➤ Full Lab Report • Dashboard XML • Key SPL
This home-lab demonstrates how to detect Nmap SYN scans using Snort and visualize the alerts in Splunk.
The setup includes a small but functional Splunk dashboard with panels for top sources, top destination ports, timelines, and recent alerts.
- Real-time
TCP Portscan Detected (SYN burst)alerts from Snort - Parsed fields for source IP, destination IP, protocol, ports, and priority
- A simple, readable Splunk dashboard for triage
scripts/– helper scripts to run Snort and add Splunk monitorssplunk/– XML export of the Splunk dashboardqueries/– SPL queries used by the panelsdocs/screenshots/– screenshots for README and LinkedIn
- Start Snort on a host-only NIC and log output:
sudo ./scripts/run_snort_console.sh
Dashboard overview
Panels
| Over time | Top sources | Top destination ports |
|---|---|---|
![]() |
![]() |
![]() |
Last 50 alerts
Live terminals







