GET: Malware Servers Finding Details Ingrid https://api.bitsighttech.com/ratings/v1/companies/company_guid/findings?risk_vector=malware_servers Get an organization’s Malware Servers finding details. Parameters For details specific to Malware Server, use the ?risk_vector=malware_servers parameter. Other query parameters are listed in GET: Finding Details. Example Request curl https://api.bitsighttech.com/ratings/v1/companies/a940bb61-33c4-42c9-9231-c8194c305db3/findings?risk_vector=malware_servers -u api_token: Example Response "server_name":"exampledomain.us", "portal_type":"Malicious", Response Attributes Field Description server_name String The domain name of the affected server. It is known to be a command and control server, sinkhole, or is hosting adware. Example: exampledomain.us portal_type String The type of event. Values: Malicious = The event involves a malicious server. Malware = The event involves specific malware. April 6, 2022: Published. Related articles Malware Server Findings GET: Finding Details GET: Unsolicited Communications Finding Details Configuring OneTrust GET: Potentially Exploited Finding Details Feedback 0 comments Please sign in to leave a comment.