We provide a large collection of APIs that customers use to access a wide wealth of cybersecurity information, and use our solutions to improve their own cyber defenses.
With our APIs, you can:
Access an extensive data set, including information types such as domain, IPv4, IPv6, reputation, PADNS, enrichment, feeds, and scoring.
Access Threat Intelligence: Threat rankings, Indicators of Future Attacks (IOFAs), and threat feeds from Silent Push and third parties.
Analyze DNS data: Numerous endpoints devoted to analyzing DNS data granularly.
Capture Live Screenshots: Live screenshots of URLs.
Perform Live Scans: Information types like HTML data, favicon data, body data, SSL data, domain risk score, and redirect chains.
Integrate with security tools: Our APIs are specifically designed to integrate with existing security stacks.
Monitor API Usage: API usage and quotas associated with the API.
Retrieve Raw Scan Data: The original data we scanned.
Use SPQL: Advanced users can use Silent Push Query Language (SPQL) to retrieve information from multiple datasets.
Top APIs and Endpoints
We offer a wide range of APIs for various uses, along with numerous endpoints supporting hundreds of use cases.
To start, begin with our most popular APIs and endpoints among our customers:
API Name | Endpoint | Method | Data | Description |
---|---|---|---|---|
Explore | GET | WHOIS | Retrieve WHOIS information about domain owners. For example, name or address of the owner associated with a domain. | |
Explore | GET | PADNS, Enrichment, Reputation | Retrieve DNS information. For example, domain data and IP address data. | |
Threat Ranking | GET | Threat Feeds | Retrieve threat intelligence data to prioritize threats. For example, threat feeds. | |
Live Scan | GET | API Limits | Retrieve information associated with your API usage. For example, API credits used. | |
Live Scan | GET | Live Endpoint Scan | Retrieve information about a real-time scan of a URL. | |
Explore Recipes | GET | Live Screenshot Scan | Retrieve information about a real-time screenshot of a URL. | |
SPQL | GET | IP Scanning | Query data through multiple datasets within the Silent Push Explore API. |
Use Cases
We offer a suite of APIs for our customers to enhance their cybersecurity operations with various Silent Push solutions, for example:
Brand Impersonation
Intelligence Feeds
Proactive Threat Hunting
Brand Impersonation
Use case: An e-commerce platform wants to safeguard its brand reputation by detecting and mitigating instances of brand impersonation that could deceive customers.
Implementation: They implement the following relevant solutions using our API's:
Domain Impersonation Detection: The e-commerce platform uses Silent Push's Explore Recipes API to identify domains that closely resemble its own, a common tactic in phishing attacks.
Comprehensive Asset Monitoring: The API scans for more than domain impersonation; it allows customers to investigate impersonations involving email addresses, HTML titles, and favicons.
Automated Alerts and Response: After the detection of impersonation attempts, the Silent Push system triggers alerts, enabling the security team to take swift action, such as requesting a takedown procedure or informing the affected customers.
Intelligence Feeds
Use case: A financial institution wants to increase and support its cybersecurity defenses by integrating real-time threat intelligence into its existing security infrastructure.
Implementation: They implement the following relevant solutions using our API's:
Integration of Early Detection Feeds: The financial institution uses Silent Push's API to ingest enriched data on domains, IPs, and URLs associated with malicious activities, including command and control (C2) infrastructures and phishing campaigns.
Real-Time Monitoring: The security teams gain real-time insights into emerging threats by using early detection feeds. This enables them to adjust their defenses proactively.
Prioritization of Threats: The enriched data provides context and risk scores, allowing the team to focus on the most critical threats and respond swiftly to potential incidents.
Proactive Threat Hunting
Use case: A technology company wants to identify and mitigate threats before they impact operations by uncovering the threatening infrastructure during the planning stages of an attack.
Implementation: They implement the following relevant solutions using our APIs:
Utilization of Indicators of Future Attack (IOFAs): The technology company leverages Silent Push's APIs to access IOFAs, which include data on domains, IPs, and URLs that are part of potential malicious infrastructures.
Behavioral Analysis: The security analysts use this data to create behavioral fingerprints that map out adversary Tactics, Techniques, and Procedures (TTPs) before they are weaponized.
Preemptive Defense Measures: Armed with this intelligence, the technology company implements security measures to block or monitor the identified infrastructure, which effectively neutralizes threats before they materialize.