4279 строки
175 KiB
JSON
4279 строки
175 KiB
JSON
{
|
|
"swagger": "2.0",
|
|
"info": {
|
|
"version": "1.0.5",
|
|
"title": "Virus Total",
|
|
"description": "Virus Total is an online service that analyzes suspicious files and URLs to detect types of malware and malicious content using antivirus engines and website scanners. It provides an API that allows users to access the information generated by VirusTotal.",
|
|
"contact": {
|
|
"name": "Microsoft",
|
|
"url": "https://azure.microsoft.com/",
|
|
"email": "azuresentinel@microsoft.com"
|
|
},
|
|
"x-ms-api-annotation": {
|
|
"status": "Preview"
|
|
}
|
|
},
|
|
"x-ms-connector-metadata": [
|
|
{
|
|
"propertyName": "Website",
|
|
"propertyValue": "https://virustotal.com/"
|
|
},
|
|
{
|
|
"propertyName": "Privacy policy",
|
|
"propertyValue": "https://support.virustotal.com/hc/en-us/articles/115002168385-Privacy-Policy"
|
|
},
|
|
{
|
|
"propertyName": "Categories",
|
|
"propertyValue": "Security;IT Operations"
|
|
}
|
|
],
|
|
"host": "www.virustotal.com",
|
|
"basePath": "/",
|
|
"schemes": [
|
|
"https"
|
|
],
|
|
"consumes": [],
|
|
"produces": [
|
|
"application/json"
|
|
],
|
|
"paths": {
|
|
"/api/v3/urls": {
|
|
"post": {
|
|
"consumes": [
|
|
"multipart/form-data"
|
|
],
|
|
"summary": "Analyze a URL",
|
|
"description": "Analyze a URL",
|
|
"operationId": "VirusTotalAnalysisurlV3",
|
|
"parameters": [
|
|
{
|
|
"in": "formData",
|
|
"name": "url",
|
|
"description": "URL to verify",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "URL"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/urlReport"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/urls/{id}": {
|
|
"get": {
|
|
"summary": "Get URL report",
|
|
"description": "Get URL report",
|
|
"operationId": "VirusTotalGetUrlReport",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "id",
|
|
"description": "URL identifier or base64 representation of URL to scan",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "Id",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "default",
|
|
"schema": {
|
|
"$ref": "#/definitions/urlResult"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/ip_addresses/connectorV2/{ip}": {
|
|
"get": {
|
|
"summary": "Get an IP report",
|
|
"description": "Get an IP report",
|
|
"operationId": "VirusTotalGetIpScanV3_V2",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "ip",
|
|
"description": "Ip to verify",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "IP Address",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/ip"
|
|
}
|
|
}
|
|
},
|
|
"x-ms-api-annotation": {
|
|
"family": "IpScan",
|
|
"revision": 2
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/ip_addresses/{ip}": {
|
|
"get": {
|
|
"summary": "Ip scan report V3",
|
|
"description": "Scan Ip to get full report",
|
|
"operationId": "VirusTotalGetIpScanV3",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "ip",
|
|
"description": "Ip to verify",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "IP Address",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/ipResult"
|
|
}
|
|
}
|
|
},
|
|
"deprecated": true,
|
|
"x-ms-api-annotation": {
|
|
"family": "IpScan",
|
|
"revision": 1
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/analyses/connectorV2/{id}": {
|
|
"get": {
|
|
"summary": "Retrieve information about a file or URL analysis",
|
|
"description": "Retrieve information about a file or URL analysis. This action uses the output id of Analyse an URL or Upload and analyse a file.",
|
|
"operationId": "VirusTotalRetrieveInfo_V2",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "id",
|
|
"description": "Report Id",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "Id",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/Analyses"
|
|
}
|
|
}
|
|
},
|
|
"x-ms-api-annotation": {
|
|
"family": "RetrieveInfo",
|
|
"revision": 2
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/analyses/{id}": {
|
|
"get": {
|
|
"summary": "Retrieve information about a file or URL analysis",
|
|
"description": "Retrieve information about a file or URL analysis. This action uses the output id of Analyse an URL or Upload and analyse a file.",
|
|
"operationId": "VirusTotalRetrieveInfo",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "id",
|
|
"description": "report",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "id",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/analysesResponses"
|
|
}
|
|
}
|
|
},
|
|
"deprecated": true,
|
|
"x-ms-api-annotation": {
|
|
"family": "RetrieveInfo",
|
|
"revision": 1
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/files/connectorV2/{id}": {
|
|
"get": {
|
|
"summary": "Get file report",
|
|
"description": "Retrieve information about a file.",
|
|
"operationId": "VirusTotalRetrieveInfoaboutFile_V2",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "id",
|
|
"description": "SHA-256, SHA-1 or MD5 identifying the file",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "Id",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/file"
|
|
}
|
|
}
|
|
},
|
|
"x-ms-api-annotation": {
|
|
"family": "RetrieveInfoAboutFile",
|
|
"revision": 2
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/files/{id}": {
|
|
"get": {
|
|
"summary": "Get file report",
|
|
"description": "Retrieve information about a file.",
|
|
"operationId": "VirusTotalRetrieveInfoaboutFile",
|
|
"parameters": [
|
|
{
|
|
"in": "path",
|
|
"name": "id",
|
|
"description": "SHA-256, SHA-1 or MD5 identifying the file",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-summary": "Id",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/fileReport"
|
|
}
|
|
}
|
|
},
|
|
"deprecated": true,
|
|
"x-ms-api-annotation": {
|
|
"family": "RetrieveInfoAboutFile",
|
|
"revision": 1
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/files": {
|
|
"post": {
|
|
"consumes": [
|
|
"multipart/form-data"
|
|
],
|
|
"summary": "Upload and analyze a file",
|
|
"description": "Upload and analyze a file",
|
|
"operationId": "VirusTotalAnalyesFile",
|
|
"parameters": [
|
|
{
|
|
"in": "formData",
|
|
"name": "file",
|
|
"description": "File to be scanned",
|
|
"required": true,
|
|
"x-ms-summary": "File path",
|
|
"type": "file"
|
|
}
|
|
],
|
|
"responses": {
|
|
"200": {
|
|
"description": "Ok",
|
|
"schema": {
|
|
"$ref": "#/definitions/filesReport"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"/api/v3/domains/{domain}": {
|
|
"get": {
|
|
"responses": {
|
|
"200": {
|
|
"description": "OK",
|
|
"schema": {
|
|
"$ref": "#/definitions/domainResult"
|
|
}
|
|
}
|
|
},
|
|
"summary": "Get Domain report",
|
|
"description": "Get Domain report",
|
|
"operationId": "VirusTotalGetDomainReport",
|
|
"parameters": [
|
|
{
|
|
"name": "domain",
|
|
"in": "path",
|
|
"x-ms-summary": "Domain",
|
|
"description": "Url to verify",
|
|
"required": true,
|
|
"type": "string",
|
|
"x-ms-url-encoding": "single"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"definitions": {
|
|
"file": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"authentihash": {
|
|
"type": "string",
|
|
"x-ms-summary": "Authentication hash",
|
|
"description": "sha256 hash used by Microsoft to verify that the relevant sections of a PE image file have not been altered"
|
|
},
|
|
"creation_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Extracted when possible from the file's metadata",
|
|
"x-ms-summary": "Creation date"
|
|
},
|
|
"first_seen_itw_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "First seen ITW date",
|
|
"x-ms-summary": "First seen ITW Date"
|
|
},
|
|
"first_submission_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Date when the file was first seen in VirusTotal. UTC timestamp",
|
|
"x-ms-summary": "First submission date"
|
|
},
|
|
"last_analysis_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Most recent scan date. UTC timestamp",
|
|
"x-ms-summary": "Last analysis date"
|
|
},
|
|
"last_analysis_results": {
|
|
"type": "object",
|
|
"properties": {},
|
|
"description": "Latest scan results",
|
|
"x-ms-summary": "Last analysis results"
|
|
},
|
|
"last_analysis_stats": {
|
|
"type": "object",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is harmless",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is malicious",
|
|
"x-ms-summary": "Malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is suspicious",
|
|
"x-ms-summary": "Suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of timeouts when checking this URL",
|
|
"x-ms-summary": "Timeout"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is undetected",
|
|
"x-ms-summary": "Undetected"
|
|
}
|
|
},
|
|
"description": "A summary of the latest scan results",
|
|
"x-ms-summary": "Last analysis statistics"
|
|
},
|
|
"last_modification_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Date when the object itself was last modified. UTC timestamp",
|
|
"x-ms-summary": "Last modification date"
|
|
},
|
|
"last_submission_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Most recent date the file was posted to VirusTotal. UTC timestamp",
|
|
"x-ms-summary": "Last submission date"
|
|
},
|
|
"magic": {
|
|
"type": "string",
|
|
"description": "gives a guess of the file type based on a popular parsing tool from unix",
|
|
"x-ms-summary": "Magic"
|
|
},
|
|
"md5": {
|
|
"type": "string",
|
|
"description": "file's MD5 hash",
|
|
"x-ms-summary": "MD5"
|
|
},
|
|
"meaningful_name": {
|
|
"type": "string",
|
|
"description": "The most interesting name out of all file's names",
|
|
"x-ms-summary": "Meaningful name"
|
|
},
|
|
"names": {
|
|
"type": "array",
|
|
"items": {
|
|
"type": "string"
|
|
},
|
|
"description": "All file names associated with the file",
|
|
"x-ms-summary": "Names"
|
|
},
|
|
"pe_info": {
|
|
"type": "object",
|
|
"properties": {},
|
|
"description": "Returns information about the structure of Microsoft Windows PE files",
|
|
"x-ms-summary": "Portable Executable"
|
|
},
|
|
"reputation": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "File's score calculated from all votes posted by the VirusTotal community",
|
|
"x-ms-summary": "Reputation"
|
|
},
|
|
"sha1": {
|
|
"type": "string",
|
|
"description": "File's SHA1 hash",
|
|
"x-ms-summary": "SHA1"
|
|
},
|
|
"sha256": {
|
|
"type": "string",
|
|
"description": "File's SHA256 hash",
|
|
"x-ms-summary": "SHA256"
|
|
},
|
|
"signature_info": {
|
|
"type": "object",
|
|
"properties": {},
|
|
"description": "Contains information about digital signature for Windows Executable and Mach-O files,",
|
|
"x-ms-summary": "Signature info"
|
|
},
|
|
"size": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "file size in bytes",
|
|
"x-ms-summary": "Size"
|
|
},
|
|
"ssdeep": {
|
|
"type": "string",
|
|
"description": "CTPH hash of the file content",
|
|
"x-ms-summary": "Ssdeep"
|
|
},
|
|
"tags": {
|
|
"type": "array",
|
|
"items": {
|
|
"type": "string"
|
|
},
|
|
"description": "List of representative attributes",
|
|
"x-ms-summary": "Tags"
|
|
},
|
|
"times_submitted": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of times the file has been posted to VirusTotal",
|
|
"x-ms-summary": "Times submitted"
|
|
},
|
|
"tlsh": {
|
|
"type": "string",
|
|
"description": "Trend Micro's TLSH hash",
|
|
"x-ms-summary": "TLSH"
|
|
},
|
|
"total_votes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of positive votes",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "number of negative votes",
|
|
"x-ms-summary": "Malicious"
|
|
}
|
|
},
|
|
"description": "nweighted number of total votes from the community, divided in harmless and malicious",
|
|
"x-ms-summary": "Total votes"
|
|
},
|
|
"trid": {
|
|
"type": "array",
|
|
"items": {
|
|
"type": "object",
|
|
"properties": {}
|
|
},
|
|
"description": "file type identification tool",
|
|
"x-ms-summary": "TRID"
|
|
},
|
|
"type_description": {
|
|
"type": "string",
|
|
"description": "Describes the file type",
|
|
"x-ms-summary": "Type description"
|
|
},
|
|
"type_extension": {
|
|
"type": "string",
|
|
"description": "Specifies file extension",
|
|
"x-ms-summary": "Type extension"
|
|
},
|
|
"type_tag": {
|
|
"type": "string",
|
|
"description": "Tag representing the file type",
|
|
"x-ms-summary": "Type tag"
|
|
},
|
|
"unique_sources": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Indicates from how many different sources the file has been posted from",
|
|
"x-ms-summary": "Unique sources"
|
|
},
|
|
"vhash": {
|
|
"type": "string",
|
|
"description": "In-house similarity clustering algorithm value based on a simple structural feature hash allows you to find similar files",
|
|
"x-ms-summary": "Vhash"
|
|
}
|
|
},
|
|
"description": "attributes"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"Analyses": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"description": "Represents an analysis of a URL or file submitted to VirusTotal, against all partnered contributors.",
|
|
"type": "object",
|
|
"properties": {
|
|
"date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Date",
|
|
"description": "Unix epoch UTC time (seconds)"
|
|
},
|
|
"results": {
|
|
"type": "object",
|
|
"x-ms-summary": "Results",
|
|
"description": "Dictionary having the engine's name as key and its result as value",
|
|
"properties": {}
|
|
},
|
|
"stats": {
|
|
"type": "object",
|
|
"x-ms-summary": "Statistics",
|
|
"description": "Summary of the results field",
|
|
"properties": {
|
|
"confirmed-timeout": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of AV engines that reach a timeout when analysing that file",
|
|
"x-ms-summary": "Confirmed Timeout"
|
|
},
|
|
"failure": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of AV engines that fail when analysing that file",
|
|
"x-ms-summary": "Failure"
|
|
},
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is harmless",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is malicious",
|
|
"x-ms-summary": "Malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is suspicious",
|
|
"x-ms-summary": "Suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of timeouts when analysing this URL/file",
|
|
"x-ms-summary": "Timeout"
|
|
},
|
|
"type-unsupported": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of AV engines that don't support that type of file",
|
|
"x-ms-summary": "Type unsupported"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is undetected",
|
|
"x-ms-summary": "Undetected"
|
|
}
|
|
}
|
|
},
|
|
"status": {
|
|
"type": "string",
|
|
"x-ms-summary": "Status",
|
|
"description": "analysis status"
|
|
}
|
|
},
|
|
"required": [
|
|
"date",
|
|
"results",
|
|
"stats",
|
|
"status"
|
|
]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"urlReport": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"id": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"urlResult": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"categories": {
|
|
"type": "object",
|
|
"x-ms-summary": "Categories",
|
|
"properties": {},
|
|
"description": "They key is the partner who categorised the URL and the value is the URL's category according to that partner"
|
|
},
|
|
"first_submission_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "First submission date",
|
|
"format": "int32",
|
|
"description": "UTC timestamp of the date where the URL was first submitted to VirusTotal"
|
|
},
|
|
"html_meta": {
|
|
"type": "object",
|
|
"x-ms-summary": "HTML meta tags",
|
|
"properties": {},
|
|
"description": "containing all meta tags (only for URLs downloading a HTML). Keys are the meta tag name and value is a list containing all values of that meta tag"
|
|
},
|
|
"last_analysis_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last analysis date",
|
|
"format": "int32",
|
|
"description": "UTC timestamp representing last time the URL was scanned"
|
|
},
|
|
"last_analysis_results": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last analysis results",
|
|
"properties": {},
|
|
"description": "Result from URL scanners. Dictionary with scanner name as key and a dict with notes / result from that scanner as value"
|
|
},
|
|
"last_analysis_stats": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last analysis statistics",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is harmless",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is malicious",
|
|
"x-ms-summary": "Malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is suspicious",
|
|
"x-ms-summary": "Suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of timeouts when checking this URL",
|
|
"x-ms-summary": "Timeout"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is undetected",
|
|
"x-ms-summary": "Undetected"
|
|
}
|
|
},
|
|
"description": "Number of different results from this scans"
|
|
},
|
|
"last_final_url": {
|
|
"type": "string",
|
|
"x-ms-summary": "Last final url",
|
|
"description": "If the original URL redirects where does it end"
|
|
},
|
|
"last_http_response_code": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last HTTP response code",
|
|
"format": "int32",
|
|
"description": "HTTP response code of the last response"
|
|
},
|
|
"last_http_response_content_length": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last HTTP response content length",
|
|
"format": "int32",
|
|
"description": "Length in bytes of the content received"
|
|
},
|
|
"last_http_response_content_sha256": {
|
|
"type": "string",
|
|
"x-ms-summary": "Last HTTP response content SHA256",
|
|
"description": "URL response body's SHA256 hash"
|
|
},
|
|
"last_http_response_cookies": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last HTTP response cookies",
|
|
"properties": {},
|
|
"description": "Containing the website's cookies"
|
|
},
|
|
"last_http_response_headers": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last HTTP response headers",
|
|
"properties": {},
|
|
"description": "Containing headers and values of last HTTP respons"
|
|
},
|
|
"last_modification_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last modification date",
|
|
"format": "int32",
|
|
"description": "UTC timestamp representing last modification date"
|
|
},
|
|
"last_submission_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last submission date",
|
|
"format": "int32",
|
|
"description": "UTC timestamp representing last time it was sent to be analysed"
|
|
},
|
|
"outgoing_links": {
|
|
"type": "array",
|
|
"items": {},
|
|
"x-ms-summary": "Outgoing links",
|
|
"description": "Containing links to different domains"
|
|
},
|
|
"reputation": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Reputation",
|
|
"format": "int32",
|
|
"description": "Value of votes from VirusTotal community"
|
|
},
|
|
"tags": {
|
|
"type": "array",
|
|
"x-ms-summary": "Tags",
|
|
"items": {},
|
|
"description": "Tags"
|
|
},
|
|
"targeted_brand": {
|
|
"type": "object",
|
|
"x-ms-summary": "Targeted brand",
|
|
"properties": {},
|
|
"description": "Targeted brand info extracted from phishing engines"
|
|
},
|
|
"times_submitted": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Times submitted",
|
|
"format": "int32",
|
|
"description": "Number of times that URL has been checked"
|
|
},
|
|
"title": {
|
|
"type": "string",
|
|
"x-ms-summary": "Title",
|
|
"description": "Webpage title"
|
|
},
|
|
"total_votes": {
|
|
"type": "object",
|
|
"x-ms-summary": "Total votes",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of positive votes",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "number of negative votes",
|
|
"x-ms-summary": "Malicious"
|
|
}
|
|
},
|
|
"description": "Containing the number of positive (\"harmless\") and negative (\"malicious\") votes received from VT community"
|
|
},
|
|
"trackers": {
|
|
"type": "object",
|
|
"x-ms-summary": "Trackers",
|
|
"properties": {},
|
|
"description": "Contains all found trackers in that URL in a historical manner"
|
|
},
|
|
"url": {
|
|
"type": "string",
|
|
"x-ms-summary": "URL",
|
|
"description": "Original URL to be scanned"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"filesReport": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"id": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"ip": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"as_owner": {
|
|
"type": "string",
|
|
"x-ms-summary": "Owner",
|
|
"description": "Owner of the Autonomous System to which the IP belongs",
|
|
"x-ms-visibility": "important"
|
|
},
|
|
"asn": {
|
|
"type": "integer",
|
|
"x-ms-summary": "ASN",
|
|
"description": "Autonomous System Number to which the IP belongs"
|
|
},
|
|
"continent": {
|
|
"type": "string",
|
|
"x-ms-summary": "Continent",
|
|
"description": "Continent where the IP is placed (ISO-3166 continent code)"
|
|
},
|
|
"country": {
|
|
"type": "string",
|
|
"x-ms-summary": "Country",
|
|
"description": "Country where the IP is placed (ISO-3166 country code)"
|
|
},
|
|
"last_analysis_results": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last analysis results",
|
|
"description": "Result from URL scanners. Dictionary with scanner name as key and a dictionary with notes/result from that scanner as value",
|
|
"properties": {}
|
|
},
|
|
"last_analysis_stats": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last analysis statistics",
|
|
"description": "Number of different results from this scans",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is harmless",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is malicious",
|
|
"x-ms-summary": "Malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is suspicious",
|
|
"x-ms-summary": "Suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of timeouts when checking this URL",
|
|
"x-ms-summary": "Timeout"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is undetected",
|
|
"x-ms-summary": "Undetected"
|
|
}
|
|
}
|
|
},
|
|
"last_https_certificate": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last https certificate",
|
|
"description": "SSL Certificate object certificate information for that IP"
|
|
},
|
|
"last_https_certificate_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last https certificate date",
|
|
"description": "Date when the certificate shown in last_https_certificate was retrieved by VirusTotal. UTC timestamp"
|
|
},
|
|
"last_modification_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last Modification Date",
|
|
"description": "Date when any of the IP's information was last updated. UTC timestamp"
|
|
},
|
|
"network": {
|
|
"type": "string",
|
|
"x-ms-summary": "Network",
|
|
"description": "IPv4 network range to which the IP belongs"
|
|
},
|
|
"regional_internet_registry": {
|
|
"type": "string",
|
|
"x-ms-summary": "Regional internet registry",
|
|
"description": "RIR (one of the current RIRs)"
|
|
},
|
|
"reputation": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Reputation",
|
|
"description": "IP's score calculated from the votes of the VirusTotal's community"
|
|
},
|
|
"tags": {
|
|
"type": "array",
|
|
"items": {
|
|
"type": "string"
|
|
},
|
|
"description": "List of identificative attributes",
|
|
"x-ms-summary": "Tags"
|
|
},
|
|
"total_votes": {
|
|
"type": "object",
|
|
"x-ms-summary": "Total votes",
|
|
"description": "Unweighted number of total votes from the community, divided in \"harmless\" and \"malicious\"",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of positive votes",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "number of negative votes",
|
|
"x-ms-summary": "Malicious"
|
|
}
|
|
}
|
|
},
|
|
"whois": {
|
|
"type": "string",
|
|
"x-ms-summary": "WHOIS",
|
|
"description": "WHOIS information as returned from the pertinent whois server"
|
|
},
|
|
"whois_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "WHOIS date",
|
|
"description": "Date of the last update of the whois record in VirusTotal. UTC timestamp"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"domainResult": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"categories": {
|
|
"type": "object",
|
|
"x-ms-summary": "Categories",
|
|
"properties": {},
|
|
"description": "Mapping that relates categorisation services with the category it assigns the domain to. These services are, among others such as Alexa, BitDefender, TrendMicro, Websense ThreatSeeker, etc."
|
|
},
|
|
"creation_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Creation date extracted from the Domain's whois (UTC timestamp)"
|
|
},
|
|
"last_analysis_results": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last analysis results",
|
|
"properties": {},
|
|
"description": "Result from URL scanners. Dictionary with scanner name as key and a dictionary with notes/result from that scanner as value"
|
|
},
|
|
"last_analysis_stats": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last analysis statistics",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is harmless",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is malicious",
|
|
"x-ms-summary": "Malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is suspicious",
|
|
"x-ms-summary": "Suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of timeouts when checking this URL",
|
|
"x-ms-summary": "Timeout"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of reports saying that is undetected",
|
|
"x-ms-summary": "Undetected"
|
|
}
|
|
},
|
|
"description": "Number of different results from this scans"
|
|
},
|
|
"last_dns_records": {
|
|
"type": "array",
|
|
"x-ms-summary": "Last DNS records",
|
|
"items": {
|
|
"type": "object",
|
|
"properties": {}
|
|
},
|
|
"description": "Domain's DNS records on its last scan"
|
|
},
|
|
"last_dns_records_date": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"x-ms-summary": "Last DNS Records date",
|
|
"description": "Date when the dns records list was retrieved by VirusTotal (UTC timestamp)"
|
|
},
|
|
"last_https_certificate": {
|
|
"type": "object",
|
|
"x-ms-summary": "Last HTTPS certificate",
|
|
"properties": {},
|
|
"description": "SSL Certificate object retrieved last time the domain was analysed"
|
|
},
|
|
"last_https_certificate_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last HTTPS certificate date",
|
|
"format": "int32",
|
|
"description": "Date when the certificate was retrieved by VirusTotal (UTC timestamp)"
|
|
},
|
|
"last_modification_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last modification date format",
|
|
"format": "int32",
|
|
"description": "Date when any of domain's information was last updated"
|
|
},
|
|
"last_update_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last update date",
|
|
"format": "int32",
|
|
"description": "Updated date extracted from whois (UTC timestamp)"
|
|
},
|
|
"popularity_ranks": {
|
|
"type": "object",
|
|
"x-ms-summary": "Popularity ranks",
|
|
"properties": {},
|
|
"description": "Domain's position in popularity ranks such as Alexa, Quantcast, Statvoo, etc."
|
|
},
|
|
"registrar": {
|
|
"type": "string",
|
|
"x-ms-summary": "Registrar",
|
|
"description": "Company that registered the domain"
|
|
},
|
|
"reputation": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Reputation",
|
|
"format": "int32",
|
|
"description": "Domain's score calculated from the votes of the VirusTotal's community"
|
|
},
|
|
"tags": {
|
|
"type": "array",
|
|
"x-ms-summary": "Tags",
|
|
"items": {},
|
|
"description": "List of representative attributes"
|
|
},
|
|
"total_votes": {
|
|
"type": "object",
|
|
"x-ms-summary": "Total votes",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "Number of positive votes",
|
|
"x-ms-summary": "Harmless"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"format": "int32",
|
|
"description": "number of negative votes",
|
|
"x-ms-summary": "Malicious"
|
|
}
|
|
},
|
|
"description": "Unweighted number of total votes from the community, divided in \"harmless\" and \"malicious\""
|
|
},
|
|
"whois": {
|
|
"type": "string",
|
|
"x-ms-summary": "WHOIS",
|
|
"description": "WHOIS information as returned from the pertinent whois server"
|
|
},
|
|
"whois_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "WHOIS date",
|
|
"format": "int32",
|
|
"description": "Date of the last update of the whois record in VirusTotal"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"fileReport": {
|
|
"type": "object",
|
|
"properties": {
|
|
"FileType": {
|
|
"type": "string"
|
|
},
|
|
"FileTypeExtension": {
|
|
"type": "string"
|
|
},
|
|
"LineCount": {
|
|
"type": "integer"
|
|
},
|
|
"MIMEEncoding": {
|
|
"type": "string"
|
|
},
|
|
"MIMEType": {
|
|
"type": "string"
|
|
},
|
|
"Newlines": {
|
|
"type": "string"
|
|
},
|
|
"WordCount": {
|
|
"type": "integer"
|
|
}
|
|
}
|
|
},
|
|
"analysesResponses": {
|
|
"description": "report result",
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"date": {
|
|
"type": "integer"
|
|
},
|
|
"results": {
|
|
"type": "object",
|
|
"properties": {
|
|
"ADMINUSLabs": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ADMINUSLabs Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ADMINUSLabs Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ADMINUSLabs Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"AegisLab WebGuard": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "AegisLab WebGuard Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "AegisLab WebGuard Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "AegisLab WebGuard Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"AlienVault": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "AlienVault Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "AlienVault Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "AlienVault Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Antiy-AVL": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Antiy-AVL Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Antiy-AVL Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Antiy-AVL Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"AutoShun": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "AutoShun Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "AutoShun Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "AutoShun Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Avira": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Avira Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Avira Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Avira Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"BADWARE.INFO": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "BADWARE.INFO Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "BADWARE.INFO Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "BADWARE.INFO Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Baidu-International": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Baidu-International Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Baidu-International Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Baidu-International Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"BitDefender": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "BitDefender Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "BitDefender Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "BitDefender Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Blueliv": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Blueliv Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Blueliv Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Blueliv Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"CLEAN MX": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CLEAN MX Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CLEAN MX Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CLEAN MX Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"CRDF": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CRDF Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CRDF Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CRDF Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Comodo Site Inspector": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Site Inspector Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Site Inspector Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Site Inspector Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Comodo Valkyrie Verdict": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Valkyrie Verdict Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Valkyrie Verdict Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Valkyrie Verdict Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"CyRadar": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyRadar Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyRadar Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyRadar Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"CyberCrime": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyberCrime Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyberCrime Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyberCrime Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"DNS8": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "DNS8 Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "DNS8 Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "DNS8 Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Dr.Web": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Dr.Web Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Dr.Web Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Dr.Web Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ESET": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESET Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESET Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESET Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ESTsecurity-Threat Inside": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESTsecurity-Threat Inside Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESTsecurity-Threat Inside Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESTsecurity-Threat Inside Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Emsisoft": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Emsisoft Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Emsisoft Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Emsisoft Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"EonScope": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Forcepoint ThreatSeeker": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Fortinet": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Fortinet Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Fortinet Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Fortinet Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"FraudScore": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudScore Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudScore Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudScore Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"FraudSense": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudSense Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudSense Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudSense Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"G-Data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "G-Data Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "G-Data Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "G-Data Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Google Safebrowsing": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Google Safebrowsing Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Google Safebrowsing Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Google Safebrowsing Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"K7AntiVirus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "K7AntiVirus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "K7AntiVirus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "K7AntiVirus Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Kaspersky": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Kaspersky Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Kaspersky Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Kaspersky Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Malc0de Database": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malc0de Database Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malc0de Database Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malc0de Database Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Malekal": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malekal Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malekal Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malekal Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Malware Domain Blocklist": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malware Domain Blocklist Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malware Domain Blocklist Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malware Domain Blocklist Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"MalwareDomainList": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwareDomainList Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwareDomainList Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwareDomainList Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"MalwarePatrol": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwarePatrol Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwarePatrol Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwarePatrol Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Malwarebytes hpHosts": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwarebytes hpHosts Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwarebytes hpHosts Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwarebytes hpHosts Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Malwared": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwared Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwared Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwared Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Netcraft": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Netcraft Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Netcraft Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Netcraft Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"NotMining": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "NotMining Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "NotMining Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "NotMining Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Nucleon": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Nucleon Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Nucleon Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Nucleon Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"OpenPhish": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "OpenPhish Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "OpenPhish Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "OpenPhish Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Opera": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Opera Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Opera Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Opera Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"PhishLabs": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "PhishLabs Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "PhishLabs Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "PhishLabs Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Phishtank": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Phishtank Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Phishtank Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Phishtank Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Quttera": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quttera Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quttera Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quttera Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Rising": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Rising Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Rising Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Rising Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"SCUMWARE.org": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "SCUMWARE.org Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "SCUMWARE.org Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "SCUMWARE.org Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"SecureBrain": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "SecureBrain Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "SecureBrain Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "SecureBrain Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Segasec": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Segasec Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Segasec Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Segasec Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Sophos": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sophos Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sophos Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sophos Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Spam404": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spam404 Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spam404 Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spam404 Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Spamhaus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"StopBadware": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "StopBadware Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "StopBadware Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "StopBadware Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Sucuri SiteCheck": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sucuri SiteCheck Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sucuri SiteCheck Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sucuri SiteCheck Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Tencent": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tencent Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tencent Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tencent Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ThreatHive": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ThreatHive Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ThreatHive Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ThreatHive Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Trustwave": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Threatwave Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Threatwave Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Threatwave Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"URLQuery": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLQuery Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLQuery Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLQuery Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"URLhaus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLhaus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLhaus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLhaus Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"VX Vault": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "VX Vault Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "VX Vault Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "VX Vault Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Virusdie External Site Scan": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Virusdie External Site Scan Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Virusdie External Site Scan Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Virusdie External Site Scan Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Web Security Guard": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Web Security Guard Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Web Security Guard Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Web Security Guard Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Yandex Safebrowsing": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Yandex Safebrowsing Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Yandex Safebrowsing Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Yandex Safebrowsing Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ZCloudsec": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZCloudsec Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZCloudsec Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZCloudsec Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ZDB Zeus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZDB Zeus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZDB Zeus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZDB Zeus Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ZeroCERT": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeroCERT Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeroCERT Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeroCERT Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"Zerofox": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Zerofox Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Zerofox Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Zerofox Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"ZeusTracker": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeusTracker Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeusTracker Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeusTracker Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"desenmascara.me": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "desenmascara.me Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "desenmascara.me Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "desenmascara.me Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"malwares.com URL checker": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "malwares.com URL checker Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "malwares.com URL checker Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "malwares.com URL checker Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"securolytics": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "securolytics Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "securolytics Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "securolytics Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
},
|
|
"zvelo": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "zvelo Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "zvelo method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "zvelo Result"
|
|
}
|
|
},
|
|
"required": [
|
|
"category",
|
|
"method",
|
|
"result"
|
|
]
|
|
}
|
|
},
|
|
"required": [
|
|
"ADMINUSLabs",
|
|
"AegisLab WebGuard",
|
|
"AlienVault",
|
|
"Antiy-AVL",
|
|
"AutoShun",
|
|
"Avira",
|
|
"BADWARE.INFO",
|
|
"Baidu-International",
|
|
"BitDefender",
|
|
"Blueliv",
|
|
"CLEAN MX",
|
|
"CRDF",
|
|
"Comodo Site Inspector",
|
|
"Comodo Valkyrie Verdict",
|
|
"CyRadar",
|
|
"CyberCrime",
|
|
"DNS8",
|
|
"Dr.Web",
|
|
"ESET",
|
|
"ESTsecurity-Threat Inside",
|
|
"Emsisoft",
|
|
"EonScope",
|
|
"Forcepoint ThreatSeeker",
|
|
"Fortinet",
|
|
"FraudScore",
|
|
"FraudSense",
|
|
"G-Data",
|
|
"Google Safebrowsing",
|
|
"K7AntiVirus",
|
|
"Kaspersky",
|
|
"Malc0de Database",
|
|
"Malekal",
|
|
"Malware Domain Blocklist",
|
|
"MalwareDomainList",
|
|
"MalwarePatrol",
|
|
"Malwarebytes hpHosts",
|
|
"Malwared",
|
|
"Netcraft",
|
|
"NotMining",
|
|
"Nucleon",
|
|
"OpenPhish",
|
|
"Opera",
|
|
"PhishLabs",
|
|
"Phishtank",
|
|
"Quttera",
|
|
"Rising",
|
|
"SCUMWARE.org",
|
|
"SecureBrain",
|
|
"Segasec",
|
|
"Sophos",
|
|
"Spam404",
|
|
"Spamhaus",
|
|
"StopBadware",
|
|
"Sucuri SiteCheck",
|
|
"Tencent",
|
|
"ThreatHive",
|
|
"Trustwave",
|
|
"URLQuery",
|
|
"URLhaus",
|
|
"VX Vault",
|
|
"Virusdie External Site Scan",
|
|
"Web Security Guard",
|
|
"Yandex Safebrowsing",
|
|
"ZCloudsec",
|
|
"ZDB Zeus",
|
|
"ZeroCERT",
|
|
"Zerofox",
|
|
"ZeusTracker",
|
|
"desenmascara.me",
|
|
"malwares.com URL checker",
|
|
"securolytics",
|
|
"zvelo"
|
|
]
|
|
},
|
|
"stats": {
|
|
"type": "object",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"x-ms-summary": "harmless stats"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"x-ms-summary": "malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"x-ms-summary": "suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"x-ms-summary": "TimeOut"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"x-ms-summary": "undetected"
|
|
}
|
|
},
|
|
"required": [
|
|
"harmless",
|
|
"malicious",
|
|
"suspicious",
|
|
"timeout",
|
|
"undetected"
|
|
]
|
|
},
|
|
"status": {
|
|
"type": "string",
|
|
"x-ms-summary": "status"
|
|
}
|
|
},
|
|
"required": [
|
|
"date",
|
|
"results",
|
|
"stats",
|
|
"status"
|
|
]
|
|
},
|
|
"id": {
|
|
"type": "string",
|
|
"x-ms-summary": "id"
|
|
},
|
|
"type": {
|
|
"type": "string"
|
|
}
|
|
},
|
|
"required": [
|
|
"attributes",
|
|
"id",
|
|
"type"
|
|
]
|
|
},
|
|
"meta": {
|
|
"type": "object",
|
|
"properties": {
|
|
"url_info": {
|
|
"type": "object",
|
|
"properties": {
|
|
"id": {
|
|
"type": "string",
|
|
"x-ms-summary": "url_info Id"
|
|
},
|
|
"url": {
|
|
"type": "string",
|
|
"x-ms-summary": "url"
|
|
}
|
|
},
|
|
"required": [
|
|
"id",
|
|
"url"
|
|
]
|
|
}
|
|
},
|
|
"required": [
|
|
"url_info"
|
|
]
|
|
}
|
|
},
|
|
"required": [
|
|
"data",
|
|
"meta"
|
|
]
|
|
},
|
|
"ipResult": {
|
|
"type": "object",
|
|
"properties": {
|
|
"data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"attributes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"as_owner": {
|
|
"type": "string"
|
|
},
|
|
"asn": {
|
|
"type": "integer"
|
|
},
|
|
"continent": {
|
|
"type": "string"
|
|
},
|
|
"country": {
|
|
"type": "string"
|
|
},
|
|
"last_analysis_results": {
|
|
"type": "object",
|
|
"properties": {
|
|
"ADMINUSLabs": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ADMINUS Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ADMINUS Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ADMINUS Result"
|
|
}
|
|
}
|
|
},
|
|
"AegisLab WebGuard": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "AegisLab WebGuard Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "AegisLab WebGuard Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "AegisLab WebGuard Result"
|
|
}
|
|
}
|
|
},
|
|
"AlienVault": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "AlienVault Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "AlienVault Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "AlienVault Result"
|
|
}
|
|
}
|
|
},
|
|
"Antiy-AVL": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Antiy-AVL Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Antiy-AVL Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Antiy-AVL Result"
|
|
}
|
|
}
|
|
},
|
|
"AutoShun": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "AutoShun Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "AutoShun Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "AutoShun Result"
|
|
}
|
|
}
|
|
},
|
|
"Avira": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Avira Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Avira Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Avira Result"
|
|
}
|
|
}
|
|
},
|
|
"BADWARE.INFO": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "BADWARE.INFO Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "BADWARE.INFO Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "BADWARE.INFO Result"
|
|
}
|
|
}
|
|
},
|
|
"Baidu-International": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Baidu-International Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Baidu-International Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Baidu-International Result"
|
|
}
|
|
}
|
|
},
|
|
"BitDefender": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "BitDefender Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "BitDefender Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "BitDefender Result"
|
|
}
|
|
}
|
|
},
|
|
"Blueliv": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Blueliv Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Blueliv Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Blueliv Result"
|
|
}
|
|
}
|
|
},
|
|
"Botvrij.eu": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Botvrij.eu Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Botvrij.eu Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Botvrij.eu Result"
|
|
}
|
|
}
|
|
},
|
|
"CLEAN MX": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CLEAN MX Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CLEAN MX Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CLEAN MX Result"
|
|
}
|
|
}
|
|
},
|
|
"CRDF": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CRDF Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CRDF Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CRDF Result"
|
|
}
|
|
}
|
|
},
|
|
"Comodo Valkyrie Verdict": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Valkyrie Verdict Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Valkyrie Verdict Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Comodo Valkyrie Verdict Result"
|
|
}
|
|
}
|
|
},
|
|
"CyRadar": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyRadar Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyRadar Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyRadar Result"
|
|
}
|
|
}
|
|
},
|
|
"CyberCrime": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyberCrime Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyberCrime Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "CyberCrime Result"
|
|
}
|
|
}
|
|
},
|
|
"DNS8": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "DNS8 Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "DNS8 Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "DNS8 Result"
|
|
}
|
|
}
|
|
},
|
|
"Dr.Web": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Dr.Web Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Dr.Web Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Dr.Web Result"
|
|
}
|
|
}
|
|
},
|
|
"ESET": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESET Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESET Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESET Result"
|
|
}
|
|
}
|
|
},
|
|
"ESTsecurity-Threat Inside": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESTsecurity-Threat Inside Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESTsecurity-Threat Inside Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ESTsecurity-Threat Result"
|
|
}
|
|
}
|
|
},
|
|
"EmergingThreats": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "EmergingThreats Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "EmergingThreats Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "EmergingThreats Result"
|
|
}
|
|
}
|
|
},
|
|
"Emsisoft": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Emsisoft Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Emsisoft Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Emsisoft Result"
|
|
}
|
|
}
|
|
},
|
|
"EonScope": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Category"
|
|
},
|
|
"engine_name": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Engine Name"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "EonScope Result"
|
|
}
|
|
}
|
|
},
|
|
"Forcepoint ThreatSeeker": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Category"
|
|
},
|
|
"engine_name": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Engine Name"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Forcepoint ThreatSeeker Result"
|
|
}
|
|
}
|
|
},
|
|
"Fortinet": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Fortinet Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Fortinet Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Fortinet Result"
|
|
}
|
|
}
|
|
},
|
|
"FraudScore": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudScore Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudScore Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudScore Result"
|
|
}
|
|
}
|
|
},
|
|
"FraudSense": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudSense Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudSense Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "FraudSense Result"
|
|
}
|
|
}
|
|
},
|
|
"G-Data": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "G-Data Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "G-Data Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "G-Data Result"
|
|
}
|
|
}
|
|
},
|
|
"Google Safebrowsing": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Google Safebrowsing Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Google Safebrowsing Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Google Safebrowsing Result"
|
|
}
|
|
}
|
|
},
|
|
"IPsum": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "IPsum Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "IPsum Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "IPsum Result"
|
|
}
|
|
}
|
|
},
|
|
"K7AntiVirus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "K7AntiVirus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "K7AntiVirus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "K7AntiVirus Result"
|
|
}
|
|
}
|
|
},
|
|
"Kaspersky": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Kaspersky Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Kaspersky Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Kaspersky Result"
|
|
}
|
|
}
|
|
},
|
|
"Malc0de Database": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malc0de Database Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malc0de Database Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malc0de Database Result"
|
|
}
|
|
}
|
|
},
|
|
"Malware Domain Blocklist": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malware Domain Blocklist Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malware Domain Blocklist Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malware Domain Blocklist Result"
|
|
}
|
|
}
|
|
},
|
|
"MalwareDomainList": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwareDomainList Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwareDomainList Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwareDomainList Result"
|
|
}
|
|
}
|
|
},
|
|
"MalwarePatrol": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwarePatrol Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwarePatrol Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "MalwarePatrol Result"
|
|
}
|
|
}
|
|
},
|
|
"Malwarebytes hpHosts": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwarebytes hpHosts Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwarebytes hpHosts Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwarebytes hpHosts Result"
|
|
}
|
|
}
|
|
},
|
|
"Malwared": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwared Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwared Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Malwared Result"
|
|
}
|
|
}
|
|
},
|
|
"Netcraft": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Netcraft Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Netcraft Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Netcraft Result"
|
|
}
|
|
}
|
|
},
|
|
"NotMining": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "NotMining Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "NotMining Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "NotMining Result"
|
|
}
|
|
}
|
|
},
|
|
"Nucleon": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Nucleon Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Nucleon Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Nucleon Result"
|
|
}
|
|
}
|
|
},
|
|
"OpenPhish": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "OpenPhish Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "OpenPhish Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "OpenPhish Result"
|
|
}
|
|
}
|
|
},
|
|
"PhishLabs": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "PhishLabs Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "PhishLabs Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "PhishLabs Result"
|
|
}
|
|
}
|
|
},
|
|
"Phishtank": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Phishtank Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Phishtank Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Phishtank Result"
|
|
}
|
|
}
|
|
},
|
|
"Quick Heal": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quick Heal Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quick Heal Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quick Heal Result"
|
|
}
|
|
}
|
|
},
|
|
"Quttera": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quttera Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quttera Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Quttera Result"
|
|
}
|
|
}
|
|
},
|
|
"SCUMWARE.org": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "SCUMWARE.org Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "SCUMWARE.org Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "SCUMWARE.org Result"
|
|
}
|
|
}
|
|
},
|
|
"SecureBrain": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "SecureBrain Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "SecureBrain Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "SecureBrain Result"
|
|
}
|
|
}
|
|
},
|
|
"Segasec": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Segasec Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Segasec Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Segasec Result"
|
|
}
|
|
}
|
|
},
|
|
"Sophos": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sophos Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sophos Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sophos Result"
|
|
}
|
|
}
|
|
},
|
|
"Spam404": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spam404 Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spam404 Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spam404 Result"
|
|
}
|
|
}
|
|
},
|
|
"Spamhaus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Category"
|
|
},
|
|
"engine_name": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Engine Name"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Spamhaus Result"
|
|
}
|
|
}
|
|
},
|
|
"StopBadware": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "StopBadware Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "StopBadware Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "StopBadware Result"
|
|
}
|
|
}
|
|
},
|
|
"Sucuri SiteCheck": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sucuri SiteCheck Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sucuri SiteCheck Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Sucuri SiteCheck Result"
|
|
}
|
|
}
|
|
},
|
|
"Tencent": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tencent Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tencent Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tencent Result"
|
|
}
|
|
}
|
|
},
|
|
"ThreatHive": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ThreatHive Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ThreatHive Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ThreatHive Result"
|
|
}
|
|
}
|
|
},
|
|
"Trustwave": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Trustwave Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Trustwave Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Trustwave Result"
|
|
}
|
|
}
|
|
},
|
|
"URLhaus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLhaus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLhaus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "URLhaus Result"
|
|
}
|
|
}
|
|
},
|
|
"VX Vault": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "VX Vault Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "VX Vault Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "VX Vault Result"
|
|
}
|
|
}
|
|
},
|
|
"Virusdie External Site Scan": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Virusdie External Site Scan Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Virusdie External Site Scan Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Virusdie External Site Scan Result"
|
|
}
|
|
}
|
|
},
|
|
"Web Security Guard": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Web Security Guard Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Web Security Guard Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Web Security Guard Result"
|
|
}
|
|
}
|
|
},
|
|
"Yandex Safebrowsing": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "Yandex Safebrowsing Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "Yandex Safebrowsing Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "Yandex Safebrowsing Result"
|
|
}
|
|
}
|
|
},
|
|
"ZCloudsec": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZCloudsec Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZCloudsec Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZCloudsec Result"
|
|
}
|
|
}
|
|
},
|
|
"ZDB Zeus": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZDB Zeus Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZDB Zeus Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZDB Zeus Category"
|
|
}
|
|
}
|
|
},
|
|
"ZeroCERT": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeroCERT Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeroCERT Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "ZeroCERT Result"
|
|
}
|
|
}
|
|
},
|
|
"desenmascara.me": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "desenmascara.me Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "desenmascara.me Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "desenmascara.me Result"
|
|
}
|
|
}
|
|
},
|
|
"malwares.com URL checker": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "malwares.com URL checker Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "malwares.com URL checker Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "malwares.com URL checker Result"
|
|
}
|
|
}
|
|
},
|
|
"securolytics": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "securolytics Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "securolytics Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "securolytics Result"
|
|
}
|
|
}
|
|
},
|
|
"zvelo": {
|
|
"type": "object",
|
|
"properties": {
|
|
"category": {
|
|
"type": "string",
|
|
"x-ms-summary": "zvelo Category"
|
|
},
|
|
"method": {
|
|
"type": "string",
|
|
"x-ms-summary": "zvelo Method"
|
|
},
|
|
"result": {
|
|
"type": "string",
|
|
"x-ms-summary": "zvelo Result"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"last_analysis_stats": {
|
|
"type": "object",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer",
|
|
"x-ms-summary": "last_analysis_stats"
|
|
},
|
|
"malicious": {
|
|
"type": "integer",
|
|
"x-ms-summary": "malicious"
|
|
},
|
|
"suspicious": {
|
|
"type": "integer",
|
|
"x-ms-summary": "suspicious"
|
|
},
|
|
"timeout": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Timeout"
|
|
},
|
|
"undetected": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Undetected"
|
|
}
|
|
}
|
|
},
|
|
"last_modification_date": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Last Modification Date"
|
|
},
|
|
"network": {
|
|
"type": "string",
|
|
"x-ms-summary": "Network"
|
|
},
|
|
"regional_internet_registry": {
|
|
"type": "string",
|
|
"x-ms-summary": "regional_internet_registry"
|
|
},
|
|
"reputation": {
|
|
"type": "integer",
|
|
"x-ms-summary": "Reputation"
|
|
},
|
|
"tags": {
|
|
"type": "string",
|
|
"x-ms-summary": "Tags"
|
|
},
|
|
"total_votes": {
|
|
"type": "object",
|
|
"properties": {
|
|
"harmless": {
|
|
"type": "integer"
|
|
},
|
|
"malicious": {
|
|
"type": "integer"
|
|
}
|
|
}
|
|
},
|
|
"whois": {
|
|
"type": "string"
|
|
},
|
|
"whois_date": {
|
|
"type": "integer"
|
|
}
|
|
}
|
|
},
|
|
"id": {
|
|
"type": "string"
|
|
},
|
|
"links": {
|
|
"type": "object",
|
|
"properties": {
|
|
"self": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
},
|
|
"type": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
},
|
|
"securityDefinitions": {
|
|
"x-api_key": {
|
|
"type": "apiKey",
|
|
"in": "header",
|
|
"name": "x-apikey"
|
|
}
|
|
}
|
|
} |