Developers can check API Specification here:
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/ip/123.129.198.186
import requests
import json
url = 'https://api.maltiverse.com/ip/123.129.198.186'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
$url = 'https://api.maltiverse.com/ip/123.129.198.186'
$headers = @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
{
"address": "No.21,Financial Street\nBeijing,100033\nP.R.China",
"as_name": "AS4837 CNCGROUP China169 Backbone",
"as_number": "4837",
"asn_cidr": "123.128.0.0/13",
"asn_country_code": "CN",
"asn_date": "2007-02-15 00:00:00",
"asn_registry": "apnic",
"blacklist": [
{
"count": 6,
"description": "Backdoor.Poison",
"first_seen": "2021-01-13 19:45:17",
"last_seen": "2021-03-06 06:15:41",
"source": "Hybrid-Analysis"
}
],
"cidr": [
"123.128.0.0/13"
],
"city": "Jinan",
"classification": "suspicious",
"country_code": "CN",
"creation_time": "2021-01-13 19:45:17",
"email": [
"hqs-ipabuse@chinaunicom.cn",
"ip@pub.sd.cninfo.net"
],
"ip_addr": "123.129.198.186",
"ip_version": 4,
"is_cdn": false,
"is_cnc": false,
"is_distributing_malware": false,
"is_hosting": false,
"is_iot_threat": false,
"is_known_attacker": false,
"is_known_scanner": false,
"is_mining_pool": false,
"is_open_proxy": false,
"is_sinkhole": false,
"is_tor_node": false,
"is_vpn_node": false,
"location": {
"lat": 36.6621,
"lon": 117.0104
},
"modification_time": "2024-05-09 11:22:07",
"number_of_blacklisted_domains_resolving": 0,
"number_of_domains_resolving": 0,
"number_of_offline_malicious_urls_allocated": 0,
"number_of_online_malicious_urls_allocated": 0,
"number_of_whitelisted_domains_resolving": 0,
"registrant_name": "China Unicom Shandong Province Network\nChina Unicom",
"type": "ip"
}
Date | Filename | Blacklist |
---|---|---|
Sat Mar 06 2021 06:15:41 GMT+0000 | -0914a-自動更新.exe | |
Wed Jan 13 2021 19:45:17 GMT+0000 | CWUT.exe |