The SOC Defenders MISP endpoint returns your filtered IOCs packaged as a MISP JSON event. You can import this file directly into any MISP instance using the standard file or URL import flow — no manual attribute creation required.Documentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
MISP export requires a Pro subscription. Upgrade at socdefenders.ai.
Endpoint
GET /api/v1/iocs/misp
The response is a MISP-compatible JSON event containing one attribute per IOC.
Authentication
Pass your API key as a Bearer token in theAuthorization header.
Query parameters
| Parameter | Type | Description |
|---|---|---|
type | string | Filter by IOC type: ipv4, ipv6, domain, url, md5, sha1, sha256, cve, email |
since | string | ISO 8601 timestamp — return only IOCs added after this date |
confidence | string | low, medium, or high |
industry | string | CISA Critical Infrastructure sector slug |
Example request
Importing into MISP
Download the MISP event file
Run the curl command above to save the MISP JSON event to a local file, or copy the endpoint URL for direct URL import.
Open your MISP instance
Navigate to Sync Actions → Import from file (or Import from URL if you want MISP to fetch directly).
Select the event file
Upload the downloaded JSON file, or paste the full endpoint URL including your
Authorization header if your MISP version supports authenticated URL imports.