The Feeds API provides daily batches of Cyber Threat Intelligence (CTI) information, including ransomware victims, detected Telegram channels, and cryptocurrency wallet addresses. These feeds are designed for continuous monitoring and integration with security systems.
GET /api/v2/feed/ransomware 
Daily feed of ransomware victims detected by Vysion. This feed provides structured information about companies that have been targeted by ransomware groups.
Name Type Required Description batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page 
 
   curl   " https://api.vysion.ai/api/v2/feed/ransomware?batch=2024-08-01 "   \ 
   --header   ' Accept: application/json '   \ 
   --header   ' x-api-key: YOUR_API_KEY ' 
     ' Accept ' :  ' application/json ' , 
   ' x-api-key ' :  ' YOUR_API_KEY ' 
r  =  requests. get ( ' https://api.vysion.ai/api/v2/feed/ransomware ' ,   params = { 
      
         "id" :  " ransomware_123456 " , 
         "companyName" :  " TechCorp Solutions " , 
         "companyLink" :  " https://techcorp.example.com " , 
         "url" :  " https://darkweb-site.onion/victims/techcorp " , 
         "ransomwareGroup" :  " lockbit " , 
         "detectionDate" :  " 2024-08-01T14:30:22Z " , 
         "text" :  " TechCorp Solutions - Manufacturing company based in Germany. 500GB of confidential data including customer information, financial records... " , 
         "industry" :  " Manufacturing " 
         "id" :  " ransomware_123457 " , 
         "companyName" :  " MedicalCenter Plus " , 
         "companyLink" :  " https://medcenter.example.com " , 
         "url" :  " https://darkweb-site.onion/victims/medcenter " , 
         "ransomwareGroup" :  " alphv " , 
         "detectionDate" :  " 2024-08-01T16:45:12Z " , 
         "text" :  " MedicalCenter Plus - Healthcare provider compromised. Patient records and medical data exposed... " , 
GET /api/v2/feed/telegram 
Daily feed of detected Telegram channels identified by Vysion. This feed helps monitor new threat actor communications and malicious channels.
Name Type Required Description batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page 
 
   curl   " https://api.vysion.ai/api/v2/feed/telegram?batch=2024-08-01 "   \ 
   --header   ' Accept: application/json '   \ 
   --header   ' x-api-key: YOUR_API_KEY ' 
     ' Accept ' :  ' application/json ' , 
   ' x-api-key ' :  ' YOUR_API_KEY ' 
r  =  requests. get ( ' https://api.vysion.ai/api/v2/feed/telegram ' ,   params = { 
      
         "id" :  " telegram_feed_123456 " , 
           " t.me/suspicious_channel_001 " , 
         "detectionDate" :  " 2024-08-01T12:15:30Z " , 
         "url" :  " https://suspicious-site.onion/telegram-links " , 
         "path" :  " /telegram-channels " , 
         "id" :  " telegram_feed_123457 " , 
         "detectionDate" :  " 2024-08-01T18:22:45Z " , 
         "url" :  " https://threat-forum.onion/channels " , 
         "path" :  " /communication " , 
GET /api/v2/feed/{platform}/wallets 
Daily feed of cryptocurrency wallet addresses detected by Vysion. This feed helps track wallet addresses associated with malicious activities.
Name Type Required Description platformstring Yes Platform name (telegram,discord or darknet) batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page 
 
   curl   " https://api.vysion.ai/api/v2/feed/darknet/wallets?batch=2024-08-01 "   \ 
   --header   ' Accept: application/json '   \ 
   --header   ' x-api-key: YOUR_API_KEY ' 
     ' Accept ' :  ' application/json ' , 
   ' x-api-key ' :  ' YOUR_API_KEY ' 
r  =  requests. get ( ' https://api.vysion.ai/api/v2/feed/darknet/wallets ' ,   params = { 
      
         "id" :  " wallet_feed_123456 " , 
         "url" :  " https://ransomware-site.onion/payment " , 
         "detectionDate" :  " 2024-08-01T22:48:08Z " , 
         "title" :  " Payment Instructions - LockBit " , 
         "tag" : [ " ransomware " ,  " payment " ], 
             "value" :  " bc1q026rl6hjkdywnsrtva26mq2w0avs9k850ew2d6 " 
             "value" :  " 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa " 
         "id" :  " wallet_feed_123457 " , 
         "url" :  " https://crypto-scam.onion/invest " , 
         "detectionDate" :  " 2024-08-01T17:16:42Z " , 
         "title" :  " Investment Opportunity " , 
         "tag" : [ " scam " ,  " investment " ], 
             "value" :  " 3J98t1WpEZ73CNmQviecrnyiWrnqRhWNLy " 
GET /api/v2/feed/{platform}/onion 
Daily feed of “.onion” URLs detected by Vysion. This feed helps to obtain onions linked to malicious activity and/or containing recent activity.
Name Type Required Description platformstring Yes Platform name (telegram,discord or darknet) batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page 
 
   curl   " https://api.vysion.ai/api/v2/feed/darknet/onion?batch=2024-08-04 "   \ 
   --header   ' Accept: application/json '   \ 
   --header   ' x-api-key: YOUR_API_KEY ' 
     ' Accept ' :  ' application/json ' , 
   ' x-api-key ' :  ' YOUR_API_KEY ' 
r  =  requests. get ( ' https://api.vysion.ai/api/v2/feed/darknet/onion/batch=2024-08-04 ' ,   params = { 
      
         "id" :  " onion_feed_123456 " , 
             "url" :  " http://abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefab.onion " , 
             "networkProtocol" :  " http " , 
             "domainName" :  " abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefab.onion " , 
             "signature" :  " 9eacm9a3-1b3c-1234-123a-b82212a0221f " , 
         "detectionDate" :  " 2025-08-04T20:48:08Z " , 
         "id" :  " onion_feed_987654 " , 
           "url" :  " http://zyxwvutsrqponmlkjihgfedcbaabcdefabcdefabcdefabcdefabcd.onion " , 
           "networkProtocol" :  " http " , 
           "domainName" :  " zyxwvutsrqponmlkjihgfedcbaabcdefabcdefabcdefabcdefabcd.onion " , 
           "signature" :  " 4fa12c7b-8d9e-4321-9abc-f1234567890a " , 
         "detectionDate" :  " 2025-07-15T14:22:45Z " , 
Field Type Description idstring Unique identifier for the victim entry companyNamestring Name of the targeted company companyLinkstring URL to the company’s official website urlstring URL where the victim information was found ransomwareGroupstring Name of the ransomware group responsible detectionDatestring When the victim was detected (ISO 8601) textstring Extracted text about the victim countrystring Country code where the company is located naicsstring NAICS industry classification code industrystring Human-readable industry classification 
Field Type Description idstring Unique identifier for the feed entry telegramarray List of detected Telegram channel/group links detectionDatestring When the channels were detected (ISO 8601) urlstring Source URL where the Telegram links were found pathstring Path component of the source URL networkstring Network type (tor, clearnet) 
Field Type Description idstring Unique identifier for the feed entry urlstring Source URL where the wallet addresses were found detectionDatestring When the wallets were detected (ISO 8601) networkstring Network type (tor, clearnet) titlestring Title of the source page tagarray Tags associated with the detection bitcoin_addressarray Detected Bitcoin addresses 
Wallet addresses are returned as objects with a value field:
Field Type Description valuestring The cryptocurrency address 
Field Type Description idstring Unique identifier for the feed entry urlarray Source URL where the wallet addresses were found pathstring Path component of the source URL detectionDatestring When the wallets were detected (ISO 8601) networkstring Network type (tor, clearnet) tagarray Tags associated with the detection 
URL objects are returned as objects with several fields:
Field Type Description urlstring Source URL where the wallet addresses were found networkProtocolstring The protocol used for URL connection domainNamestring Domain name obtained from the URL pathstring Path component of the source URL signaturestring Path component of the source URL networkstring Network type (tor, clearnet) 
from  datetime  import  datetime, timedelta 
yesterday  =  (datetime. now ()  -   timedelta ( days = 1 )). strftime ( ' %Y-%m- %d ' ) 
feeds  =   [ ' ransomware ' ,  ' telegram ' ,  ' wallets ' ] 
     response  =  requests. get ( f 'https://api.vysion.ai/api/v2/feed/ {feed_type} ' , 
                           params = { ' batch ' : yesterday} , 
                           headers = { ' x-api-key ' :  ' YOUR_API_KEY ' } ) 
     print ( f " {feed_type}  feed:  {data [ ' data ' ] [ ' total ' ] }  new entries" ) 
def   get_complete_feed ( feed_type ,  batch_date ,  api_key ) : 
         response  =  requests. get ( f 'https://api.vysion.ai/api/v2/feed/ {feed_type} ' , 
                               headers = { ' x-api-key ' : api_key} ) 
         hits  =  data[ ' data ' ] [ ' hits ' ] 
         if   len ( hits )  <  page_size: 
Set up daily cron jobs to fetch new feed data 
Use the previous day’s date as the batch parameter 
Store feed data locally to avoid re-processing 
 
Implement retry logic for failed requests 
Check for empty feeds (some days may have no new data) 
Monitor feed freshness and alert on missing batches 
 
Deduplicate entries across feeds 
Enrich data with additional context from other APIs 
Correlate wallet addresses across different feed types 
 
Format feed data for your SIEM system 
Create alerts for high-priority ransomware groups 
Track trends in victim industries and locations 
 
Network Description torTor hidden services (.onion domains) clearnetRegular internet domains 
Feed endpoints may return these error codes:
Status Error Code Description 400 Bad Request Invalid batch date format 401 Unauthorized Invalid or missing API key 404 Not Found No data available for the specified batch date 422 Unprocessable Entity Invalid parameters 429 Too Many Requests Rate limit exceeded 500 Internal Server Error Server error 
Feed data is typically available for the past 30 days 
Historical data beyond 30 days may require special access 
Contact support for bulk historical data requests