Skip to content

Commit e417803

Browse files
author
jdv
committed
almost finished
1 parent adf4d41 commit e417803

7 files changed

Lines changed: 69 additions & 269 deletions

File tree

crowdsec-docs/sidebarsUnversioned.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -342,7 +342,7 @@ const sidebarsUnversionedConfig: SidebarConfig = {
342342
},
343343
{
344344
type: "category",
345-
label: "API",
345+
label: "API Keys",
346346
link: {
347347
type: "doc",
348348
id: "console/ip_reputation/api_keys",
@@ -366,7 +366,7 @@ const sidebarsUnversionedConfig: SidebarConfig = {
366366
},
367367
{
368368
type: "link",
369-
label: "Technical Documentation",
369+
label: "Enrichment Fields Ref",
370370
href: "/u/cti_api/taxonomy/intro",
371371
customProps: {
372372
tag: "otherSection",
368 KB
Loading

crowdsec-docs/unversioned/console/ip_reputation/api_keys.mdx

Lines changed: 3 additions & 231 deletions
Original file line numberDiff line numberDiff line change
@@ -47,240 +47,12 @@ Only Premium orgizations can buy keys with higher quotas. See [Premium API Keys]
4747
/>
4848
</div>
4949
</div>
50-
## Accessing the API
50+
## Using the API
5151

52-
### cURL
52+
CrowdSec provides [ready-made integrations](/u/cti_api/api_integration/integration_intro) for the most common security platforms — SIEM, SOAR, TIP, and investigation tools. If your platform is listed, that's the fastest way to get started.
5353

54-
You can test your newly created API key by running the following command in your terminal:
54+
If you prefer to use your own scripts, call the API directly from the command line, or build custom playbooks, the API is a straightforward REST interface authenticated with your key.
5555

56-
:::info
57-
Replease `$API_KEY` with your actual API key.
58-
:::
59-
60-
```shell
61-
curl -H "x-api-key: $API_KEY" https://cti.api.crowdsec.net/v2/smoke/185.7.214.104 | jq .
62-
```
63-
64-
And the default output looks something like this:
65-
66-
<details>
67-
68-
<summary>Command Output</summary>
69-
70-
```json
71-
{
72-
"ip_range_score": 5,
73-
"ip": "[CENSORED]",
74-
"ip_range": "[CENSORED]",
75-
"as_name": "[CENSORED]",
76-
"as_num": 0,
77-
"location": {
78-
"country": "FR",
79-
"city": "",
80-
"latitude": 0.0,
81-
"longitude": 0.0
82-
},
83-
"reverse_dns": "[CENSORED]",
84-
"behaviors": [
85-
{
86-
"name": "http:scan",
87-
"label": "HTTP Scan",
88-
"description": "IP has been reported for performing actions related to HTTP vulnerability scanning and discovery."
89-
},
90-
{
91-
"name": "ssh:bruteforce",
92-
"label": "SSH Bruteforce",
93-
"description": "IP has been reported for performing brute force on ssh services."
94-
},
95-
{
96-
"name": "http:exploit",
97-
"label": "HTTP Exploit",
98-
"description": "IP has been reported for attempting to exploit a vulnerability in a web application."
99-
},
100-
{
101-
"name": "generic:exploit",
102-
"label": "Exploitation attempt",
103-
"description": "IP has been reported trying to exploit known vulnerability/CVE on unspecified protocols."
104-
}
105-
],
106-
"history": {
107-
"first_seen": "2022-05-28T16:00:00+00:00",
108-
"last_seen": "2023-10-15T05:45:00+00:00",
109-
"full_age": 507,
110-
"days_age": 505
111-
},
112-
"classifications": {
113-
"false_positives": [],
114-
"classifications": []
115-
},
116-
"attack_details": [
117-
{
118-
"name": "crowdsecurity/http-probing",
119-
"label": "HTTP Probing",
120-
"description": "Detect site scanning/probing from a single ip",
121-
"references": []
122-
},
123-
{
124-
"name": "crowdsecurity/ssh-bf",
125-
"label": "SSH Bruteforce",
126-
"description": "Detect ssh bruteforce",
127-
"references": []
128-
},
129-
{
130-
"name": "crowdsecurity/ssh-slow-bf",
131-
"label": "SSH Bruteforce",
132-
"description": "Detect slow ssh bruteforce",
133-
"references": []
134-
},
135-
{
136-
"name": "crowdsecurity/http-bad-user-agent",
137-
"label": "detection of bad user-agents",
138-
"description": "Detect bad user-agents",
139-
"references": []
140-
},
141-
{
142-
"name": "crowdsecurity/suricata-major-severity",
143-
"label": "Suricata Severity 1 Event",
144-
"description": "Detect exploit attempts via emerging threat rules",
145-
"references": []
146-
},
147-
{
148-
"name": "crowdsecurity/modsecurity",
149-
"label": "Modsecurity Alert",
150-
"description": "Web exploitation via modsecurity",
151-
"references": []
152-
}
153-
],
154-
"target_countries": {
155-
"AT": 0,
156-
"AU": 2,
157-
"BR": 0,
158-
"CA": 4,
159-
"CH": 0,
160-
"CN": 0,
161-
"DE": 79,
162-
"DK": 0,
163-
"ES": 0,
164-
"FI": 12
165-
},
166-
"background_noise_score": 10,
167-
"mitre_techniques": [
168-
{
169-
"name": "T1595",
170-
"label": "Active Scanning",
171-
"description": "Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction.\n\nAdversaries may perform different forms of active scanning depending on what information they seek to gather. These scans can also be performed in various ways, including using native features of network protocols such as ICMP.(Citation: Botnet Scan)(Citation: OWASP Fingerprinting) Information from these scans may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133) or [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190))."
172-
},
173-
{
174-
"name": "T1110",
175-
"label": "Brute Force",
176-
"description": "Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained. Without knowledge of the password for an account or set of accounts, an adversary may systematically guess the password using a repetitive or iterative mechanism. Brute forcing passwords can take place via interaction with a service that will check the validity of those credentials or offline against previously acquired credential data, such as password hashes.\n\nBrute forcing credentials may take place at various points during a breach. For example, adversaries may attempt to brute force access to [Valid Accounts](https://attack.mitre.org/techniques/T1078) within a victim environment leveraging knowledge gathered from other post-compromise behaviors such as [OS Credential Dumping](https://attack.mitre.org/techniques/T1003), [Account Discovery](https://attack.mitre.org/techniques/T1087), or [Password Policy Discovery](https://attack.mitre.org/techniques/T1201). Adversaries may also combine brute forcing activity with behaviors such as [External Remote Services](https://attack.mitre.org/techniques/T1133) as part of Initial Access."
177-
},
178-
{
179-
"name": "T1190",
180-
"label": "Exploit Public-Facing Application",
181-
"description": "Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network. The weakness in the system can be a software bug, a temporary glitch, or a misconfiguration.\n\nExploited applications are often websites/web servers, but can also include databases (like SQL), standard services (like SMB or SSH), network device administration and management protocols (like SNMP and Smart Install), and any other system with Internet accessible open sockets.(Citation: NVD CVE-2016-6662)(Citation: CIS Multiple SMB Vulnerabilities)(Citation: US-CERT TA18-106A Network Infrastructure Devices 2018)(Citation: Cisco Blog Legacy Device Attacks)(Citation: NVD CVE-2014-7169) Depending on the flaw being exploited this may also involve [Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211). \n\nIf an application is hosted on cloud-based infrastructure and/or is containerized, then exploiting it may lead to compromise of the underlying instance or container. This can allow an adversary a path to access the cloud or container APIs, exploit container host access via [Escape to Host](https://attack.mitre.org/techniques/T1611), or take advantage of weak identity and access management policies.\n\nAdversaries may also exploit edge network infrastructure and related appliances, specifically targeting devices that do not support robust host-based defenses.(Citation: Mandiant Fortinet Zero Day)(Citation: Wired Russia Cyberwar)\n\nFor websites and databases, the OWASP top 10 and CWE top 25 highlight the most common web-based vulnerabilities.(Citation: OWASP Top 10)(Citation: CWE top 25)"
182-
}
183-
],
184-
"cves": [],
185-
"scores": {
186-
"overall": {
187-
"aggressiveness": 5,
188-
"threat": 2,
189-
"trust": 4,
190-
"anomaly": 0,
191-
"total": 4
192-
},
193-
"last_day": {
194-
"aggressiveness": 0,
195-
"threat": 0,
196-
"trust": 0,
197-
"anomaly": 0,
198-
"total": 0
199-
},
200-
"last_week": {
201-
"aggressiveness": 5,
202-
"threat": 2,
203-
"trust": 4,
204-
"anomaly": 0,
205-
"total": 4
206-
},
207-
"last_month": {
208-
"aggressiveness": 5,
209-
"threat": 2,
210-
"trust": 4,
211-
"anomaly": 0,
212-
"total": 4
213-
}
214-
},
215-
"references": []
216-
}
217-
218-
```
219-
220-
</details>
221-
222-
### ipdex
223-
224-
You can interact with the CrowdSec CTI API with the [`ipdex`](https://github.com/crowdsecurity/ipdex) tool.
225-
226-
First, initiliaze the tool with your API key:
227-
228-
```console
229-
ipdex init
230-
```
231-
232-
And then analyze an IP or a file of IPs:
233-
234-
```console
235-
ipdex 193.105.134.155
236-
```
237-
238-
<details>
239-
240-
<summary>Command Output</summary>
241-
242-
```console
243-
IP Information
244-
245-
IP 193.105.134.155
246-
Reputation malicious
247-
Confidence high
248-
Country SE 🇸🇪
249-
Autonomous System w1n ltd
250-
Reverse DNS N/A
251-
Range 193.105.134.0/24
252-
First Seen 2023-06-23T01:15:00
253-
Last Seen 2025-05-11T11:15:00
254-
Console URL https://app.crowdsec.net/cti/193.105.134.155
255-
Last Local Refresh 2025-05-12 16:44:21
256-
257-
Threat Information
258-
259-
Behaviors
260-
HTTP Scan
261-
HTTP Bruteforce
262-
SSH Bruteforce
263-
... and 2 more
264-
265-
266-
Classifications
267-
Spoofed User Agent
268-
TOR exit node
269-
VPN or Proxy
270-
... and 1 more
271-
272-
273-
Blocklists
274-
Extended AI-Detected VPN/Proxy
275-
CrowdSec Intelligence Blocklist
276-
277-
Target countries
278-
🇺🇸 US 29%
279-
🇩🇪 DE 15%
280-
🇵🇱 PL 12%
281-
... and 2 more
282-
```
283-
</details>
28456

28557
<AcademyPromo
28658
image="crowdsec_threat_intelligence.svg"

crowdsec-docs/unversioned/console/ip_reputation/api_keys_premium.mdx

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,15 @@ title: Premium CTI API Keys
44
sidebar_position: 2
55
---
66

7-
// Premium plan come with increased quotas on its free CTI KEY
8-
// also allow oyu to buy bigger quotas CTI API Keys if needed
7+
A [Premium Plan](/u/console/premium_upgrade) unlocks two benefits for CTI API access:
98

10-
...
9+
- **Increased free quota** — the complimentary CTI key included with every account has a higher weekly allowance on a Premium plan than on the free Community plan.
10+
- **Purchasable high-quota keys** — Premium organizations can buy additional CTI API keys with larger monthly quotas (5K, 25K, or 100K queries/month) to support production integrations, automated enrichment pipelines, and high-volume use cases.
11+
12+
For current quota tiers and pricing, go to **Settings → CTI API Keys** in the Console and click **+ New Key** — all available options and their costs are shown there.
13+
14+
:::warning CTI API Keys and trials
15+
- Purchasing a CTI API Key does **not** grant access to a Premium Plan trial.
16+
- Purchasing a CTI API Key while a trial is active will **immediately end the trial**.
17+
- Cancelled CTI API Keys are **non-refundable** and will not be prorated — the full price remains due regardless of when the cancellation occurs.
18+
:::

crowdsec-docs/unversioned/cti_api/api_integration/integration_intro.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,16 @@ id: integration_intro
33
title: Integrations
44
---
55

6+
CrowdSec has developed native integrations for the most common security platforms so you can enrich your workflows with IP reputation data without writing any code. If your platform isn't listed, the API is a standard REST interface — you can query it directly with cURL, write your own scripts, or build custom playbooks in any SIEM, SOAR, or TIP that supports HTTP enrichment:
7+
8+
```shell
9+
curl -H "x-api-key: $API_KEY" https://cti.api.crowdsec.net/v2/smoke/1.2.3.4 | jq .
10+
```
11+
12+
For the full API reference, see the [Swagger documentation](https://crowdsecurity.github.io/cti-api/).
13+
14+
---
15+
616
| Integration | Description |
717
|---------------------------|----------------------------------------|
818
| [Chrome](/cti_api/api_integration/integration_browser_chrome.md) | A Chrome extension which allows you to quickly search an IP on a web page |

crowdsec-docs/unversioned/cti_api/api_integration/integration_ipdex.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -4,27 +4,34 @@ title: IPDEX
44
sidebar_position: 1
55
---
66

7-
`ipdex` is a simple CLI tool developed by CrowdSec to gather insight about a list of IPs or an IP using the CrowdSec CTI (Cyber Threat Intelligence) API.
7+
`ipdex` is a tool developed by CrowdSec to investigate IP reputation using the CrowdSec CTI API. It is available as a **web application** and a **CLI**, and is particularly useful as a Proof of Value tool to assess CrowdSec's threat intelligence coverage across both blocklists and threat intel data.
88

9-
[Official IPDEX Repository](https://github.com/crowdsecurity/ipdex)
9+
## Web UI
1010

11-
## Installation
11+
The [ipdex web app](https://ipdex.crowdsec.net/) lets you upload a list of IPs or a log file and instantly get a reputation report — no installation required.
1212

13-
You can check the [install guide on ipdex repository](https://github.com/crowdsecurity/ipdex?tab=readme-ov-file#1-install).
13+
![ipdex web UI](/img/ipdex_demo.png)
1414

15+
For full usage documentation, see [ipdex.crowdsec.net/docs](https://ipdex.crowdsec.net/docs).
1516

16-
## Usage
17+
## CLI
1718

18-
You can check the [user guide on ipdex repository](https://github.com/crowdsecurity/ipdex?tab=readme-ov-file#user-guide).
19+
The CLI version is available for local use and automation. It connects to the CTI API using your API key.
1920

20-
Here are some screenshot to demonstrate ipdex user experience.
21+
[Official ipdex repository](https://github.com/crowdsecurity/ipdex)
2122

22-
### Analyzing an IP address
23+
### Installation
2324

24-
![IP Analyses](/img/ipdex/ipdex_ip.png)
25+
See the [install guide](https://github.com/crowdsecurity/ipdex?tab=readme-ov-file#1-install) on the ipdex repository.
2526

27+
### Usage
2628

27-
### Analyzing a log file
29+
See the [user guide](https://github.com/crowdsecurity/ipdex?tab=readme-ov-file#user-guide) on the ipdex repository.
2830

31+
#### Analyzing an IP address
2932

30-
![Log File Analyses](/img/ipdex/ipdex_log_file.png)
33+
![IP Analysis](/img/ipdex/ipdex_ip.png)
34+
35+
#### Analyzing a log file
36+
37+
![Log File Analysis](/img/ipdex/ipdex_log_file.png)

0 commit comments

Comments
 (0)