/
Query Active Threats
Query Active Threats
To access active threats available to your organization, use tide/api/data/threats/state/. If you don't specify a provider organization (using the "profile" query string parameter) then the search will be executed against all available data. You can specify multiple provider organizations by having multiple "profile" parameters.
To make samples a bit easier to use, the calls also specify the “rlimit” query string parameter. It's an optional parameter that limits the number of returned records.
Python
#note: install the 'requests' library first: |
Sample Result
200
|
Curl
curl ‘https:/csp.infoblox.com/tide/api/data/threats/state?profile=EmergingThreats:Hostnames_Feed&class=APT,Bot&type=host&show_full_profiles=true&data_format=ndjson' -H 'Authorization:Token token=<MYTOKEN>' | python -mjson.tool |
Sample Result
{ |
Related content
Query Data from a Specified Organization
Query Data from a Specified Organization
More like this
Query Data for a Specific Threat Indicator
Query Data for a Specific Threat Indicator
More like this
How Do I Search All My Data?
How Do I Search All My Data?
More like this
Get Threats for Time Period
Get Threats for Time Period
More like this