Threat Feed API
This document describes all supported modes under the Threat Feed API endpoint, including Darkweb Chatters, Public News, and Taxonomy queries.
This API endpoint is an add on priced at 3000 USD / year.
📡 API Endpoint
POST https://api.whiteintel.io/get_threat_feeds.phpAll modes use the same endpoint. The behavior is controlled with the mode parameter.
🔑 Authentication
apikey
string
yes
Must belong to Enterprise or Threat Intelligence tiers and have Threat Feed enabled
🧭 Available Modes
darkweb_chatters (default)
Retrieves darkweb chatter intelligence (forums, Telegram groups, marketplaces, leak channels)
public_news
Retrieves cybersecurity news aggregated from trusted OSINT sources
taxonomy
Returns available categories, industries, or networks with item counts
If mode is omitted, the endpoint defaults to darkweb_chatters.
---------------------------------------------------------
1) DARKWEB CHATTERS MODE (DEFAULT)
---------------------------------------------------------
This mode returns intelligence collected from darkweb marketplaces, Telegram groups, underground forums, and leak channels.
Example Request
Filtering Options
category (optional)
string or string[] (max 2)
Filters by threat category
industry (optional)
string or string[] (max 2)
Filters by victim industry
network (optional)
string or string[]
Networks like darkweb, telegram
search (optional)
string
Minimum 4 characters. Searches title/content & domain fields
start_date
string
Format: YYYY-MM-DD
end_date
string
Format: YYYY-MM-DD
page
integer
Pagination page number
limit
integer
Between 1–100
Response Example
---------------------------------------------------------
2) PUBLIC NEWS MODE
---------------------------------------------------------
The Public News API provides structured and AI-enhanced cybersecurity news aggregated from authoritative OSINT sources.
Enable by using:
Example Request
Features
🔎 Search Highlights
Searches text across:
title
summary
ai_summary
Supports multi-word queries.
📆 Date Filters
Both start_date and end_date are optional.
📄 Pagination
Uses the same pagination behavior as the main threat feed.
Response Example
---------------------------------------------------------
3) TAXONOMY MODE
---------------------------------------------------------
Returns available values for categories, industries, or networks with post counts. Useful for building dashboards and UI dropdowns.
Example Request
Supported Taxonomies
categories
Threat categories such as ransomware, credential leaks, data leaks
industries
Victim sectors (Finance, Education, Manufacturing, etc.)
networks
Data sources (darkweb, telegram, clearnet)
Example Response
🔧 Shared Error Responses
Missing / invalid API key
Insufficient tier
Threat Feed disabled
Search too short
Rate limit hit
⏱ Threat Feed Quotas
Daily limits enforced
Based on threat_feed_daily_limit
Every request decrements quota
Even empty results
5-second burst limiter
Prevents rapid-fire calls
Response includes remaining quota
remaining_threat_feed_calls
🧪 Quick Test (cURL)
📘 Summary
darkweb_chatters
Darkweb activity, Telegram leaks, threat actor behavior
public_news
Cybersecurity news aggregation + AI summaries
taxonomy
Building analytics dashboards or UI filters
All modes share authentication, quota rules, and rate limits.
Last updated