Threat Feed API

This document describes all supported modes under the Threat Feed API endpoint, including Darkweb Chatters, Public News, and Taxonomy queries.


📡 API Endpoint

POST https://api.whiteintel.io/get_threat_feeds.php

All modes use the same endpoint. The behavior is controlled with the mode parameter.


🔑 Authentication

Field
Type
Required
Description

apikey

string

yes

Must belong to Enterprise or Threat Intelligence tiers and have Threat Feed enabled


🧭 Available Modes

Mode
Description

darkweb_chatters (default)

Retrieves darkweb chatter intelligence (forums, Telegram groups, marketplaces, leak channels)

public_news

Retrieves cybersecurity news aggregated from trusted OSINT sources

taxonomy

Returns available categories, industries, or networks with item counts

If mode is omitted, the endpoint defaults to darkweb_chatters.


---------------------------------------------------------

1) DARKWEB CHATTERS MODE (DEFAULT)

---------------------------------------------------------

This mode returns intelligence collected from darkweb marketplaces, Telegram groups, underground forums, and leak channels.

Example Request


Filtering Options

Field
Type
Description

category (optional)

string or string[] (max 2)

Filters by threat category

industry (optional)

string or string[] (max 2)

Filters by victim industry

network (optional)

string or string[]

Networks like darkweb, telegram

search (optional)

string

Minimum 4 characters. Searches title/content & domain fields

start_date

string

Format: YYYY-MM-DD

end_date

string

Format: YYYY-MM-DD

page

integer

Pagination page number

limit

integer

Between 1–100


Response Example


---------------------------------------------------------

2) PUBLIC NEWS MODE

---------------------------------------------------------

The Public News API provides structured and AI-enhanced cybersecurity news aggregated from authoritative OSINT sources.

Enable by using:


Example Request


Features

🔎 Search Highlights

Searches text across:

  • title

  • summary

  • ai_summary

Supports multi-word queries.

📆 Date Filters

Both start_date and end_date are optional.

📄 Pagination

Uses the same pagination behavior as the main threat feed.


Response Example


---------------------------------------------------------

3) TAXONOMY MODE

---------------------------------------------------------

Returns available values for categories, industries, or networks with post counts. Useful for building dashboards and UI dropdowns.

Example Request


Supported Taxonomies

Taxonomy
Description

categories

Threat categories such as ransomware, credential leaks, data leaks

industries

Victim sectors (Finance, Education, Manufacturing, etc.)

networks

Data sources (darkweb, telegram, clearnet)


Example Response


🔧 Shared Error Responses

Missing / invalid API key

Insufficient tier

Threat Feed disabled

Search too short

Rate limit hit


⏱ Threat Feed Quotas

Rule
Description

Daily limits enforced

Based on threat_feed_daily_limit

Every request decrements quota

Even empty results

5-second burst limiter

Prevents rapid-fire calls

Response includes remaining quota

remaining_threat_feed_calls


🧪 Quick Test (cURL)


📘 Summary

Mode
Best For

darkweb_chatters

Darkweb activity, Telegram leaks, threat actor behavior

public_news

Cybersecurity news aggregation + AI summaries

taxonomy

Building analytics dashboards or UI filters

All modes share authentication, quota rules, and rate limits.


Last updated