Developers can check API Specification here:
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/ip/59.99.205.85
import requests
import json
url = 'https://api.maltiverse.com/ip/59.99.205.85'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
$url = 'https://api.maltiverse.com/ip/59.99.205.85'
$headers = @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
{
"as_name": "AS9829 National Internet Backbone",
"as_number": "9829",
"blacklist": [
{
"count": 1,
"description": "ET CINS Active Threat Intelligence Poor Reputation IP UDP",
"first_seen": "2020-09-18 04:58:11",
"last_seen": "2020-09-18 11:25:24",
"source": "Emerging Threats"
},
{
"count": 1,
"description": "ET CINS Active Threat Intelligence Poor Reputation IP TCP",
"first_seen": "2020-09-18 04:58:09",
"last_seen": "2020-09-18 11:25:23",
"source": "Emerging Threats"
},
{
"count": 1,
"description": "Malicious Host",
"first_seen": "2020-09-17 03:52:41",
"last_seen": "2020-09-17 10:08:17",
"source": "CIArmy"
},
{
"count": 1,
"description": "Malware Download",
"first_seen": "2022-02-24 08:15:18",
"labels": [
"malicious-activity"
],
"last_seen": "2022-02-24 08:15:18",
"source": "URLhaus Abuse.ch"
}
],
"city": "Bengaluru",
"classification": "suspicious",
"country_code": "IN",
"creation_time": "2020-09-17 03:52:41",
"ip_addr": "59.99.205.85",
"ip_version": 4,
"is_cdn": false,
"is_cnc": false,
"is_distributing_malware": false,
"is_hosting": false,
"is_iot_threat": false,
"is_known_attacker": false,
"is_known_scanner": false,
"is_mining_pool": false,
"is_open_proxy": false,
"is_sinkhole": false,
"is_tor_node": false,
"is_vpn_node": false,
"location": {
"lat": 12.9715987,
"lon": 77.5945627
},
"modification_time": "2023-06-26 15:17:07",
"number_of_blacklisted_domains_resolving": 0,
"number_of_domains_resolving": 0,
"number_of_offline_malicious_urls_allocated": 0,
"number_of_online_malicious_urls_allocated": 0,
"number_of_whitelisted_domains_resolving": 0,
"postal_code": "560001",
"tag": [
"malware_download"
],
"type": "ip"
}