getSiteRogueAPs
GET https://{{host}}/api/v1/sites/:site_id/insights/rogues
#### Query Parameter Parameter|Type|Description :-------------: |:-------------: |:-------------: duration|string|1d / 1h, default is 1d limit|int|max number of results, default = 100 type|string|honeypot (honeypots) / lan (wired rogue) / others / spoof, default is others
#### Response Parameter Parameter|Type|Description :-------------: |:-------------: |:-------------: next|string|link to next set of results. If more results aren’t present, next is null. ssid|string|ssid of the network detected as threat bssid|string|bssid of the network detected as threat numaps|int|num of aps that heard the ssid/bssid pair apmac|string|mac of the device that had strongest signal strength for ssid/bssid pair channel|string|channel over which apmac heard ssid/bssid pair avgrssi|float|average signal strength of apmac for ssid/bssid pair timesheard|int|represents number of times the pair was heard in the interval. Each count roughly corresponds to a minute. seenonlan|boolean|whether the reporting AP see a wireless client (on LAN) connecting to it
Request Params
Key | Datatype | Required | Description |
---|---|---|---|
duration | null | 1d / 1h, default is 1d | |
limit | null | max number of results, default = 100 | |
type | null | honeypot (honeypots) / lan (wired rogue) / spoof / others, default is others |
RESPONSES
status: OK
{"start":1428939600,"end":1428954000,"limit":100,"next":"/api/v1/sites/a3eda150-ab3f-11e4-aa18-13e21dd250cc/rogues?start=1498482000\u0026end=1498485600\u0026limit=10\u0026interval=1h\u0026type=others\u0026token=003600100000002e00080000015ce445d20000000657656566656500001162632d36342d34622d33382d39642d31620000036f7267007fffff9bed6131885196aa1b76969c4411","results":[{"ssid":"xfinitywifi","bssid":"d8-97-ba-76-b5-aa","num_aps":4,"ap_mac":"5c5b350e021c","channel":"11","avg_rssi":-72,"times_heard":8}]}