Skip to main content

URL Intel | Python SDK

The URL Intel service allows you to retrieve intelligence about known URLs, giving you insight into the reputation of a URL.

Initializes a new Pangea service client.

UrlIntel(token, config, logger_name)

required parameters

str

Pangea API token.

optional parameters

PangeaConfig | None

Configuration.

str

Logger name.

download-file

UrlIntel.download_file()

Poll result

UrlIntel.poll_result(exception)

Returns request's result that has been accepted by the server

optional parameters

Optional[AcceptedRequestException]

Exception that was previously raised by the SDK on a call that is being processed.

Response Object

PangeaResponse

response = service.poll_result(exception)

Reputation

UrlIntel.reputation(url, verbose, raw, provider)

Retrieve a reputation score for a URL from a provider, including an optional detailed report.

required parameters

str

The URL to be looked up

optional parameters

bool

Echo the API parameters in the response

bool

Include raw data from this provider

str

Use reputation data from this provider: "crowdstrike"

Response Object

A PangeaResponse where the sanctioned source(s) are in the response.result field. Available response fields can be found in our API documentation

response = url_intel.reputation(
    url="http://113.235.101.11:54384",
    provider="crowdstrike",
)

Reputation V2

UrlIntel.reputation_bulk(urls, verbose, raw, provider)

Retrieve reputation scores for a list of URLs from a provider, including an optional detailed report.

required parameters

List[str]

The URL list to be looked up

optional parameters

bool

Echo the API parameters in the response

bool

Include raw data from this provider

str

Use reputation data from this provider: "crowdstrike"

Response Object

A PangeaResponse where the sanctioned source(s) are in the response.result field. Available response fields can be found in our API documentation

response = url_intel.reputation_bulk(
    urls=["http://113.235.101.11:54384"],
    provider="crowdstrike",
)