You could try using append followed by a grouping stats and eventstats:
<first SPL>
| append
[| search <second SPL> ]
| stats values(*) as * by clientIP instanceID
| eventstats dc(instanceID) as instances by clientIP
from User warren – Stack Overflow https://stackoverflow.com/questions/74121673/splunk-how-to-display-multiple-stats-queries-in-table/74124736#74124736
via IFTTT