4. /THREATS/COUNTS/{COMPANY ID}

4.1 GET /threats/counts/{company id}

Aggregate threat counts seen within the last 24 hours. Returns the aggregate number of new threat counts seen for a single company within the last 24 hours. The counts are reported using the following categories: breach data, malware hits, malicious email hits, phishing hits, osint.

Each category corresponds to a single elasticsearch index or a group of indices in the Red Sky Alliance CTI collection. breach data corresponds to the wl_breach_data index. malware hits groups the wl_botnet_tracker, wl_sinkhole_trafc, and wl_keylogger_data indices. Malicious email hits groups the wl_malicious_emails, wl_malicious_emails_context, and wl_malicious_email_detections indices. phishing hits corresponds to the wl_threat_recon index, and osint corresponds to the wl_pastebin index.

REQUEST - PATH PARAMETERS

Name

Type

Description

*company id

string

ID of company to return threat count data for. Company IDs can be obtained using the /companies/ids endpoint.

RESPONSE MODEL - application/json

STATUS CODE - 200: : Returns a JSON object containing threat categories and the number of new threat indicators seen in each category within the last 24 hours. If this company has not had any new threats for a category within the time frame, the value will read `"No hits within the last {time frame}."

Name

Type

Description

threat_counts

array

breach_data

integer

company_name

integer

malicious_email_hits

integer

malware_hits

integer

osint

integer

phishing_hits

integer

STATUS CODE - 401: Missing or invalid API token.

STATUS CODE - 403: Account disabled, or user role prevents access to this resource.

STATUS CODE - 500: Unexpected error.

4.2 GET /threats/counts/{company id}/{time frame}

Aggregate threat counts seen within the given time frame. Returns the aggregate number of new threat counts seen for a single company within the given time frame. The counts are reported using the following categories: breach data, malware hits, malicious email hits, phishing hits, osint.

Each category corresponds to a single elasticsearch index or a group of indices in the Red Sky Alliance CTI collection. breach data corresponds to the wl_breach_data index. malware hits groups the wl_botnet_tracker, wl_sinkhole_trafc, and wl_keylogger_data indices. Malicious email hits groups the wl_malicious_emails, wl_malicious_emails_context, and wl_malicious_email_detections indices. phishing hits corresponds to the wl_threat_recon index, and osint corresponds to the wl_pastebin index.

REQUEST - PATH PARAMETERS

Name

Type

Description

*company id

string

ID of company to update. Company IDs can be obtained using the /companies/ids endpoint.

*time frame

string

Valid options are: last_24h, last_7d, last_30d, last_90d, ALL. The reporting time frame used to calculate the threat counts. For example, if last_24h is used, Redxray will return the number of new threats that were seen within the last 24 hours for the company sepcifed by {company id}. If only a {company id} is supplied, the default {time frame} is last_24h.

RESPONSE - RESPONSE MODEL - application/json

STATUS CODE - 200: : Returns a JSON object containing threat categories and the number of new threat indicators seen in each category within the time frame. If this company has not had any new threats for a category within the time frame, the value will read "No hits within the last {time frame}."

Name

Type

Description

threat_counts

array

breach_data

integer

company_name

integer

malicious_email_hits

integer

malware_hits

integer

osint

integer

phishing_hits

integer

STATUS CODE - 401: Missing or invalid API token.

STATUS CODE - 403: Account disabled, or user role prevents access to this resource.

STATUS CODE - 500: Unexpected error.

Name

Type

Description

success

string

REDXRAY is now working in the background to enrich your company data. The new company will appear in your company list when enrichment is complete. Usually this only takes a few minutes but can take longer with companies with a large number of indicators.

Name

Type

Description

threat_counts

array

breach_data

integer

company_name

integer

malicious_email_hits

integer

malware_hits

integer

osint

integer

phishing_hits

integer

STATUS CODE - 401: Missing or invalid API token.

STATUS CODE - 403: Account disabled, or user role prevents access to this resource.

STATUS CODE - 500: Unexpected error.

Last updated

Was this helpful?