Developers can check API Specification here:
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/hostname/importtoys.nl
import requests
import json
url = 'https://api.maltiverse.com/hostname/importtoys.nl'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
$url = 'https://api.maltiverse.com/hostname/importtoys.nl'
$headers = @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
{
"as_name": "AS15879 IS Group B.V.",
"as_number": "15879",
"blacklist": [
{
"count": 1,
"description": "Malicious domain",
"first_seen": "2019-12-19 02:49:33",
"last_seen": "2019-12-19 02:49:33",
"source": "SANS Internet Storm Center"
},
{
"count": 1,
"description": "Ransomware Locky distribution site",
"first_seen": "2018-01-31 01:49:45",
"last_seen": "2018-04-15 21:11:17",
"source": "Ransomware Tracker"
},
{
"count": 1,
"description": "Ransomware",
"first_seen": "2018-01-31 01:49:45",
"last_seen": "2018-04-12 20:18:52",
"source": "Ransomware Tracker"
}
],
"classification": "malicious",
"creation_time": "2018-01-31 01:49:45",
"domain": "importtoys.nl",
"domain_consonants": 9,
"domain_lenght": 13,
"entropy": 3.3927474104487847,
"hostname": "importtoys.nl",
"is_alive": false,
"is_cnc": false,
"is_distributing_malware": false,
"is_iot_threat": false,
"is_mining_pool": false,
"is_open_proxy": false,
"is_phishing": false,
"is_storing_phishing": false,
"is_tor_node": false,
"is_vpn_node": false,
"last_online_time": "2025-09-03 22:00:53",
"modification_time": "2019-12-19 02:49:33",
"number_of_offline_malicious_urls_allocated": 0,
"number_of_online_malicious_urls_allocated": 0,
"resolved_ip": [
{
"ip_addr": "87.250.130.135",
"timestamp": "2019-12-19 02:49:33"
}
],
"tag": [
"ransomware"
],
"tld": "nl",
"type": "hostname"
}
Resolution date | IP |
---|---|
Thu Dec 19 2019 02:49:33 GMT+0000 | 87.250.130.135 |