Get a log event.

GET {{baseUrl}}/v1/log/ip/id/:logchange_id

What

Obtain the full detail of a specific log change.

Parameters

The endpoint accepts only the following parameters in the path: - logchange_id: (Mandatory) A unique integer of the change event log.

Result

The result is a JSON object with the following structure: - self: the URI of the API call - cidr: The CIDR affected by the change. - score: The score of the IP address when the event happened. It ranges from 0 to 99. - risk: The risk of the IP address when the event happened. The allowed values are: LOW, MEDIUM, HIGH. It's a human readable representation of the score. - dataset: The URI of the dataset where the change was logged. - source: The URI of the data source where the change was found. - lapse: The time elapsed between the event found and the moment the source was queried. The possible values are: 1H, 6H, 12H, 1D, 7D, 30D, 90D, 180D, 365D. - action: The action that was performed on the IP address. The allowed values are: ADD, DELETE. - timestamp: The UNIX timestamp in milliseconds when the change was logged.

Errors

The endpoint will return the following errors: - a 404 Not Found error if there is no event in the log with the logchange_ID given. - a 422 Unprocessable Entity error if the logchange_ID is malformed.

It will also return the API Global errors described in the API description.

HEADERS

KeyDatatypeRequiredDescription
Acceptstring

RESPONSES

status: OK

{"risk":"LOW","dataset":"eiusmod eu","source":"ad in Duis Ut adipisicing","lapse":"365D","action":"DELETE","timestamp":37281189,"self":"laboris velit elit","cidr":"reprehenderit Excepteur","score":60773888}