Back to Templates

IP Reputation Check & SOC Alerts with Splunk, VirusTotal and AlienVault

Created by

Created by: Rajneesh Gupta || rajneeshgupta

Rajneesh Gupta

Last update

Last update 4 hours ago

Categories

Share


IP Reputation Check & Threat Summary using Splunk + VirusTotal + AlienVault + n8n

This workflow automates IP reputation analysis using Splunk alerts, enriches data via VirusTotal and AlienVault OTX, and generates actionable threat summaries for SOC teams — all without any coding.


What It Does

When a Splunk alert contains a suspicious IP:

  • Ingests the IP from the Splunk alert via webhook.
  • Performs dual threat enrichment using:
    • VirusTotal IP reputation & tags.
    • AlienVault OTX pulses, reputation & WHOIS.
  • Merges & processes threat intel data.
  • Generates a rich HTML summary for analyst review.
  • Routes action based on severity:
    • Sends Slack alert for suspicious IPs.
    • Creates an incident in ServiceNow.
    • Emails a formatted HTML report to the SOC inbox.

Tech Stack Used

  • Splunk – SIEM alert source
  • VirusTotal API – Reputation check & analysis stats
  • AlienVault OTX API – Community threat intel & pulse info
  • n8n – For orchestration, merging, summary generation
  • Slack, Gmail, ServiceNow – For SOC notifications and ticketing

Ideal Use Case

Perfect for security teams wanting to:

  • Automatically validate IP reputation from SIEM logs
  • Get quick context from multiple threat feeds
  • Generate email-ready reports and escalate high-risk IPs

Included Nodes

  • Webhook (Splunk)
  • Function nodes for IOC extraction and intel processing
  • HTTP Request (VirusTotal & AlienVault)
  • Merge + Switch nodes for conditional logic
  • Gmail, Slack, ServiceNow integration

Tips

  • Add your VirusTotal and AlienVault credentials in n8n's credential manager.
  • Use the Switch node to route based on your internal threat score logic.
  • Easily extend this to include AbuseIPDB or GreyNoise for deeper enrichment.