The Ransomware.live API provides a robust interface to access data on ransomware activities, including recent posts, ransomware groups, cyberattacks, and more. Below, you’ll find instructions on how to use the API to access various types of intel, complete with endpoint details and example requests.
curl
, Postman, or a suitable programming library like
requests
for Python.https://api.ransomware.live/v2
https://www.ransomware.live/v2
GET /info
curl -X GET "https://api.ransomware.live/v2/info" -H "Accept: application/json"
GET /recentvictims
curl -X GET "https://api.ransomware.live/v2/recentvictims" -H "Accept: application/json"
GET /group/<group_name>
curl -X GET "https://api.ransomware.live/v2/group/conti" -H "Accept: application/json"
GET /groups
curl -X GET "https://api.ransomware.live/v2/groups" -H "Accept: application/json"
GET /allcyberattacks
curl -X GET "https://api.ransomware.live/v2/allcyberattacks" -H "Accept: application/json"
GET /groupvictims/<group_name>
curl -X GET "https://api.ransomware.live/v2/groupvictims/revil" -H "Accept: application/json"
GET /searchvictims/<keyword>
curl -X GET "https://api.ransomware.live/v2/searchvictims/bank" -H "Accept: application/json"
GET /countrycyberattacks/<country_code>
curl -X GET "https://api.ransomware.live/v2/countrycyberattacks/FR" -H "Accept: application/json"
GET /countryvictims/<country_code>
curl -X GET "https://api.ransomware.live/v2/countryvictims/US" -H "Accept: application/json"
GET /victims/<year>
or /victims/<year>/<month>
curl -X GET "https://api.ransomware.live/v2/victims/2024/01" -H "Accept: application/json"
GET /sectorvictims/<sector>
or /sectorvictims/<sector>/<countrycode>
curl -X GET "https://api.ransomware.live/v2/sectorvictims/healthcare" -H "Accept: application/json"
GET /certs/<country_code>
curl -X GET "https://api.ransomware.live/v2/certs/DE" -H "Accept: application/json"
The API returns standard HTTP status codes:
For issues, please contact the maintainer or visit Ransomware.live.
Using the Ransomware.live API, you can gain access to critical ransomware intelligence quickly and efficiently. Ensure to handle your API requests responsibly, respecting rate limits and properly securing any sensitive data. For more information, refer to the official API documentation.