Developers can check API Specification here:
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/ip/177.91.208.143
import requests
import json
url = 'https://api.maltiverse.com/ip/177.91.208.143'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
$url = 'https://api.maltiverse.com/ip/177.91.208.143'
$headers = @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
{
"as_name": "AS52945 E L Producoes de Software Ltda",
"as_number": "52945",
"asn_cidr": "177.91.192.0/19",
"asn_country_code": "BR",
"asn_date": "2013-12-06 00:00:00",
"asn_registry": "lacnic",
"blacklist": [
{
"count": 1,
"description": "phishing,ransomware,rat,wanacrypt0r,wannacry,wcry",
"first_seen": "2018-01-31 21:16:31",
"last_seen": "2018-01-31 21:16:31",
"source": "Maltiverse"
}
],
"cidr": [
"177.91.192.0/19"
],
"classification": "suspicious",
"country_code": "BR",
"creation_time": "2018-01-31 21:16:31",
"email": [
"registro@el.com.br",
"cert@cert.br"
],
"ip_addr": "177.91.208.143",
"ip_version": 4,
"is_cdn": false,
"is_cnc": false,
"is_distributing_malware": false,
"is_hosting": false,
"is_iot_threat": false,
"is_known_attacker": false,
"is_known_scanner": false,
"is_mining_pool": false,
"is_open_proxy": false,
"is_sinkhole": false,
"is_tor_node": false,
"is_vpn_node": false,
"last_updated": "2014-05-01 00:00:00",
"location": {
"lat": -20.3167,
"lon": -40.35
},
"modification_time": "2018-01-31 21:16:31",
"number_of_blacklisted_domains_resolving": 0,
"number_of_domains_resolving": 0,
"number_of_offline_malicious_urls_allocated": 0,
"number_of_online_malicious_urls_allocated": 0,
"number_of_whitelisted_domains_resolving": 0,
"registrant_name": "E&L Producoes de Software Ltda",
"tag": [
"phishing",
"ransomware",
"rat",
"wanacrypt0r",
"wannacry",
"wcry"
],
"type": "ip"
}
Date | Filename | Blacklist |
---|---|---|
Wed Jan 31 2018 21:13:53 GMT+0000 | 033e4b8d5a2f03205aedccf01060c65e |