Splunk Integration Overview

Connect your Splunk environment to Whisper Security's Knowledge Graph for IOC enrichment, threat intel, and attack surface monitoring.

Updated April 2026Splunk Integration

Splunk Integration Overview Documentation

Splunk Technology Add-on for Whisper Security's Knowledge Graph API.

Overview

Whisper Splunk connects your Splunk environment to Whisper Security's Knowledge Graph -- billions of nodes, tens of billions of edges, and millions of threat intel edges across 40+ feed sources.

You get IOC enrichment, ad-hoc graph queries, threat intel lookups, risk-based alerting, correlation searches, attack surface monitoring, and compliance dashboards.

Components

ComponentDescription
TA-whisper-securityTechnology Add-on -- custom search commands, modular inputs, KV Store caching, and enrichment
ES IntegrationEnterprise Security -- threat intel framework, risk-based alerting, correlation searches

Search Commands

CommandTypeDescription
whisperlookupStreamingEnrich events with IOC context from the Knowledge Graph
whisperqueryGeneratingExecute ad-hoc Cypher queries against the Knowledge Graph
whisperschemaGeneratingExplore the Knowledge Graph schema (labels, relationships, properties, metadata)
whisperflushGeneratingFlush the enrichment cache

Pre-Built Macros

MacroDescription
whisper_shared_nameservers(domain)Find domains sharing nameservers
whisper_asn_infrastructure(asn)Enumerate prefixes and hostnames behind an ASN
whisper_cname_chain(domain)Resolve CNAME chain (up to 5 hops)
whisper_spf_chain(domain)Trace SPF include chain
whisper_bgp_peers(asn)List BGP peers
whisper_cohosted_domains(domain)Find co-hosted domains
whisper_full_investigation(indicator)Full infrastructure investigation
whisper_explain(indicator)Get threat assessment

Correlation Searches

SearchScheduleDescription
Bulletproof ASN Communication15 minDetects communication with bulletproof hosting ASNs
Shared Nameserver with Threat Infrastructure4 hoursIdentifies domains sharing nameservers with known threats
DNS Infrastructure Change Detection6 hoursDetects unexpected DNS infrastructure changes
Low Co-Hosting Density Anomaly30 minFlags low co-hosting density (dedicated threat infrastructure)

All correlation searches are disabled by default and generate ES risk events when enabled.

Getting Started

  1. About -- What the add-on does
  2. Requirements -- Hardware, software, and network prerequisites
  3. Installation -- Install the TA
  4. Configuration -- Set up your API key and connection settings
  5. Use Cases -- Security workflow examples
  6. Search Commands -- Start enriching events
  7. Dashboards -- Enable compliance and attack surface dashboards

Whisper Security Add-on for Splunk

The Whisper Security Add-on for Splunk connects your Splunk environment to Whisper Security's Knowledge Graph -- a large-scale internet infrastructure intelligence database.

Knowledge Graph at a glance

MetricValue
Total nodesBillions
Total edgesTens of billions
Threat intel edgesMillions
Threat feed sources40+
Threat feed categories18
Node types23 (HOSTNAME, IPV4, ASN, PREFIX, EMAIL, ORGANIZATION, ...)
Edge types60+ (DNS, BGP, WHOIS, GeoIP, SPF, Web, Threat)

The graph covers DNS resolution, BGP routing, WHOIS registration, GeoIP location, SPF email authentication, web link relationships, and threat intelligence -- all queryable through a single Cypher API.

What the add-on does

The add-on brings this data into Splunk in four ways:

IOC enrichment -- Enrich IP addresses and domains in your security events with infrastructure context: ASN, country, threat score, CNAME chains, nameservers, WHOIS data, GeoIP, BGP hijack detection, and web link profiles. All enrichment happens inline in SPL via the whisperlookup streaming command.

Ad-hoc graph queries -- Execute Cypher queries directly against the Knowledge Graph from Splunk's search bar using whisperquery. Investigate infrastructure relationships, pivot across DNS/BGP/WHOIS data, and explore the graph schema with whisperschema.

Threat intelligence for Enterprise Security -- Populate ES threat intel collections (ip_intel and domain_intel) with Whisper data. Four correlation searches detect bulletproof ASN communication, shared nameservers with threat infrastructure, DNS changes, and co-hosting anomalies. All searches generate risk events with MITRE ATT&CK annotations.

Attack surface monitoring -- Track DNS infrastructure changes for your external-facing domains. Detect new subdomains, IP changes, nameserver migrations, and MX record modifications. Compliance dashboards cover SPF, DNSSEC, and mail configuration.

Feature matrix

FeatureDescriptionRequires ES
whisperlookup commandInline IOC enrichmentNo
whisperquery commandAd-hoc Cypher queriesNo
whisperschema commandGraph schema explorationNo
whisperflush commandCache managementNo
8 investigation macrosPre-built Cypher queriesNo
Health monitoring inputAPI health and graph statsNo
DNS baseline inputAttack surface monitoringNo
Multi-tenant baselineMSSP multi-client supportNo
Watchlist enrichmentPre-computed IOC enrichmentNo
Threat intel inputES ip_intel / domain_intelYes
29 correlation searchesRisk-based alerting with MITREYes
Adaptive response actionAlert-triggered enrichmentYes
11 dashboardsHealth, risk, compliance, investigationNo
KV Store cachingEnrichment result cachingNo
CIM field mappingNetwork Traffic, DNS, Threat IntelligenceNo

Compatibility

ComponentSupported versions
Splunk Enterprise9.3+
Splunk CloudVictoria Experience
Python3.9, 3.11, 3.13
Enterprise Security7.0+

Getting help