You can bring SOC Defenders threat indicators into Splunk either by polling the REST API with a scripted input or HTTP Event Collector, or by connecting Splunk Enterprise Security’s Threat Intelligence Management module to the SOC Defenders TAXII 2.1 feed. The REST approach works on any Splunk deployment and is available on the Free tier; TAXII requires Splunk Enterprise Security and a Pro subscription.Documentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
Option 1: REST API polling
Use a scripted input or the HTTP Event Collector (HEC) to pollGET /api/v1/iocs on a schedule and forward the results to Splunk.
Set up the scripted input
Generate an API key
In the SOC Defenders dashboard, open the API Keys tab and create a new key. Copy the key value — you will not be able to view it again.
Create a polling script
Save the following script on your Splunk heavy forwarder or search head. Replace
YOUR_API_KEY and YOUR_HEC_TOKEN with your actual values.poll-iocs.sh
Free tier accounts are limited to 100 IOCs per request and 1,000 requests per day. If you need higher throughput or longer lookback periods (up to 365 days), upgrade to Pro.
Recommended poll intervals
| Tier | Recommended interval |
|---|---|
| Free | Every 15 minutes |
| Pro | Every 1 minute or continuously |
Option 2: TAXII 2.1 (Pro)
Splunk Enterprise Security includes a Threat Intelligence Management module with a built-in TAXII client. You can point it directly at the SOC Defenders TAXII server for automatic, scheduled feed polling.TAXII 2.1 integration requires a SOC Defenders Pro subscription and Splunk Enterprise Security.
Configure the TAXII feed
Open Threat Intelligence Management
In Splunk Enterprise Security, go to Security Intelligence → Threat Intelligence Management → Threat Intelligence Sources.
Add a new TAXII source
Click New Source and select TAXII Feed. Fill in the following fields:
| Field | Value |
|---|---|
| Name | SOC Defenders |
| TAXII server URL | https://www.socdefenders.ai/api/taxii2/ |
| Username | apikey |
| Password | Your SOC Defenders API key |
| Poll interval | 60 minutes (adjust to your needs) |
Select collections
After connecting, choose from the available collections:
- All IOCs — every indicator type
- IPs only — IPv4 and IPv6 addresses
- Hashes only — MD5, SHA1, SHA256
- CVEs — vulnerability identifiers