Get a log event.
GET {{baseUrl}}/v1/log/ip/id/:logchange_id
What
Obtain the full detail of a specific log change.
Parameters
The endpoint accepts only the following parameters in the path:
- logchange_id: (Mandatory) A unique integer of the change event log.
Result
The result is a JSON object with the following structure:
- self: the URI of the API call
- cidr: The CIDR affected by the change.
- score: The score of the IP address when the event happened. It ranges from 0 to 99.
- risk: The risk of the IP address when the event happened. The allowed values are: LOW, MEDIUM, HIGH. It's a human readable representation of the score.
- dataset: The URI of the dataset where the change was logged.
- source: The URI of the data source where the change was found.
- lapse: The time elapsed between the event found and the moment the source was queried. The possible values are: 1H, 6H, 12H, 1D, 7D, 30D, 90D, 180D, 365D.
- action: The action that was performed on the IP address. The allowed values are: ADD, DELETE.
- timestamp: The UNIX timestamp in milliseconds when the change was logged.
Errors
The endpoint will return the following errors:
- a 404 Not Found error if there is no event in the log with the logchange_ID given.
- a 422 Unprocessable Entity error if the logchange_ID is malformed.
It will also return the API Global errors described in the API description.
HEADERS
| Key | Datatype | Required | Description |
|---|---|---|---|
Accept | string |
RESPONSES
status: OK
{"risk":"LOW","dataset":"eiusmod eu","source":"ad in Duis Ut adipisicing","lapse":"365D","action":"DELETE","timestamp":37281189,"self":"laboris velit elit","cidr":"reprehenderit Excepteur","score":60773888}