Accessing IP Intel

VulnCheck IP Intelligence includes tracking of potentially vulnerable systems that may be targeted by initial access exploits as well as tracking of command & control (C2) attacker infrastructure and honeypots.

VulnCheck IP Intelligence includes tracking of potentially vulnerable systems that may be targeted by initial access exploits as well as tracking of command & control (C2) attacker infrastructure and honeypots.

Example API Queries

VulnCheck IP Intelligence supports a wide range of use cases.

C2 Detections in Sweden

By combining two of the API query parameters (Country and ID) we can quickly zoom in one Command & Control (C2) detections in a given geography -- in this case, Sweden.

curl --request GET \
    --url https://api.vulncheck.com/v3/index/ipintel-3d?id=c2&country=Sweden \
    --header 'Accept: application/json' \
    --header 'Authorization: Bearer insert_token_here'

Example API Response for IP Intel-3D

After calling the /v3/index/ipintel-3d?id=c2&country=:country API endpoint with a valid country, a response similar to the below will be returned:

{
  "_benchmark": 0.04378,
  "_meta": {
    "timestamp": "2025-10-27T23:18:59.172188696Z",
    "index": "ipintel-3d",
    //...
  },
  "data": [
    {
      "ip": "46.22.115.147",
      "port": 443,
      "ssl": true,
      "lastSeen": "2025-10-27T07:55:47.459042",
      "asn": "AS43853",
      "country": "Sweden",
      "country_code": "SE",
      "city": "Huddinge",
      "cve": [],
      "matches": [
        "SoftEther"
      ],
      "hostnames": [
        "46-22-115-147.ip.axbyte.se"
      ],
      "type": {
        "id": "c2",
        "kind": "Proxy",
        "finding": "command and control infrastructure"
      },
      "feed_ids": [
        "a93a3bdd-c625-4128-a15b-e99e2ca93d62"
      ],
      "_timestamp": "2025-10-27T09:05:50.858661971Z"
    },
    {
      "ip": "185.232.44.180",
      "port": 443,
      "ssl": true,
      "lastSeen": "2025-10-27T07:24:52.904576",
      "asn": "AS209209",
      "country": "Sweden",
      "country_code": "SE",
      "city": "Västerås",
      "cve": [],
      "matches": [
        "Interactsh"
      ],
      "hostnames": [],
      "type": {
        "id": "c2",
        "kind": "Attack Infrastructure",
        "finding": "command and control infrastructure"
      },
      "feed_ids": [
        "7f6bc0e7-8064-40f8-b7d4-c4ebc17cf997"
      ],
      "_timestamp": "2025-10-27T09:04:42.629323571Z"
    },
    //...
  ]
}

API Query Parameters

VulnCheck IP Intelligence makes it easy to query our IP data set with a number of API query parameters, useful for filtering the results. Supported API query parameters are as follows:

Query ParameterDescription
asnFilter based on ASN: e.g., "AS719"
cidrFilter based on IP address or range: e.g., "165.227.231.125"
countryFilter based on country_code: e.g., "Australia"
country_codeFilter based on country_code: e.g., "AU"
hostnameFilter based on keyword or FQDN: e.g., "google" or "amazonaws.com"
idFilter based on supported detection types: e.g., "c2", "honeypot", or "initial-access"

Offline Backups Available

Offline BackupDescription
ipintel-3dIP Intelligence detections for the past 3 days
ipintel-10dIP Intelligence detections for the past 10 days
ipintel-30dIP Intelligence detections for the past 30 days
ipintel-90dIP Intelligence detections for the past 90 days

To request a specific offline backup, simply call /v3/backup/:index as follows (ipintel-3d shown below):

curl --request GET \
    --url https://api.vulncheck.com/v3/backup/ipintel-3d \
    --header 'Accept: application/json' \
    --header 'Authorization: Bearer insert_token_here'