PLEASE NOTE: you are currently using an anonymous connection (VPN, Proxy, etc.) and our general conditions of use prohibit this use. The site is currently read-only. For more information, please see this page.
CRDF Threat Center API
The CRDF Threat Center offers an API allowing you to perform actions to integrate them into your programs. To use it, you must obtain an API key and consult the documentation.
Please note that in order to avoid abuse, the number of requests made in a day is limited. Please refer to the documentation for information on these limitations.
PLEASE READ THIS CAREFULLY BEFORE MAKING A REQUEST PLEASE NOTE: we would like to point out that access to public data and our API does not allow you to freely access data from the private CRDF Threat Center. If you wish to access CRDF Threat Center private data, please send a request by following the procedure included in our FAQ. If you are interested in our public data and our public feed, please read this carefully before you start (the data is not directly accessible, it is hashed).
For the description of your integration, please be precise and explicit. We systematically refuse all incomplete requests. Please also explain to us how you will use our data and give us as much information as possible.
Thank you for your trust
Form to get an API Key
Please fill out this form to obtain an API key and use it. In order to receive the API key, you must enter an email address as it will be sent to you. Any false information in this form will result in the deletion of your API key.
Warning: the creation of your API key is subject to manual validation by the CRDF Labs laboratory. This validation can take 24 hours.