Malicious domains-donors
The getThreats method returns a list of malicious domains referring to the analyzed domain and information on them. The data set is similar to the Malicious sites report.
General request parameters and instructions for using Serpstat API
Request parameters | |||
Parameter | Description | Default | |
id | required | A request id: the response contains the same id. Enter any number (number) or text (string) value | |
method | required | API method name: SerpstatBacklinksProcedure.getThreats | |
params | required | The object with parameters {...}, it lists all the following parameters and arrays [...] | |
query | required | A domain of the analyzed site. Specify the domain without HTTP, HTTPS, and "/" | |
searchType | required | Search type: * domain - only domain (site.com) * domain_with_subdomains - domain with subdomains (subdomain.site.com) | |
page | optional | A page number (number value) | 1 |
size | optional | A number of results (number value) | 100 |
sort | optional | Sorting: * lastupdate - date of the first detection * domain_link - number of links to the domain * links_count - the number of links from the domain * platform_type - the platform for which the site is a threat: 1 - windows 2 - linux 3 - android 4 - OS X 5 - IOS 6 - any OS 7 - all OS 8 - chrome OS * threat_type - a type of vulnerability: 1 - malware 2 - social engineering 3 - unwanted software 4 - potentially harmful application * lastupdate - link detection date. Value format: DD.MM.YYYY (01.01.2001) | lastupdate |
order | optional | Order: * asc - in the ascending order * desc - in the descending order | desc |
linkPerDomain | optional | Data acquisition mode: * 0 - one link from the page * 1 - one link from the domain | |
complexFilter | optional | Data filtering, entered as arrays. Available columns: * threat_type - a type of vulnerability: * compareType - filter parameter: The first square brackets list the "OR" conditions. The second within the first are the "AND" conditions. |
Response parameters | |
Parameter | Description |
id | Response id corresponds the request id |
result | Contains the answer |
data | Array with data |
domain | Malicious domain |
domain_link | Linking page |
links_count | A number of referring links |
platform_type | Platform, for which a website is a threat:
|
threat_type | Threat type:
|
last_update | Date of the last update |
summary_info | Object with data |
page | Page number |
total | Number of results for request |
count | Number of results in this answer |
left_lines | Left credits of lines for your pricing plan |
sort | What data are sorted by |
order | Data sorted: * asc - in the ascending order * desc - in the descending order |
API credits are spent at 1 credit for each domain. If data are absent, the credits are not charged. Part of the API response for which you spend 1 credit:
{
"domain": "thevampireclubrus.blogspot.com",
"domain_link": "http://thevampireclubrus.blogspot.com",
"links_count": 22,
"platform_type": [
"all_platforms"
],
"threat_type": [
"malware"
],
"lastupdate": "2020-12-02 08:48:52"
}
{
"id": 1,
"method": "SerpstatBacklinksProcedure.getThreats",
"params": {
"query": "kinopoisk.ru",
"searchType": "domain",
"sort": "lastupdate",
"order": "desc",
"page": 1,
"size": 2,
"linkPerDomain": 1,
"complexFilter": [
[
{
"field": "lastupdate",
"compareType": "gt",
"value": [
"25.09.2020"
]
},
{
"field": "domain_link",
"compareType": "contains",
"value": [
".com"
]
},
{
"field": "links_count",
"compareType": "gte",
"value": [
"1"
]
},
{
"field": "platform_type",
"compareType": "contains",
"value": [
"1"
]
},
{
"field": "threat_type",
"compareType": "contains",
"value": [
"1"
]
}
]
]
}
}
{
"id": "1",
"result": {
"data": [
{
"domain": "thevampireclubrus.blogspot.com",
"domain_link": "http://thevampireclubrus.blogspot.com",
"links_count": 22,
"platform_type": [
"all_platforms"
],
"threat_type": [
"malware"
],
"lastupdate": "2020-12-02 08:48:52"
}
],
"summary_info": {
"left_lines": 999836,
"page": 1,
"count": 1,
"total": 1,
"sort": "lastupdate",
"order": "DESC"
}
}
}