Welcome to the new Splunkbase! To return to the old Splunkbase, .
Warning

This app is archived.

Centurion - Threat Hunting Feed Aggregator app icon

Centurion - Threat Hunting Feed Aggregator

The team behind SplunkConf 2015 innovation award brings to you another interesting App.

Built by
splunk product badge
screenshot
screenshot
screenshot

Latest Version 3.0.1
April 26, 2021
Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0, 7.3, 7.2
Rating

0

(0)

Log in to rate this app
Support
Centurion - Threat Hunting Feed Aggregator support icon
Not Supported
The team behind SplunkConf 2015 innovation award brings to you another interesting App. Threat Hunting is a new arsenal for security professionals. There are many research organizations that have invested heavily in identifying IOCs (Indicator of Compromise). Such IOC vendors share the data via a web search or through API. The bad news is that there are many IOC vendors and it is not possible for an engineer to search data on each of these IOC service providers. We are trying to solve this issue by aggregating these IOC vendors to a single platform. Instead of searching numerous portals, you can now hunt the IOCs from Splunk App called Centurion. The application will help users to search IP address reputation against multiple threat sharing platforms. Install this app on your search head and happy threat hunting. At this moment we have 21 supported providers and will keep on adding more in further releases. The name Centurion is given purposefully as we want to add at least 100 IOC vendors to this app. Please suggest (splunk@qostechnology.in) your favorite IOC vendor and we will add it in our next release.

Categories

Created By

QOS Tech

Type

app

Downloads

1,210

Splunk Answers

Resources

Log in to report this app listing