All Posts
Cyber Threat Intelligence
SIEM
Splunk
ThreatStream
1
min read

Proactively Monitor Your Network Against Attacks Using Our FREE Threat Intelligence in Splunk

The ThreatStream Community Splunk App can get you started with Anomali's powerful Threat Intelligence, allowing you to proactively monitor your network and protect against attacks.
Published on
June 22, 2017
Table of Contents
<p><a href="https://www.anomali.com/blog/malicious-actors-inside-your-network-heres-how-to-find-them">A few weeks ago I showed how to use the Anomali ThreatStream Splunk App to hunt known actors that had been observed trying to access your environment, and in some cases where they were already inside</a>.</p><p>For those who are not yet ThreatStream customers, do not fear. Our free ThreatStream Community Splunk App can get you started with Anomali's powerful Threat Intelligence, allowing you to proactively monitor your network and protect against attacks.</p><h2>View our Weekly Threat Bulletin reports</h2><h2><img alt="" src="https://cdn.filestackcontent.com/sWaj5oIT7mmzuwoM0Ufo" style="width: 600px; height: 344px;"/></h2><p><a href="https://www.anomali.com/blog/category/weekly-threat-briefing">You might have seen the weekly Threat Briefings our labs team posts on the blog</a>. Many ThreatStream and non-ThreatStream customers alike use these posts to stay on-top what's happening in the cyber security world (attackers, malware outbreaks, threats, etc).</p><p>If you're a Splunk user you can view these Threat Briefings without ever leaving Splunk in the ThreatStream Community App. </p><h2>Automated Threat Bulletin Matches</h2><h2><img alt="" src="https://cdn.filestackcontent.com/0APDoRzwRgyVWfkcVEy4" style="width: 600px; height: 344px;"/></h2><p>Not only can you view the downloaded Threat Bulletins, the ThreatStream Community App will also match your Splunk against the Indicators of Compromise (IOCs) linked to each Bulletin. IOCs include IPs, URLs, file hashes (malware), and compromised emails, for example. If you see one of these IOCs match against your Splunk logs, it can indicate a further investigation is needed.</p><h2>Match Against Millions of IOCs</h2><p><img alt="" src="https://cdn.filestackcontent.com/y0plK7gwTe6frbaUxJCg" style="width: 454px; height: 273px;"/></p><p>If you choose, you can also forward your Splunk logs into Anomali Reports to have them analysed against millions more IOCs. If you choose to upgrade to our ThreatStream Commercial Splunk App you can download these indicators directly into Splunk, and use with other Splunk Apps.</p><h2>See the App in Action</h2><p><iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/0iMhCxBhdB4" width="560"></iframe></p><h2>Free Download on Splunkbase</h2><p>The Anomali Community App for Splunk combines the quality of Anomali’s threat intelligence with the depth of Splunk’s analytics to help organizations identify and respond to external security threats.</p><p><strong><a href="https://splunkbase.splunk.com/app/3443/">Download the ThreatStream Community Splunk App on Splunkbase here</a></strong>.</p>

FEATURED RESOURCES

January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
December 16, 2025
Anomali Cyber Watch

Anomali Cyber Watch: GhostPenguin, SharePoint Exploits, Android Spyware, CastleLoader Malware Expansion, and more

Read More
Explore All