Malcore: Simple File Analysis
  • Malcore API docs
  • Packer Checking
  • Deep Static Analysis
  • PCAP diffing
  • Gather sections
  • Shellcode Emulation
  • Executable File Analysis
  • Binary Diffing
  • Script Analysis
  • Ransom Note Comparison
  • PCAP Analysis
  • Snort Rule Generation
  • Hash Checksum
  • Strings
  • Imports and Exports
  • Status Check
  • Yara Rule Scanning
  • Parse Exif Data
  • Domain Analysis
  • Threat Score
  • Execute From URL
  • Document File Analysis
  • URL Checking
  • Browser Extension Analysis
  • Android Permission Lookup
  • AndroidManifest Parsing
  • Phone Application Analysis
  • Dynamic Analysis
  • Threat Feed
  • AI Classifier
  • Scan Results Manipulation
Powered by GitBook
On this page
  • [ POST ] https://api.malcore.io/api/domain
  • Query Params
  • Headers
  • Request
  • Response

Domain Analysis

[ POST ] https://api.malcore.io/api/domain

Gather readable strings out of a file


Query Params

  • domain string The domain to analyze

Headers

  • apiKey string

  • X-No-Poll string


Request

curl -X POST https://api.malcore.io/api/domain \
	-H "apiKey: MY-API-KEY" \
	-H "X-No-Poll: true" \
  --data "domain=query.com" \

Response

🟢 200

{
  "results": {
    "dns_info": {
      "domains": [
        [
          "query.com",
          {
            "determined_ip_addresses": [
              "","","",...
            ],
            "subdomains": [
              "","","",...
            ]
          }
        ]
      ]
    },
    "intel_report": {
      "files_mentioned_in": [
        "","","","",...
      ],
      "mentioned_at": [
        "","","","",...
      ]
    },
    "misc_info": {
      "recon_request": {
        "headers": [
          {}, {}, {}
        ],
        "status_code": 200,
        "scripts": [
          "", "", ""
        ],
        "title": "..."
      }
    }
  }
}

🔴 400

{}
PreviousParse Exif DataNextThreat Score

Last updated 12 months ago