Developers can check API Specification here:
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/ip/200.73.128.183
import requests
import json
url = 'https://api.maltiverse.com/ip/200.73.128.183'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
$url = 'https://api.maltiverse.com/ip/200.73.128.183'
$headers = @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
{
"as_name": "AS7303 SIGOT ALEXIS RAUL SPEED INTERNET",
"as_number": "7303",
"asn_cidr": "200.73.128.0/18",
"asn_country_code": "AR",
"asn_date": "2001-07-10 00:00:00",
"asn_registry": "lacnic",
"blacklist": [
{
"count": 40,
"description": "Malicious host",
"first_seen": "2020-08-17 04:38:31",
"labels": [
"malicious-activity"
],
"last_seen": "2024-02-14 11:19:02",
"source": "Darklist"
},
{
"count": 1,
"description": "SSH Attacker",
"first_seen": "2020-08-02 03:55:21",
"labels": [
"malicious-activity"
],
"last_seen": "2022-07-14 01:22:45",
"source": "Blocklist.de"
},
{
"count": 1,
"description": "Malicious Host",
"first_seen": "2020-08-02 00:00:00",
"labels": [
"malicious-activity"
],
"last_seen": "2021-04-01 00:00:00",
"source": "HoneyDB"
},
{
"count": 1,
"description": "SIP Attacker",
"first_seen": "2020-08-20 03:42:11",
"labels": [
"malicious-activity"
],
"last_seen": "2021-01-16 11:10:12",
"source": "Blocklist.de"
},
{
"count": 1,
"description": "SSH Attacker",
"first_seen": "2020-08-30 15:58:04",
"last_seen": "2021-01-10 10:58:16",
"ref": [
107
],
"source": "Telefonica CO SOC"
},
{
"count": 1,
"description": "Unauthorized scanning of hosts",
"first_seen": "2020-10-11 03:48:53",
"labels": [
"malicious-activity"
],
"last_seen": "2021-01-04 09:14:46",
"source": "Blocklist.net.ua"
},
{
"count": 1,
"description": "ET COMPROMISED Known Compromised or Hostile Host Traffic UDP",
"first_seen": "2020-11-07 03:27:42",
"labels": [
"malicious-activity"
],
"last_seen": "2020-12-07 11:44:50",
"source": "Emerging Threats"
},
{
"count": 1,
"description": "ET COMPROMISED Known Compromised or Hostile Host Traffic TCP",
"first_seen": "2020-11-07 03:27:41",
"labels": [
"malicious-activity"
],
"last_seen": "2020-12-07 11:44:48",
"source": "Emerging Threats"
},
{
"count": 1,
"description": "Brute force passwords using SSH on server PS2",
"first_seen": "2022-07-20 03:39:19",
"labels": [
"malicious-activity"
],
"last_seen": "2022-09-13 03:56:37",
"source": "Blocklist.net.ua"
}
],
"cidr": [
"200.73.128.0/18"
],
"city": "Buenos Aires",
"classification": "suspicious",
"country_code": "AR",
"creation_time": "2020-08-02 03:55:21",
"email": [
"abuse@teco.com.ar"
],
"ip_addr": "200.73.128.183",
"ip_version": 4,
"is_cdn": false,
"is_cnc": false,
"is_distributing_malware": false,
"is_hosting": false,
"is_iot_threat": false,
"is_known_attacker": false,
"is_known_scanner": false,
"is_mining_pool": false,
"is_open_proxy": false,
"is_sinkhole": false,
"is_tor_node": false,
"is_vpn_node": false,
"last_updated": "2018-05-29 00:00:00",
"location": {
"lat": -34.6036844,
"lon": -58.3815591
},
"modification_time": "2025-02-25 22:48:03",
"number_of_blacklisted_domains_resolving": 0,
"number_of_domains_resolving": 0,
"number_of_offline_malicious_urls_allocated": 0,
"number_of_online_malicious_urls_allocated": 0,
"number_of_whitelisted_domains_resolving": 0,
"postal_code": "C1405 DJG",
"registrant_name": "SIGOT ALEXIS RAUL SPEED INTERNET",
"scoring_executed_time": "2025-02-25 22:12:59",
"tag": [
"apache",
"attacker",
"script kiddies",
"abuse",
"ssh",
"bruteforce",
"bot",
"sip"
],
"type": "ip"
}