Find Connections for a Specific IP Address

Sometimes, if you find that a specific IP address has made unauthorized connections to your environments, you may want to find out what other connections were made to this IP address.

Step 1: Build the request to retrieve connections

To help you find connections for an IP address, you need to build a query that filters by the IP address.

To build the request, replace the placeholders in the relevant cURL command, request body example, or Python script:

curl --request POST \
          --url https://<your server>/rest/visualsearch/query/simple \
          --header 'Content-Type:application/json' \
          --data '{
                      "queryPath": [
                        {
                          "requestedType": "Connection",
                          "filters": [

                          ],
                          "connectionFeature": {
                            "elementInstanceType": "Connection",
                            "featureName": "localAddress"
                          },
                          "isResult": true
                        },
                        {
                          "requestedType": "IpAddress",
                          "filters": [
                            {
                              "facetName": "elementDisplayName",
                              "filterType": "Contains",
                              "values": [
                                "192.168.223.128"
                              ]
                            }
                          ],
                          "isResult": false
                        }
                      ],
                      "totalResultLimit": "100",
                      "perGroupLimit": 100,
                      "perFeatureLimit": 100,
                      "templateContext": "DETAILS",
                      "queryTimeout": 120000,
                      "pagination": {
                        "pageSize": 1000
                      },
                      "customFields": [
                          "ownerMachine",
                          "ownerProcess.user",
                          "localPort",
                          "remotePort",
                          "transportProtocol",
                          "state",
                          "calculatedCreationTime",
                          "endTime",
                          "elementDisplayName"
                      ]
                    }'

Step 2: Run your request and generate the response

In the command line, REST API client, or IDE, run the command or script that contains the request. After a few seconds, the Cybereason API returns a response.

Step 3: Evaluate the response

The response contains a large number fields. Focus on these fields for meaningful information: