TheDocumentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
/api/v1/lookup endpoint enriches a single indicator of compromise with contextual threat intelligence. For a given IP address, domain, URL, or file hash, it returns an AI-generated risk score, associated MITRE ATT&CK techniques, the source feeds that have reported the indicator, and auto-generated detection queries ready to deploy in Splunk or Microsoft Sentinel. Use this endpoint for on-demand triage during an investigation or to enrich alerts in your SOAR playbook.
Request
Method:GETURL:
https://socdefenders.ai/api/v1/lookupAuth: Required —
Authorization: Bearer sk_live_YOUR_KEYTier: Free
Query parameters
The indicator value to enrich (e.g.
192.0.2.1, evil.com, a file hash).IOC type hint for disambiguation. One of:
ipv4, ipv6, domain, url, md5, sha1, sha256, cve, mitre-attack, email. Providing this speeds up resolution when a value is ambiguous.Example request
Response
Response fields
The indicator value that was queried.
The detected or specified IOC type (e.g.
ipv4, domain, sha256).AI-generated risk rating for this indicator. One of:
critical, high, medium, low.Confidence level assigned by the source feed(s). One of:
high, medium, low.MITRE ATT&CK techniques associated with this indicator.
Auto-generated detection queries for common SIEM platforms.
List of source feeds that have reported this indicator.
Error responses
If your API key is missing or invalid, the API returns a401 Unauthorized response: