Skip to main content
Splunk Lantern

Detecting TOR traffic

The TOR anonymity network is the perfect place to hide command-and-control, exfiltration, or ransomware payment through bitcoin. You would like to use firewall data to find TOR traffic on your network.

Data required

Firewall data

How to use Splunk software for this use case

Next steps

For more great content from the Splunk Education and Training team, check out Splunk How-To on YouTube or sign up for a course.  In addition, these Splunk resources might help you understand and implement this search:

Still need help with this use case? Most customers have OnDemand Services per their license support plan. Engage the ODS team at OnDemand-Inquires@splunk.com if you require assistance.