IP Reputation Check & Threat Summary using Splunk + VirusTotal + AlienVault + n8n
This workflow automates IP reputation analysis using Splunk alerts , enriches data via VirusTotal and AlienVault OTX , and generates actionable threat summaries for SOC teams — all without any coding.
What It Does
When a Splunk alert contains a suspicious IP:
-
Ingests the IP from the Splunk alert via webhook.
-
Performs dual threat enrichment using:
- VirusTotal IP reputation & tags.
- AlienVault OTX pulses, reputation & WHOIS.
-
Merges & processes threat intel data.
-
Generates a rich HTML summary for analyst review.
-
Routes action based on severity :
- Sends Slack alert for suspicious IPs.
- Creates an incident in ServiceNow.
- Emails a formatted HTML report to the SOC inbox.
Tech Stack Used
-
Splunk – SIEM alert source
-
VirusTotal API – Reputation check & analysis stats
-
AlienVault OTX API – Community threat intel & pulse info
-
n8n – For orchestration, merging, summary generation
-
Slack, Gmail, ServiceNow – For SOC notifications and ticketing
Ideal Use Case
Perfect for security teams wanting to:
- Automatically validate IP reputation from SIEM logs
- Get quick context from multiple threat feeds
- Generate email-ready reports and escalate high-risk IPs
Included Nodes
- Webhooks (Splunk)
- Function nodes for IOC extraction and intel processing
- HTTP Request (VirusTotal & AlienVault)
- Merge + Switch nodes for conditional logic
- Gmail, Slack, ServiceNow integration
Tips
- Add your VirusTotal and AlienVault credentials in n8n's credential manager.
- Use the Switch node to route based on your internal threat score logic.
- Easily extend this to include AbuseIPDB or GreyNoise for deeper enrichment.