Get a log event.
GET {{baseUrl}}/v1/log/ip/id/:logchange_id
What
Obtain the full detail of a specific log change.
Parameters
The endpoint accepts only the following parameters in the path:
- logchange_id
: (Mandatory) A unique integer of the change event log.
Result
The result is a JSON object with the following structure:
- self
: the URI of the API call
- cidr
: The CIDR affected by the change.
- score
: The score of the IP address when the event happened. It ranges from 0 to 99.
- risk
: The risk of the IP address when the event happened. The allowed values are: LOW, MEDIUM, HIGH. It's a human readable representation of the score.
- dataset
: The URI of the dataset where the change was logged.
- source
: The URI of the data source where the change was found.
- lapse
: The time elapsed between the event found and the moment the source was queried. The possible values are: 1H, 6H, 12H, 1D, 7D, 30D, 90D, 180D, 365D.
- action
: The action that was performed on the IP address. The allowed values are: ADD, DELETE.
- timestamp
: The UNIX timestamp in milliseconds when the change was logged.
Errors
The endpoint will return the following errors:
- a 404 Not Found
error if there is no event in the log with the logchange_ID
given.
- a 422 Unprocessable Entity
error if the logchange_ID
is malformed.
It will also return the API Global errors described in the API description.
HEADERS
Key | Datatype | Required | Description |
---|---|---|---|
Accept | string |
RESPONSES
status: OK
{"risk":"LOW","dataset":"eiusmod eu","source":"ad in Duis Ut adipisicing","lapse":"365D","action":"DELETE","timestamp":37281189,"self":"laboris velit elit","cidr":"reprehenderit Excepteur","score":60773888}