The Edgewatch CTI API provides real-time, first-hand cyber threat intelligence collected from a global honeypot network. It offers enriched data on IP addresses, domains, URLs, and malware hashes, supporting proactive threat detection, enrichment pipelines, and SOC integrations.
Base URL:
https://cti.edgewatch.netAuthentication:
All endpoints require a Bearer Token sent via the Authorization HTTP header.
Authorization: Bearer <your_api_token>Obtain API keys through your Edgewatch customer portal or contact support.
Authentication
How to authenticate requests:
Include your bearer token in the Authorization header:
curl -H "Authorization: Bearer YOUR_TOKEN" https://cti.edgewatch.net/ip/203.0.113.45If the token is missing or invalid, the server will respond with:
{
"detail": "Not authenticated"
}Endpoint: /ip/{ip}
GET /ip/{ip}
Returns intelligence for an IP address including threat classification, tags, honeypot sightings, and geolocation data.
Example Request:
curl -H "Authorization: Bearer YOUR_TOKEN" https://cti.edgewatch.net/ip/203.0.113.45Response Example:
{
"ip_addr": "203.0.113.45",
"classification": "malicious",
"tag": ["ssh", "malware"],
"blacklist": [
{
"source": "Cowrie",
"description": "SSH brute-force",
"first_seen": "2025-05-12 00:30:45",
"last_seen": "2025-05-12 01:15:00",
"count": 15
}
],
"location": { "lat": 35.0, "lon": 103.0 },
"creation_time": "2025-05-12 00:30:45",
"modification_time": "2025-05-12 01:15:00",
"type": "ip"
}Endpoint: /hostname/{hostname}
GET /hostname/{hostname}
Retrieves intelligence about a specific hostname or subdomain, including resolved IPs and domain-level metadata.
Endpoint: /url/{url}
GET /url/{url}
Returns contextual intelligence for a given URL, such as sightings, classification, and associated tags.
Note: URL must be percent-encoded.
Example:
curl -H "Authorization: Bearer YOUR_TOKEN" https://cti.edgewatch.net/url/https%3A%2F%2Fevil.example.com%2Fdropper.exeEndpoint: /sample/{hash}
GET /sample/{hash}
Returns metadata and threat classification for a file hash (SHA256 or MD5), including detection count, file type, and malware tags.
Fields:
sha256,md5,sha1filetype,filename,sizeclassificationtagsblacklistentries with sources
TAXII 2.1 Server
Accessing STIX feeds
You can pull structured STIX 2.1 bundles from our TAXII 2.1 endpoint:
https://cti.edgewatch.net:9000/For details on available collections and authentication setup, refer to the TAXII Server Guide.
Response Codes
| Code | Description |
|---|---|
| 200 | Success |
| 401 | Unauthorized (invalid token) |
| 404 | IOC not found |
| 429 | Rate limit exceeded |
| 500 | Internal server error |