tencent cloud

文档反馈

DescribeAttackEvents

最后更新时间:2024-08-27 11:45:55

1. API Description

Domain name for API request: cwp.tencentcloudapi.com.

This API is used to display the list of network attack detection events in pagination.

A maximum of 20 requests can be initiated per second for this API.

We recommend you to use API Explorer
Try it
API Explorer provides a range of capabilities, including online call, signature authentication, SDK code generation, and API quick search. It enables you to view the request, response, and auto-generated examples.

2. Input Parameters

The following request parameter list only provides API request parameters and some common parameters. For the complete common parameter list, see Common Request Parameters.

Parameter Name Required Type Description
Action Yes String Common Params. The value used for this API: DescribeAttackEvents.
Version Yes String Common Params. The value used for this API: 2018-02-28.
Region No String Common Params. This parameter is not required.
Limit No Integer Number of returns. The maximum value is 100.
Offset No Integer Offset. Default value: 0.
Filters.N No Array of Filter Filter criteria
  • Type - String attack status. 0: attempted attack; 1: attack succeeded - required: no
  • Status - String event processing status: 0: pending 1: processed; 2: allowlisted; 3: ignored; 4: deleted - required: no
  • SrcIP - String source IP - required: no
  • Uuids - String CWPP UUID - required: no
  • Quuids - String CVM UUID - required: no
  • DstPort - String attack target port - required: no
  • MachineName - String host name - required: no
  • InstanceID - String host instance ID - required: no
  • AttackTimeBegin - String attack start time - required: no
  • AttackTimeEnd - String attack end time - required: no
  • VulSupportDefense - String: whether the vulnerability can be defended: 0: no;1: yes - required: no

  • By No String Sort
    Order No String Sorting method: ASC, DESC

    3. Output Parameters

    Parameter Name Type Description
    List Array of NetAttackEvent Attack Event List
    Note: This field may return null, indicating that no valid values can be obtained.
    TotalCount Integer Total number of entries
    RequestId String The unique request ID, generated by the server, will be returned for every request (if the request fails to reach the server for other reasons, the request will not obtain a RequestId). RequestId is required for locating a problem.

    4. Example

    Example1 Obtaining the Network Attack Event List

    This example shows you how to obtain the list of network attack event.

    Input Example

    POST / HTTP/1.1
    Host: cwp.tencentcloudapi.com
    Content-Type: application/json
    X-TC-Action: DescribeAttackEvents
    <Common request parameters>
    
    {}
    

    Output Example

    {
        "Response": {
            "List": [
                {
                    "Count": 6,
                    "DstPort": 8080,
                    "Id": 3,
                    "Location": "",
                    "MachineExtraInfo": {
                        "HostName": "",
                        "InstanceID": "ins-0cvonrya",
                        "NetworkName": "",
                        "NetworkType": 0,
                        "PrivateIP": "10.0.0.5",
                        "WanIP": "106.52.29.133"
                    },
                    "MergeTime": "2023-05-23T19:21:46+08:00",
                    "PayVersion": 2,
                    "Quuid": "05f0bcab-726c-4ea4-8109-bcd03d5598f7",
                    "SrcIP": "127.0.0.1",
                    "Status": 0,
                    "Type": 0,
                    "Uuid": "05f0bcab-726c-4ea4-8109-bcd03d5598f7",
                    "VulDefenceStatus": 0,
                    "VulId": 101824,
                        "VulName": "Apache Log4j2 remote code execution vulnerability (CVE-2021-44228)"
                    "VulSupportDefense": 1
                },
                {
                    "Count": 5,
                    "DstPort": 8080,
                    "Id": 2,
                "Location": "Local area network",
                    "MachineExtraInfo": {
                        "HostName": "",
                        "InstanceID": "ins-0cvonrya",
                        "NetworkName": "",
                        "NetworkType": 0,
                        "PrivateIP": "10.0.0.5",
                        "WanIP": "106.52.29.133"
                    },
                    "MergeTime": "2023-05-23T14:43:28+08:00",
                    "PayVersion": 2,
                    "Quuid": "05f0bcab-726c-4ea4-8109-bcd03d5598f7",
                    "SrcIP": "10.0.0.14",
                    "Status": 0,
                    "Type": 0,
                    "Uuid": "05f0bcab-726c-4ea4-8109-bcd03d5598f7",
                    "VulDefenceStatus": 0,
                    "VulId": 101824,
                        "VulName": "Apache Log4j2 remote code execution vulnerability (CVE-2021-44228)"
                    "VulSupportDefense": 1
                },
                {
                    "Count": 5,
                    "DstPort": 8080,
                    "Id": 1,
                "Location": "Local area network",
                    "MachineExtraInfo": {
                        "HostName": "",
                        "InstanceID": "ins-0cvonrya",
                        "NetworkName": "",
                        "NetworkType": 0,
                        "PrivateIP": "10.0.0.5",
                        "WanIP": "106.52.29.133"
                    },
                    "MergeTime": "2023-05-23T14:37:51+08:00",
                    "PayVersion": 2,
                    "Quuid": "05f0bcab-726c-4ea4-8109-bcd03d5598f7",
                    "SrcIP": "10.0.0.5",
                    "Status": 0,
                    "Type": 0,
                    "Uuid": "05f0bcab-726c-4ea4-8109-bcd03d5598f7",
                    "VulDefenceStatus": 0,
                    "VulId": 101824,
                        "VulName": "Apache Log4j2 remote code execution vulnerability (CVE-2021-44228)"
                    "VulSupportDefense": 1
                }
            ],
            "RequestId": "dcdbc4d6-54c1-45d5-ab8e-4a7c9275c168",
            "TotalCount": 3
        }
    }
    

    5. Developer Resources

    SDK

    TencentCloud API 3.0 integrates SDKs that support various programming languages to make it easier for you to call APIs.

    Command Line Interface

    6. Error Code

    The following only lists the error codes related to the API business logic. For other error codes, see Common Error Codes.

    Error Code Description
    InternalError Internal error
    InvalidParameter Incorrect parameter.
    InvalidParameter.InvalidFormat Incorrect parameter format.
    InvalidParameter.MissingParameter Missing parameter.
    InvalidParameter.ParsingError Incorrect parameter parsing.
    InvalidParameterValue Invalid parameter value.
    MissingParameter Missing parameter error.
    ResourceNotFound The resource does not exist.