While a 'search' request allows to paginate over the first 10'000 results, the 'scroll search' can be used for deep pagination over a larger number of results (or even all results) in much the same way as you would use a cursor on a traditional database. In order to use scrolling, the initial search response will return a 'search_id' data field which should be specified in the subsequent requests in order to iterate over the rest of results.

Options for search params:

Search parameter Operator Value
cidr
eq
Find IPs by CIDR.
string
security_score
gte
,
lte
Spyse security score.
string
geo_country
eq
,
exists
,
not_exists
Find IPs by the country they are located in.
string
geo_country_iso_code
eq
,
exists
,
not_exists
Find IPs by the country ISO code.
string
geo_city
eq
,
exists
,
not_exists
Find IPs by the city they are located in.
string
as_org
eq
,
contains
,
exists
,
not_exists
Find IPs by the autonomous system organization name.
string
as_num
eq
,
exists
,
not_exists
Find IPs by the autonomous system number.
string
isp
eq
,
contains
,
exists
,
not_exists
Find IPs by the internet service provider name.
string
open_port
eq
,
exists
,
not_exists
The open port number to search for. For ex. by setting the value "22" and operator "eq" you will search for all IP hosts that have port 22 opened.
string
port_banner
contains
,
exists
,
not_exists
Find IPs by its port banner content.
string
port_cve_id
eq
Find IPs affected by a specific CVE. Example: CVE-2019-12407.
string
technology_cpe
eq
,
contains
Search IPs by technology CPE. Example: "cpe:2.3:a:apache:http_server".
string
port_service
eq
,
exists
,
not_exists
Find IPs by services detected on ports. Examples: "ssh”, “http”, “ftp” etc.
string
port_technology_name
eq
,
contains
Find IPs hosting the specified technology. Examples: “Pure-FTPd”, “Dovecot pop3d”, "Postfix smtpd".
string
port_technology_version
eq
,
gte
,
lte
Find IPs hosting the specified technology version. Examples: “2.4.18” (Apache version), “7.4” (OpenSSH version), "1.3.5rc3" (ProFTPD version).
string
ptr
eq
,
contains
,
exists
,
not_exists
Find IPs by PTR record value.
string
http_extract_tracker_adsense_id
eq
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified Google AdSense identifier.
string
http_extract_title
eq
,
starts
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified title.
string
http_extract_description
eq
,
starts
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified description.
string
http_extract_robots
contains
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified robots.txt content.
string
http_extract_status_code
eq
,
gte
,
lte
,
exists
,
not_exists
Search IPs that host websites (on any port) returning the specified status code.
string
http_extract_favicon_sha256
eq
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing favicon with the specified SHA256 hash value.
string
http_extract_email
eq
,
contains
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified email address.
string
http_extract_headers_name
eq
,
contains
Search IPs that host websites (on any port) returning the specified HTTP header name.
string
http_extract_headers_value
eq
,
contains
Search IPs that host websites (on any port) returning the specified HTTP header value.
string
http_extract_meta_name
eq
,
contains
Search IPs that host websites (on any port) with the homepage containing the specified HTML meta tag name.
string
http_extract_meta_value
eq
,
contains
Search IPs that host websites (on any port) with the homepage containing the specified HTML meta tag value.
string
http_extract_scripts
contains
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing <script> tags with specified "src" attribute substring.
string
http_extract_styles
contains
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing <link> tags with specified "href" attribute substring.
string
http_extract_link_url
contains
,
starts
,
ends
Search IPs that host websites (on any port) with the homepage containing links with the specified substrings in their URL.
string
http_extract_link_host
contains
,
starts
,
ends
Search IPs that host websites (on any port) with the homepage containing links with the specified substrings in their URL host.
string
http_extract_final_redirect_url
eq
,
contains
,
exists
,
not_exists
Find IPs that host websites redirecting to the specified URL.
string
http_extract_tracker_google_analytics_key
eq
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified Google Analytics key.
string
http_extract_tracker_google_play_app
eq
,
contains
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified Google Play app identifier.
string
http_extract_tracker_apple_itunes_app
eq
,
contains
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified Apple iTunes app identifier.
string
http_extract_tracker_google_site_verification
eq
,
exists
,
not_exists
Search IPs that host websites (on any port) with the homepage containing the specified Google Site verification identifier.
string
abuses_confidence_score
gte
,
lte
Find IPs by abuse confidence score.
string
abuses_category_name
eq
,
contains
Find IPs by abuse category name.
string
abuses_reported_at
eq
,
gte
,
lte
Find IPs by abuse reported at date. Example: 2020-12-21.
string
abuses_is_whitelist_strong
eq
Find IPs, which contains benign crawlers verified by reverse-forward DNS resolution checks.
bool
abuses_is_whitelist_weak
eq
Find IPs, that are within our CIDR whitelist, which contain netblocks from organizations we believe to be benign or often mistaken for malcious.
bool
abuses_reports_num
gte
,
lte
Find IPs by the number of abuses received.
string
abuses_reports_comment
eq
,
contains
,
exists
,
not_exists
Find IPs by the abuses comment.
string
Language
Authorization
Bearer
Click Try It! to start a request and see the response here!