Silent Push APIs

Prev Next

We provide a large collection of APIs that customers use to access a wide wealth of cybersecurity information, and use our solutions to improve their own cyber defenses.

With our APIs, you can:

  • Access an extensive data set, including information types such as domain, IPv4, IPv6, reputation, PADNS, enrichment, feeds, and scoring.

  • Access Threat Intelligence:  Threat rankings, Indicators of Future Attacks (IOFAs), and threat feeds from Silent Push and third parties.

  • Analyze DNS data: Numerous endpoints devoted to analyzing DNS data granularly.

  • Capture Live Screenshots: Live screenshots of URLs.

  • Perform Live Scans: Information types like HTML data, favicon data, body data, SSL data, domain risk score, and redirect chains.

  • Integrate with security tools: Our APIs are specifically designed to integrate with existing security stacks.

  • Monitor API Usage: API usage and quotas associated with the API.

  • Retrieve Raw Scan Data: The original data we scanned.

  • Use SPQL: Advanced users can use Silent Push Query Language (SPQL) to retrieve information from multiple datasets.

Top APIs and Endpoints

We offer a wide range of APIs for various uses, along with numerous endpoints supporting hundreds of use cases.

To start, begin with our most popular APIs and endpoints among our customers:

API Name

Endpoint

Method

Data

Description

Explore

/api/v1/merge-api/explore/domain/whois

GET

WHOIS

Retrieve WHOIS information about domain owners. For example, name or address of the owner associated with a domain.

Explore

/api/v1/merge-api/explore/padns/lookup/query/a

GET

PADNS, Enrichment, Reputation

Retrieve DNS information. For example, domain data and IP address data.

Threat Ranking

/api/v2/iocs/threat-ranking

GET

Threat Feeds

Retrieve threat intelligence data to prioritize threats. For example, threat feeds.

Live Scan

/api/v2/live-scan/scan-on-demand

GET

API Limits

Retrieve information associated with your API usage. For example, API credits used.

Live Scan

/api/v2/live-scan/screenshot-on-demand

GET

Live Endpoint Scan

Retrieve information about a real-time scan of a URL.

Explore Recipes

/api/v1/explore-recipes/domain-on-a-server-recipes/query

GET

Live Screenshot Scan

Retrieve information about a real-time screenshot of a URL.

SPQL

/api/v1/merge-api/explore/scandata/search/raw

GET

IP Scanning

Query data through multiple datasets within the Silent Push Explore API.

Use Cases

We offer a suite of APIs for our customers to enhance their cybersecurity operations with various Silent Push solutions, for example:

  • Brand Impersonation

  • Intelligence Feeds

  • Proactive Threat Hunting

Brand Impersonation

Use case: An e-commerce platform wants to safeguard its brand reputation by detecting and mitigating instances of brand impersonation that could deceive customers.
Implementation: They implement the following relevant solutions using our API's:

  1. Domain Impersonation Detection: The e-commerce platform uses Silent Push's Explore Recipes API to identify domains that closely resemble its own, a common tactic in phishing attacks.

  2. Comprehensive Asset Monitoring: The API scans for more than domain impersonation; it allows customers to investigate impersonations involving email addresses, HTML titles, and favicons.

  3. Automated Alerts and Response: After the detection of impersonation attempts, the Silent Push system triggers alerts, enabling the security team to take swift action, such as requesting a takedown procedure or informing the affected customers.

Intelligence Feeds

Use case: A financial institution wants to increase and support its cybersecurity defenses by integrating real-time threat intelligence into its existing security infrastructure.
Implementation: They implement the following relevant solutions using our API's:

  1. Integration of Early Detection Feeds: The financial institution uses Silent Push's API to ingest enriched data on domains, IPs, and URLs associated with malicious activities, including command and control (C2) infrastructures and phishing campaigns.

  2. Real-Time Monitoring: The security teams gain real-time insights into emerging threats by using early detection feeds. This enables them to adjust their defenses proactively.

  3. Prioritization of Threats: The enriched data provides context and risk scores, allowing the team to focus on the most critical threats and respond swiftly to potential incidents.

Proactive Threat Hunting

Use case: A technology company wants to identify and mitigate threats before they impact operations by uncovering the threatening infrastructure during the planning stages of an attack.
Implementation: They implement the following relevant solutions using our APIs:

  1. Utilization of Indicators of Future Attack (IOFAs): The technology company leverages Silent Push's APIs to access IOFAs, which include data on domains, IPs, and URLs that are part of potential malicious infrastructures.

  2. Behavioral Analysis: The security analysts use this data to create behavioral fingerprints that map out adversary Tactics, Techniques, and Procedures (TTPs) before they are weaponized.

  3. Preemptive Defense Measures: Armed with this intelligence, the technology company implements security measures to block or monitor the identified infrastructure, which effectively neutralizes threats before they materialize.