Base Path
ListCyberThreats
Retrieves threat indicators from multiple intelligence sources with filtering by time range, threat type, source, and severity. Endpoint:GET /api/cyber/v1/list-cyber-threats
Request Parameters
Start of time range (inclusive), Unix epoch milliseconds
End of time range (inclusive), Unix epoch milliseconds
Maximum items per page (1-100)
Cursor for next page
Optional threat type filter:
CYBER_THREAT_TYPE_C2_SERVER, CYBER_THREAT_TYPE_MALWARE_HOST, CYBER_THREAT_TYPE_PHISHING, or CYBER_THREAT_TYPE_MALICIOUS_URLOptional source filter:
CYBER_THREAT_SOURCE_FEODO, CYBER_THREAT_SOURCE_URLHAUS, CYBER_THREAT_SOURCE_C2INTEL, CYBER_THREAT_SOURCE_OTX, or CYBER_THREAT_SOURCE_ABUSEIPDBOptional minimum criticality filter
Response
The list of cyber threats
Pagination metadata
Example Request
Example Response
Threat Types
TheCyberThreatType enum classifies threats into four categories:
- C2_SERVER: Command and control servers used by threat actors to control compromised systems
- MALWARE_HOST: Servers hosting malware payloads for distribution
- PHISHING: Phishing sites designed to steal credentials or sensitive information
- MALICIOUS_URL: Other malicious URLs that don’t fit the above categories
Threat Sources
The service aggregates data from five authoritative sources:Feodo Tracker (abuse.ch)
Tracks botnet C2 servers, particularly banking trojans like Emotet, TrickBot, and Dridex.URLhaus (abuse.ch)
Collects and shares malware distribution URLs, including payload hosting sites.C2Intel
Specialized feed of command and control server indicators.AlienVault OTX (Open Threat Exchange)
Community-driven threat intelligence platform with IOCs from security researchers worldwide.AbuseIPDB
Crowdsourced IP address reputation database tracking malicious activity.Indicator Types
Threats are categorized by indicator type:- IP: IP addresses (IPv4 or IPv6)
- DOMAIN: Domain names
- URL: Full URLs including path and parameters
Severity Levels
Threat severity is assessed using theCriticalityLevel enum:
- CRITICALITY_LEVEL_LOW: Low risk, monitoring recommended
- CRITICALITY_LEVEL_MEDIUM: Moderate risk, investigate and consider blocking
- CRITICALITY_LEVEL_HIGH: High risk, immediate action recommended
- CRITICALITY_LEVEL_CRITICAL: Critical risk, block immediately
Use Cases
Threat Hunting
Query for specific malware families or threat types to proactively search for indicators in your environment.Geographic Analysis
Analyze threat distribution by country to identify regional patterns:Firewall/IDS Integration
Pull latest indicators to update firewall rules or IDS signatures:Malware Campaign Tracking
Monitor specific malware families over time:Best Practices
- Regular Polling: Query the API regularly (e.g., every 15-30 minutes) to stay current with emerging threats
- Severity Filtering: Use
min_severityto focus on high-impact threats - Source Diversity: Don’t rely on a single source; aggregate data from multiple feeds
- Geolocation Context: Use the
locationandcountryfields to add geographic context to threat analysis - Tag-Based Analysis: Leverage the
tagsfield to identify threat patterns and campaigns