Get ICS Threat Intelligence report list

Expand all | Collapse all

The ics/get_list endpoint is used to display the list of ICS Threat Intelligence reports published on Kaspersky Threat Intelligence Portal.

Request

Request method: POST

Endpoint: https://tip.kaspersky.com/api/ics/get_list

Query parameters:

Expected parameters

Parameter

Description

date_start

Optional parameter. Includes only ICS Threat Intelligence reports that were published starting from and including the specified date onwards. The default value is 1.

date_end

Optional parameter. Includes only ICS Threat Intelligence reports that were published only until and including the specified date. The default value is time()—current time.

The date_start and date_end parameters must be specified in the UNIX time stamp system (the number of seconds that have elapsed since 00:00:00 (UTC), 1 January 1970). If these parameters are not specified, the Kaspersky Threat Intelligence Portal API returns a list of all ICS Threat Intelligence reports.

Request example:

Get a list of ICS reports:

curl -u <user_name> -H 'Content-Length: 0' --cert <full path to the certificate CERT_NAME.pem on your computer> -X POST 'https://tip.kaspersky.com/api/ics/get_list?date_start=1584551570'

Responses

200 OK

401 Unauthorized

403 Forbidden

451 Unavailable For Legal Reasons

See also:

Get ICS Threat Intelligence report

Get Master IOC

Get Master YARA

Page top