Get access to 30+ marketing and SEO tools. analyze competitors, keywords, and backlinks for free..
Sign in Sign Up

We use cookies to make Serpstat better. By clicking "Accept cookies", you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Learn more

Malicious pages-acceptors (getOutThreatsLinks)

The getOutThreatsLinks method returns a list of links from malicious sites referring to the analyzed domain. The data set is similar to the Malicious sites report.

General request parameters and instructions for using Serpstat API

Request parameters
Parameter Description Default
id required A request id: the response contains the same id. Enter any number (number) or text (string) value
method required API method name: SerpstatBacklinksProcedure.getOutThreatsLinks
params required The object with parameters {...}, it lists all the following parameters and arrays [...]
query required A domain of the analyzed site. Specify the domain without HTTP, HTTPS, and "/"
searchType required Search type:
* domain - only domain (site.com)
* domain_with_subdomains - domain with subdomains (subdomain.site.com)
page optional A page number (number value) 1
size optional A number of results (number value) 100
sort optional Sorting:
* lastupdate - date of the first detection
* url_from - the URL of the malicious link
* url_to - target URL
* platform_type - the platform for which the site is a threat:
1 - windows
2 - linux
3 - android
4 - OS X
5 - IOS
6 - any OS
7 - all OS
8 - chrome OS

* threat_type - a type of vulnerability:
1 - malware
2 - social engineering
3 - unwanted software
4 - potentially harmful application 
order optional Order:
asc - in the ascending order
desc - in the descending order
desc
complexFilter optional

Data filtering, entered as arrays [...]
* field - filter parameter
Available filtering:
* lastupdate - date of the first detection
* url_from - the URL of the malicious link
* url_to - target URL
* platform_type - the platform for which the site is a threat:
1 - windows
2 - linux
3 - android
4 - OS X
5 - IOS
6 - any OS
7 - all OS
8 - chrome OS

* threat_type - a type of vulnerability:
1 - malware
2 - social engineering
3 - unwanted software
4 - potentially harmful application

* lastupdate - link detection date. Value format: DD.MM.YYYY (01.01.2001)

* compareType - filter parameter:
* gt - greater than (number value)
* lt - less than (number value)
* gte - greater than or equal (number value)
* lte - less than or equal (number value)
* eq - exact match (number or text value)
* neq - does not meet the requirement (number or text value)
* between - between (number value)
* contains - contains (text value)
* notContains - does not contain (text value)
* startsWith - starts with (text value)
* endsWith - ends with (text value)

* value - filter value

The first square brackets list the "OR" conditions. The second within the first are the "AND" conditions.

linkPerDomain optional

Data acquisition mode:
* 0 - one link from the page
* 1 - one link from the domain

1

Response parameters
Parameter Description
id Response id corresponds the request id
result Contains the answer
data Array with data
domain Malicious domain
link_from URL of the malicious link
link_to Target page
platform_type

Platform:

  • windows;
  • Linux;
  • android;
  • OS X;
  • IOS;
  • any OS;
  • all OS;
  • chrome OS.
threat_type

Threat type:

  • malware;
  • social engineering;
  • unwanted software;
  • potentially harmful application.
lastupdate Date of the last update
summary_info Object with data
page Page number
total Number of results for request
count Number of results in this answer
left_lines Left credits of lines for your pricing plan
sort What data are sorted by
order Data sorted:
* asc - in the ascending order
* desc - in the descending order

API credits are spent at 1 credit for each domain. If data are absent, the credits are not charged. Part of the API response for which you spend 1 credit:

{
     "domain": "lexxlight.ru",
     "link_from": "https://www.kinopoisk.ru/article/3047941/",
     "link_to": "http://www.lexxlight.ru/interview/Jeff_Hirschfield_april2001_eng.html",
     "platform_type": [
         "all_platforms"
     ],
     "threat_type": [
         "malware"
     ],
     "lastupdate": "2020-09-29 17:48:34"
}

Example
Request data:
{
 "id": 1,
 "method": "SerpstatBacklinksProcedure.getOutThreatsLinks",
 "params": {
     "query": "kinopoisk.ru",
     "searchType": "domain",
     "sort": "url_from",
     "order": "desc",
     "page": 1,
     "size": 2,
     "linkPerDomain": 1,
     "complexFilter": [
            [
                {
                    "field": "lastupdate",
                    "compareType": "gt",
                    "value": [
                        "29.09.2020"
                    ]
                },
                {
                    "field": "url_from",
                    "compareType": "contains",
                    "value": [
                        ".ru"
                    ]
                },
                {
                    "field": "platform_type",
                    "compareType": "contains",
                    "value": [
                        "1"
                    ]
                },
                {
                    "field": "url_to",
                    "compareType": "contains",
                    "value": [
                        ".ru"
                    ]
                },
                {
                    "field": "threat_type",
                    "compareType": "contains",
                    "value": [
                        "1"
                    ]
                }
            ]   
        ]
  }
}
Response data:
{
    "id": "1",
    "result": {
        "data": [
            {
                "domain": "lexxlight.ru",
                "link_from": "https://www.kinopoisk.ru/article/3047941/",
                "link_to": "http://www.lexxlight.ru/interview/Jeff_Hirschfield_april2001_eng.html",
                "platform_type": [
                    "all_platforms"
                ],
                "threat_type": [
                    "malware"
                ],
                "lastupdate": "2020-09-29 17:48:34"
            }
        ],
        "summary_info": {
            "left_lines": 999816,
            "page": 1,
            "count": 1,
            "total": 1,
            "sort": "url_from",
            "order": "DESC"
        }
    }
}

Share this article with your friends

Sign In Free Sign Up

You’ve reached your query limit.

Or email
Forgot password?
Or email
Optional
Back To Login

Don’t worry! Just fill in your email and we’ll send over your password.

Are you sure?

Awesome!

To complete your registration you need to enter your phone number

Back

We sent confirmation code to your phone number

Your phone Resend code Queries left

Something went wrong.

Contact our support team
Or confirm the registration using the Telegram bot Follow this link
Please pick the project to work on

Introducing Serpstat

Find out about the main features of the service in a convenient way for you!

Please send a request, and our specialist will offer you education options: a personal demonstration, a trial period, or materials for self-study and increasing expertise — everything for a comfortable start to work with Serpstat.

Name

Email

Phone

We are glad of your comment
I agree to Serpstat`s Privacy Policy.
Upgrade your plan

Upgrade your plan

Export is not available for your account. Please upgrade to Lite or higher to get access to the tool. Learn more

Sign Up Free

Thank you, we have saved your new mailing settings.

Invite
View Editing

E-mail
Message
Optional
E-mail
Message
Optional

You have run out of limits

You have reached the limit for the number of created projects. You cannot create new projects unless you increase the limits or delete existing projects.

I want more limits
Open support chat