Data Intelligence APIs
Query FullHunt's internet-scale database for hosts, domains, products, technologies, threat intelligence, and historical data to power security automation, threat hunting, and investigations at scale.
curl "https://fullhunt.io/api/v1/global/search" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx" \
-d '{"country": "GB", "product": "Citrix-NetScaler"}'
What You Can Query
Access internet-scale security data programmatically. Query by host, domain, IP, ASN, product, technology, tag, or pattern. Combine passive attributes with real-time threat intelligence. Responses are simple, consistent JSON designed for pipelines and automation.
API Categories
Data Intelligence APIs
Host Details
Get complete details about any host including ASN, DNS, organization, and IP.
GET /api/v1/intel/host
Tag Search
Find all hosts with specific tags (ssh, rdp, vnc, etc.).
GET /api/v1/intel/tag
Web Technology
Query hosts running specific web technologies (HTTP/3, nginx, etc.).
GET /api/v1/intel/web-tech
Product Search
Find hosts running specific products (Citrix-NetScaler, Apache, etc.).
GET /api/v1/intel/product
Domain Enumeration
Get all subdomains associated with a given domain.
GET /api/v1/intel/domain
IP to Hosts
Discover all hostnames pointing to a specific IP address.
GET /api/v1/intel/ip-to-hosts
ASN Queries
Get hosts and virtual hosts within an Autonomous System Number.
GET /api/v1/intel/asn-to-hosts
IP Range Search
Find all hosts within a specified IP address range.
GET /api/v1/intel/ip-range-to-hosts
DNS MX/NS Queries
Find hosts sharing the same DNS MX or NS records.
GET /api/v1/intel/dns-mx-to-hosts
Nexus Threat Intelligence APIs
Tor IP Lookup
Check if IP addresses are Tor exit nodes with first-seen dates.
GET /api/v1/nexus/tor/check-ip
Cloud TLS Certificates
Query cloud certificate information and DNS associations for discovery.
GET /api/v1/nexus/cloud-certs/dns-search
Passive DNS
Historical passive DNS data for tracking domain infrastructure evolution.
GET /api/v1/nexus/passive-dns/lookup
Domain Collection
Company information, social media profiles, and digital presence data.
GET /api/v1/nexus/domain-collection/lookup
IP Intelligence
Comprehensive IP address intelligence and geolocation metadata.
GET /api/v1/nexus/ip-lookup
API Use Cases with Examples
Threat Hunting
Search for vulnerable products worldwide. Find all instances of specific software to assess exposure.
Example: Find all Citrix NetScaler instances in the UK
curl "https://fullhunt.io/api/v1/intel/product?product=Citrix-NetScaler" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx"
Subdomain Discovery
Enumerate all subdomains for a domain to discover shadow IT and forgotten infrastructure.
Example: Get all kaspersky.com subdomains
curl "https://fullhunt.io/api/v1/intel/domain?domain=kaspersky.com" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx"
Historical DNS Data
Query historical passive DNS records to track infrastructure evolution and discover old subdomains.
Example: Get historical DNS for kaspersky.com
curl "https://fullhunt.io/api/v1/nexus/passive-dns/lookup?domain=kaspersky.com" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx"
Tor IP Detection
Check if IP addresses are associated with Tor exit nodes for threat intelligence and network monitoring.
Example: Check if an IP is a Tor exit node
curl "https://fullhunt.io/api/v1/nexus/tor/check-ip?ip=100.8.8.137" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx"
Company Intelligence
Get comprehensive company information including social media profiles, descriptions, and digital presence.
Example: Look up company information by domain
curl "https://fullhunt.io/api/v1/nexus/domain-collection/lookup?domain=kaspersky.com" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx"
Cloud Asset Discovery
Discover cloud infrastructure through TLS certificate DNS associations across AWS, Azure, and GCP.
Example: Search cloud certificates by DNS name
curl "https://fullhunt.io/api/v1/nexus/cloud-certs/dns-search?query=kaspersky" \
-H "X-API-KEY: xxxx-xxxx-xxxx-xxxxxx"
Common Integration Patterns
Ticket Enrichment
Automatically enrich security tickets in Jira or ServiceNow with host details, technology stacks, and vulnerability context.
SIEM/SOAR Automation
Power SOAR playbooks with real-time asset data, build custom detections, and automate threat response.
Vendor Risk Assessment
Assess third-party vendor security posture programmatically for TPRM and due diligence programs.
Incident Response
Rapidly map infrastructure, correlate IOCs, and assess blast radius during security incidents.
Data Lakes & Analytics
Feed attack surface data into data lakes for analytics, correlation, and security posture reporting.
Compliance Reporting
Generate automated asset inventories and security posture reports for compliance and audits.
API Features & Benefits
High Performance & Scale
Optimized for enterprise workloads. Query millions of hosts across the internet instantly with high-performance infrastructure.
RESTful & Consistent
Clean REST API design with consistent JSON responses. Easy to integrate into any language or platform.
Comprehensive Documentation
Full documentation with code examples in multiple languages, integration guides, and best practices.
Real-Time Data
Database updates continuously as FullHunt scans the internet. Get the freshest attack surface data available.
Power your security operations with FullHunt APIs
Access internet-scale intelligence to enrich investigations, automate threat hunting, and strengthen your security posture.