity traversed this web path.Sample
raw_data.http.request_origin["2a03:2880:f800:a::", "216.244.66.199"]
raw_data.http.useragentstring list["Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)"]Observed scanning activity used these user agents.Sample
raw_data.http.ja4hstring list["ge11cn060000_4e59edc1297a_4da5efaf0cbd"]Returns all devices with a matching JA4H HTTP fingerprintSample
raw_data.ja3object list[{"fingerprint": "19e29534fd49dd27d09234e639c4057e", "port": 8443}]Recorded hashing information for TLS activity observed.
raw_data.ja3.fingerprintstring19e29534fd49dd27d09234e639c4057eRecorded fingerprint value for JA3 activity observed.Sample
raw_data.ja3.portint8443Associated port for TLS activity observed.Sample
raw_data.scanobject list[{"port": 22, "protocol": "TCP"}]Recorded port and protocol information for scanning activity observed.
raw_data.scan.portint22Recorded port for scanning activity observed.Sample
raw_data.scan.protocolstringTCPRecorded protocol for scanning activity observed.Sample
raw_data.source.bytesint2224
raw_data.ssh.keystring list["AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL1myjWMrndjPuBmq6/VoA56UnDtVw/ViMZQkYYsMbIthGyK6Cg+fMQiVWEx3Va6HTtoveVm9v8nX+EsD5+y90o="]
raw_data.ssh.ja4sshstring list["c76s76_c71s59_c0s0"]Returns all devices with a matching JA4SSH fingerprintSample
raw_data.tcp.ja4lstring list["1460_64"]Returns all devices with a matching JA4L light distance/latency fingerprintSample
raw_data.tcp.ja4tstring list["64240_2-1-3-1-1-4_1460_8"]Returns all devices with a matching JA4T TCP fingerprintSample
raw_data.tls.cipherstring list["TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA", "TLS_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"]
raw_data.tls.ja4string list["t12i060100_eca7c5d91837_338aad02a631", "t13i871000_72303a6ce03a_24695f2957a7"]
spoofablebooleanfalseIndicates whether the IP completed a three-way handshake with the GreyNoise sensor network. If true, the traffic may be spoofed.Sample
tagsobject list[{"category": "activity", "created": "2020-04-07", "cves": [], "description": "...", "id": "...", "intention": "malicious", "name": "CGI Script Scanner", "recommend_block": false, "references": [...], "slug": "cgi-script-scanner", "updated_at": "2025-05-14T04:12:40.778197Z"}]List of tags associated with this IP and the tags details.Sample
tags.categorystringactivityCategory type for the identified tag.
tags.created_atdate2020-04-07Date the tag was added to GreyNoise.
tags.cvesstring list["CVE-1992-2342"]Any CVEs associated with the behavior detected by the tag.
tags.descriptionstringThis is a tag description.A brief description of what the tag identifies.
tags.idstringfeb92353-4264-44ce-8f7d-8ddae93719daThe unique id given to the tag.
tags.intentionstringmaliciousThe identified intention of the activity detected by this tag.
tags.namestringCGI Script ScannerThe name of the tag.
tags.recommended_blockbooleanfalseIndicates if IPs associated with this tag should be blocked.
tags.referencesstring list["https://en.wikipedia.org/wiki/Common_Gateway_Interface"]A list of references used to create this tag.
tags.slugstringcgi-script-scannerThe slug associated with the tag.
tags.updated_atdata2025-05-14T04:12:40.778197ZThe last time this tag was updated or modified.
torbooleantrueIndicates whether the IP is a known Tor exit node.Sample
vpnbooleanfalseIndicates if the IP is associated with a known VPN service.Sample
vpn_servicestringPIA_VPNName of the VPN service associated with the IP (if applicable).Sample

These additional fields are available through the CVE API:

Field NameField TypeExampleDescription
idstringCVE-2024-12345The CVE ID.
detailsobject{"vulnerability_name": "Acme Inc Expoilt Attempt", "vulnerability_description": "Potentially allowing Acme Inc to exploit anvil drop on new users.", "cve_cvss_score": 4.5, "product": "Acme Inc", "vendor": "Anvil Drop", "published_to_nist_nvd": true}Basic CVE details, including CVSS score (Common Vulnerability Scoring System), associated products & vendors, and NIST CVE recognition status.
details.vulnerability_namestringAcme Inc Expoilt AttemptName of the vulnerability.
details.vulnerability_descriptionstringPotentially allowing Acme Inc to exploit anvil drop on new users."Description of the vulnerability.
details.cve_cvss_scorefloat4.5Current CVSS score (Common Vulnerability Scoring System).
details.productstringAcme IncProduct(s) associated with the CVE.
details.vendorstringAnvil DropVendor(s) associated with the CVE.
details.published_to_nist_nvdbooleantrueWhether this CVE is recognized by NIST.
timelineobject{"cve_published_date": "2024-05-28T19:15:10.060", "cve_last_updated_date": "2024-05-31T16:04:09.703", "first_known_published_date": "2024-05-27T00:00:00Z", "cisa_kev_date_added": "2024-05-30T00:00:00Z"}Key timeline details about when the CVE was published, updated, and added to CISA (https://www.cisa.gov/known-exploited-vulnerabilities-catalog).
timeline.cve_published_datedatetime2024-05-28T19:15:10.060Date when the CVE was published by NVD.
timeline.cve_last_updated_datedatetime2024-05-31T16:04:09.703Date when the CVE record was last updated.
timeline.first_known_published_datedatetime2024-05-27T00:00:00ZDate when the first exploit associated with the CVE was published.
timeline.cisa_kev_date_addeddatetime2024-05-30T00:00:00ZDate CISA (https://www.cisa.gov/known-exploited-vulnerabilities-catalog) added a KEV (Known Exploited Vulnerability) entry associated with the CVE.
exploitation_detailsobject{"attack_vector": "NETWORK", "exploit_found": true, "exploitation_registered_in_kev": true, "epss_score": 0.94504}Exploitation-related details pertaining to attack vector category, EPSS score (Exploit Prediction Scoring System), available exploits, and KEV (Known Exploited Vulnerabilities) registration.
exploitation_details.attack_vectorstringNETWORKAttack vector category.
exploitation_details.exploit_foundbooleantrueWhether any known exploits are available.
exploitation_details.exploitation_registered_in_kevbooleantrueWhether exploitation has been registered in the KEV (Known Exploited Vulnerabilities) database.
exploitation_details.epss_scorefloat0.94504EPSS score (Exploit Prediction Scoring System) associated with the exploitation.
exploitation_statsobject{"number_of_available_exploits": 60, "number_of_threat_actors_exploiting_vulnerability": 1, "number_of_botnets_exploiting_vulnerability": 0}Statistical data about exploitation, including number of exploits available, and number of threat actors and botnets exploiting the vulnerability.
exploitation_stats.number_of_available_exploitsinteger60Total number of exploits available (public + commercial).
exploitation_stats.number_of_threat_actors_exploiting_vulnerabilityinteger1Total number of known threat actors exploiting the vulnerability.
exploitation_stats.number_of_botnets_exploiting_vulnerabilityinteger0Total number of botnets exploiting the vulnerability.
exploitation_activityobject{"activity_seen": true, "benign_ip_count_1d": 765, "benign_ip_count_10d": 765, "benign_ip_count_30d": 765, "threat_ip_count_1d": 0, "threat_ip_count_10d": 1, "threat_ip_count_30d": 14}Observed IPs scanning or exploiting the vulnerability today, in the last 10 days, and the last 30 days.
exploitation_activity.activity_seenbooleantrueWhether GreyNoise has observed activity related to this CVE.
exploitation_activity.benign_ip_count_1dinteger765Total number of benign IPs GreyNoise observed scanning or exploiting this vulnerability today.
exploitation_activity.benign_ip_count_10dinteger765Total number of benign IPs GreyNoise observed scanning or exploiting this vulnerability in the last 10 days.
exploitation_activity.benign_ip_count_30dinteger765Total number of benign IPs GreyNoise observed scanning or exploiting this vulnerability in the last 30 days.
exploitation_activity.threat_ip_count_1dinteger0Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability today.
exploitation_activity.threat_ip_count_10dinteger1Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability in the last 10 days.
exploitation_activity.threat_ip_count_30dinteger14Total number of threat IPs GreyNoise observed scanning or exploiting this vulnerability in the last 30 days.