Accessing IP Intel

VulnCheck IP Intelligence includes tracking of potentially vulnerable systems that may be targeted by initial access exploits as well as tracking of command & control (C2) attacker infrastructure and honeypots.

VulnCheck IP Intelligence includes tracking of potentially vulnerable systems that may be targeted by initial access exploits as well as tracking of command & control (C2) attacker infrastructure and honeypots.

Example API Queries

VulnCheck IP Intelligence supports a wide range of use cases.

C2 Detections in Sweden

By combining two of the API query parameters (Country and ID) we can quickly zoom in one Command & Control (C2) detections in a given geography -- in this case, Sweden.

curl --request GET \
    --url https://api.vulncheck.com/v3/index/ipintel-3d?id=c2&country=Sweden \
    --header 'Accept: application/json' \
    --header 'Authorization: Bearer insert_token_here'

Example API Response for IP Intel-3D

After calling the /v3/index/ipintel-3d?id=c2&country=:country API endpoint with a valid country, a response similar to the below will be returned:

{
  "_benchmark": 0.04378,
  "_meta": {
    "timestamp": "2025-10-27T23:18:59.172188696Z",
    "index": "ipintel-3d",
    //...
  },
  "data": [
    {
      "ip": "46.22.115.147",
      "port": 443,
      "ssl": true,
      "lastSeen": "2025-10-27T07:55:47.459042",
      "asn": "AS43853",
      "country": "Sweden",
      "country_code": "SE",
      "city": "Huddinge",
      "cve": [],
      "matches": [
        "SoftEther"
      ],
      "hostnames": [
        "46-22-115-147.ip.axbyte.se"
      ],
      "type": {
        "id": "c2",
        "kind": "Proxy",
        "finding": "command and control infrastructure"
      },
      "feed_ids": [
        "a93a3bdd-c625-4128-a15b-e99e2ca93d62"
      ],
      "_timestamp": "2025-10-27T09:05:50.858661971Z"
    },
    {
      "ip": "185.232.44.180",
      "port": 443,
      "ssl": true,
      "lastSeen": "2025-10-27T07:24:52.904576",
      "asn": "AS209209",
      "country": "Sweden",
      "country_code": "SE",
      "city": "Västerås",
      "cve": [],
      "matches": [
        "Interactsh"
      ],
      "hostnames": [],
      "type": {
        "id": "c2",
        "kind": "Attack Infrastructure",
        "finding": "command and control infrastructure"
      },
      "feed_ids": [
        "7f6bc0e7-8064-40f8-b7d4-c4ebc17cf997"
      ],
      "_timestamp": "2025-10-27T09:04:42.629323571Z"
    },
    //...
  ]
}

API Query Parameters

VulnCheck IP Intelligence makes it easy to query our IP data set with a number of API query parameters, useful for filtering the results. Supported API query parameters are as follows:

Query ParameterDescription
asnFilter based on ASN: e.g., "AS719"
cidrFilter based on IP address or range: e.g., "165.227.231.125"
countryFilter based on country_code: e.g., "Australia"
country_codeFilter based on country_code: e.g., "AU"
hostnameFilter based on keyword or FQDN: e.g., "google" or "amazonaws.com"
idFilter based on supported detection types: e.g., "c2", "honeypot", or "initial-access"

Offline Backups Available

Offline BackupDescription
ipintel-3dIP Intelligence detections for the past 3 days
ipintel-10dIP Intelligence detections for the past 10 days
ipintel-30dIP Intelligence detections for the past 30 days
ipintel-90dIP Intelligence detections for the past 90 days

To request a specific offline backup, simply call /v3/backup/:index as follows (ipintel-3d shown below):

curl --request GET \
    --url https://api.vulncheck.com/v3/backup/ipintel-3d \
    --header 'Accept: application/json' \
    --header 'Authorization: Bearer insert_token_here'

IP Intel Attribute Details

AttributeMeaning
ipIP Address of the host
portPort the host was accessible
ssl
lastSeenThe last time the record was seen
asnasn associated with the IP address
countrycountry associated with the IP address
country codecountry code associated with the IP address
citycity associated with the IP address
cveCVE's associated with the host
matchesRepresents the name or identifier in relation to the ID. e.g. Confluence Honeypot when ID is honeypot, name of vulnerability when ID is initial-access
hostnamesReverse DNS lookups for IP address
feed_idsIndicates which rule in the feed was used to detect that particular finding
_timestampTime when the record was last modified

type attribute

AttributeMeaning
idsource of ip intelligence ie: initial-access, proxy, c2, ics, vulncheck-canaries
kindIdentifies C2 or C2 Proxy when ID is c2 ie: Proxy,C2, Attack Infrastructure, Scanner
findingpotentially vulnerable, proxy, honeypot, command and control infrastructure, web application attack, ics, detection of a network scan, potentially bad traffic