GET /radar/email/security/top/tlds/malicious/{malicious}
Retrieves the top TLDs by emails classified as malicious or not.
Servers
- https://api.cloudflare.com/client/v4
Path parameters
Name | Type | Required | Description |
---|---|---|---|
malicious |
String | Yes |
Malicious classification. Possible values:
|
Query parameters
Name | Type | Required | Description |
---|---|---|---|
limit |
Integer | No |
Limits the number of objects returned in the response. |
name[] |
Array | No |
Array of names used to label the series in the response. |
format |
String | No |
Format in which results will be returned. Possible values:
|
dateEnd[] |
Array | No |
End of the date range (inclusive). |
arc[] |
Array | No |
Filters results by ARC (Authenticated Received Chain) validation. |
dateStart[] |
Array | No |
Start of the date range. |
tlsVersion[] |
Array | No |
Filters results by TLS version. |
dmarc[] |
Array | No |
Filters results by DMARC (Domain-based Message Authentication, Reporting and Conformance) validation status. |
tldCategory |
String | No |
Filters results by TLD category. Possible values:
|
dateRange[] |
Array | No |
Filters results by date range. For example, use |
dkim[] |
Array | No |
Filters results by DKIM (DomainKeys Identified Mail) validation status. |
spf[] |
Array | No |
Filters results by SPF (Sender Policy Framework) validation status. |
How to start integrating
- Add HTTP Task to your workflow definition.
- Search for the API you want to integrate with and click on the name.
- This loads the API reference documentation and prepares the Http request settings.
- Click Test request to test run your request to the API and see the API's response.