Developers can check API Specification here:
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/ip/86.185.70.138
import requests
import json
url = 'https://api.maltiverse.com/ip/86.185.70.138'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
$url = 'https://api.maltiverse.com/ip/86.185.70.138'
$headers = @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
{
"as_name": "AS2856 Ip Pools",
"as_number": "2856",
"asn_cidr": "86.128.0.0/10",
"asn_country_code": "GB",
"asn_date": "2005-02-07 00:00:00",
"asn_registry": "ripencc",
"blacklist": [
{
"count": 3,
"description": "Mail Spammer",
"first_seen": "2021-01-13 19:44:06",
"last_seen": "2025-07-02 21:45:59",
"source": "Barracuda"
},
{
"count": 4,
"description": "SIP Attacker",
"first_seen": "2020-12-22 23:53:28",
"labels": [
"malicious-activity"
],
"last_seen": "2021-01-15 09:46:40",
"source": "Blocklist.de"
},
{
"count": 2,
"description": "SSH Attacker",
"first_seen": "2020-12-05 08:41:17",
"labels": [
"malicious-activity"
],
"last_seen": "2020-12-22 08:55:37",
"source": "Blocklist.de"
},
{
"count": 2,
"description": "Brute force passwords using SSH on server S1-RU",
"first_seen": "2020-12-19 08:33:28",
"labels": [
"malicious-activity"
],
"last_seen": "2020-12-19 22:00:05",
"source": "Blocklist.net.ua"
},
{
"count": 2,
"description": "Malicious Host",
"first_seen": "2020-12-06 00:00:00",
"last_seen": "2020-12-19 00:00:00",
"source": "HoneyDB"
},
{
"count": 2,
"description": "Malicious host",
"first_seen": "2020-12-13 13:47:41",
"labels": [
"malicious-activity"
],
"last_seen": "2020-12-18 11:01:20",
"source": "Darklist"
}
],
"city": "Fraserburgh",
"classification": "malicious",
"country_code": "GB",
"creation_time": "2020-12-05 08:41:17",
"ip_addr": "86.185.70.138",
"ip_version": 4,
"is_cdn": false,
"is_cnc": false,
"is_distributing_malware": false,
"is_hosting": false,
"is_iot_threat": false,
"is_known_attacker": true,
"is_known_scanner": false,
"is_mining_pool": false,
"is_open_proxy": false,
"is_sinkhole": false,
"is_tor_node": false,
"is_vpn_node": false,
"location": {
"lat": 57.589764,
"lon": -2.096076
},
"modification_time": "2025-07-02 21:46:01",
"number_of_blacklisted_domains_resolving": 0,
"number_of_domains_resolving": 0,
"number_of_offline_malicious_urls_allocated": 0,
"number_of_online_malicious_urls_allocated": 0,
"number_of_whitelisted_domains_resolving": 0,
"postal_code": "AB43 9HP",
"registrant_name": "Ip Pools",
"scoring_executed_time": "2025-07-02 21:46:01",
"tag": [
"ssh",
"bruteforce",
"bot",
"apache",
"attacker",
"script kiddies",
"abuse",
"sip"
],
"type": "ip"
}