Skip to main content

Threat Detection

Arxignis provides comprehensive threat detection capabilities that identify and analyze security threats in real-time using threat intelligence data and IP analysis.

Overview

Our threat detection system provides:

  • IP-based threat analysis - Real-time threat scoring for IP addresses
  • Threat intelligence integration - Access to comprehensive threat databases
  • Geographic context - Country and ASN information for threat context
  • Caching and performance - Optimized for high-throughput analysis

API Endpoint

Threat Analysis by IP

Analyze an IP address for threat intelligence and risk assessment.

GET /v1/threat?ip=57.141.0.51

Parameters:

  • ip (query, required): IP address to analyze (IPv4 or IPv6)

Example Request:

curl -H "Authorization: Bearer YOUR_API_KEY" \
"https://api.arxignis.com/v1/threat?ip=57.141.0.51"

Response Format

Successful Analysis

{
"schema_version": "1.0",
"tenant_id": "public",
"ip": "57.141.0.51",
"intel": {
"score": 85,
"confidence": 0.85,
"score_version": "2025-09-01",
"categories": ["malware", "botnet", "suspicious"],
"tags": ["default"],
"first_seen": "2024-01-15T10:30:00Z",
"last_seen": "2024-12-01T14:22:00Z",
"source_count": 3,
"reason_code": "MALWARE_DETECTED",
"reason_summary": "IP associated with malware distribution",
"rule_id": "malware_rule_001"
},
"context": {
"asn": 64500,
"org": "Example ISP",
"ip_version": 4,
"geo": {
"country": "US"
}
},
"advice": "block",
"ttls": 3600,
"generated_at": "2024-12-01T15:30:00Z"
}

No Threat Data Found

{
"schema_version": "1.0",
"tenant_id": "public",
"ip": "8.8.8.8",
"intel": {
"score": 0,
"confidence": 0.0,
"score_version": "2025-09-01",
"categories": [],
"tags": [],
"first_seen": "",
"last_seen": "",
"source_count": 0,
"reason_code": "NO_DATA",
"reason_summary": "No threat data available",
"rule_id": "none"
},
"context": {
"asn": 15169,
"org": "Google LLC",
"ip_version": 4,
"geo": {
"country": "US"
}
},
"advice": "allow",
"ttls": 60,
"generated_at": "2024-12-01T15:30:00Z"
}

Response Fields

Intel Section

FieldTypeDescription
scoreintegerThreat score (0-100)
confidencefloatConfidence level (0.0-1.0)
score_versionstringVersion of scoring algorithm
categoriesarrayThreat categories (malware, botnet, etc.)
tagsarrayAdditional threat tags
first_seenstringFirst time this IP was seen (RFC3339)
last_seenstringLast time this IP was seen (RFC3339)
source_countintegerNumber of threat intelligence sources
reason_codestringMachine-readable reason code
reason_summarystringHuman-readable reason description
rule_idstringID of the rule that triggered the detection

Context Section

FieldTypeDescription
asnintegerAutonomous System Number
orgstringOrganization name
ip_versionintegerIP version (4 or 6)
geo.countrystringCountry code (ISO 3166-1 alpha-2)

Action Fields

FieldTypeDescription
advicestringRecommended action: "allow", "block", "challenge"
ttlsintegerTime to live in seconds
generated_atstringResponse generation timestamp (RFC3339)

Threat Categories

Common threat categories returned in the categories field:

  • malware - Malware distribution or command & control
  • botnet - Botnet participation
  • suspicious - Suspicious activity patterns
  • phishing - Phishing infrastructure
  • spam - Spam source
  • scanner - Port scanning activity
  • proxy - Open proxy or VPN
  • tor - Tor exit node

Response Actions

Allow

{
"advice": "allow",
"ttls": 60
}

No action required, allow the request to proceed.

Block

{
"advice": "block",
"ttls": 3600
}

Block the IP address for the specified TTL period.

Challenge

{
"advice": "challenge",
"ttls": 300
}

Present a challenge (CAPTCHA) to verify the request.

Error Responses

400 Bad Request - Missing IP

{
"success": false,
"error": "Missing IP address parameter",
"details": {
"required_param": "ip",
"example": "/v1/threat?ip=192.168.1.1"
}
}

400 Bad Request - Invalid IP Format

{
"success": false,
"error": "Invalid IP address format",
"details": {
"ip": "invalid-ip",
"parse_error": "invalid IP address format"
}
}

405 Method Not Allowed

{
"success": false,
"error": "Method not allowed",
"details": {
"method": "POST",
"allowed_methods": ["GET"]
}
}

Performance Considerations

  • Response time: Typically < 100ms for cached results
  • Rate limiting: Subject to API rate limits
  • Caching: Results are cached to improve performance
  • Memory optimization: Uses in-memory cache for frequent lookups

Best Practices

  • Cache responses - Threat data doesn't change frequently - 5-10 minutes
  • Handle errors gracefully - Default to allow on API errors
  • Monitor performance - Track response times and cache hit rates
  • Use appropriate TTLs - Respect the ttls field for caching
  • Log decisions - Record threat analysis results for auditing