The Feeds API provides daily batches of Cyber Threat Intelligence (CTI) information, including ransomware victims, detected Telegram channels, and cryptocurrency wallet addresses. These feeds are designed for continuous monitoring and integration with security systems.
GET /api/v2/feed/ransomware
Daily feed of ransomware victims detected by Vysion. This feed provides structured information about companies that have been targeted by ransomware groups.
Name Type Required Description batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page
curl " https://api.vysion.ai/api/v2/feed/ransomware?batch=2024-08-01 " \
--header ' Accept: application/json ' \
--header ' x-api-key: YOUR_API_KEY '
' Accept ' : ' application/json ' ,
' x-api-key ' : ' YOUR_API_KEY '
r = requests. get ( ' https://api.vysion.ai/api/v2/feed/ransomware ' , params = {
"id" : " ransomware_123456 " ,
"companyName" : " TechCorp Solutions " ,
"companyLink" : " https://techcorp.example.com " ,
"url" : " https://darkweb-site.onion/victims/techcorp " ,
"ransomwareGroup" : " lockbit " ,
"detectionDate" : " 2024-08-01T14:30:22Z " ,
"text" : " TechCorp Solutions - Manufacturing company based in Germany. 500GB of confidential data including customer information, financial records... " ,
"industry" : " Manufacturing "
"id" : " ransomware_123457 " ,
"companyName" : " MedicalCenter Plus " ,
"companyLink" : " https://medcenter.example.com " ,
"url" : " https://darkweb-site.onion/victims/medcenter " ,
"ransomwareGroup" : " alphv " ,
"detectionDate" : " 2024-08-01T16:45:12Z " ,
"text" : " MedicalCenter Plus - Healthcare provider compromised. Patient records and medical data exposed... " ,
GET /api/v2/feed/telegram
Daily feed of detected Telegram channels identified by Vysion. This feed helps monitor new threat actor communications and malicious channels.
Name Type Required Description batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page
curl " https://api.vysion.ai/api/v2/feed/telegram?batch=2024-08-01 " \
--header ' Accept: application/json ' \
--header ' x-api-key: YOUR_API_KEY '
' Accept ' : ' application/json ' ,
' x-api-key ' : ' YOUR_API_KEY '
r = requests. get ( ' https://api.vysion.ai/api/v2/feed/telegram ' , params = {
"id" : " telegram_feed_123456 " ,
" t.me/suspicious_channel_001 " ,
"detectionDate" : " 2024-08-01T12:15:30Z " ,
"url" : " https://suspicious-site.onion/telegram-links " ,
"path" : " /telegram-channels " ,
"id" : " telegram_feed_123457 " ,
"detectionDate" : " 2024-08-01T18:22:45Z " ,
"url" : " https://threat-forum.onion/channels " ,
"path" : " /communication " ,
GET /api/v2/feed/{platform}/wallets
Daily feed of cryptocurrency wallet addresses detected by Vysion. This feed helps track wallet addresses associated with malicious activities.
Name Type Required Description platformstring Yes Platform name (telegram,discord or darknet) batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page
curl " https://api.vysion.ai/api/v2/feed/darknet/wallets?batch=2024-08-01 " \
--header ' Accept: application/json ' \
--header ' x-api-key: YOUR_API_KEY '
' Accept ' : ' application/json ' ,
' x-api-key ' : ' YOUR_API_KEY '
r = requests. get ( ' https://api.vysion.ai/api/v2/feed/darknet/wallets ' , params = {
"id" : " wallet_feed_123456 " ,
"url" : " https://ransomware-site.onion/payment " ,
"detectionDate" : " 2024-08-01T22:48:08Z " ,
"title" : " Payment Instructions - LockBit " ,
"tag" : [ " ransomware " , " payment " ],
"value" : " bc1q026rl6hjkdywnsrtva26mq2w0avs9k850ew2d6 "
"value" : " 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa "
"id" : " wallet_feed_123457 " ,
"url" : " https://crypto-scam.onion/invest " ,
"detectionDate" : " 2024-08-01T17:16:42Z " ,
"title" : " Investment Opportunity " ,
"tag" : [ " scam " , " investment " ],
"value" : " 3J98t1WpEZ73CNmQviecrnyiWrnqRhWNLy "
GET /api/v2/feed/{platform}/onion
Daily feed of “.onion” URLs detected by Vysion. This feed helps to obtain onions linked to malicious activity and/or containing recent activity.
Name Type Required Description platformstring Yes Platform name (telegram,discord or darknet) batchstring Yes Date in YYYY-MM-DD format to retrieve the specific day’s feed pageinteger No Page number for pagination page_sizeinteger No Number of results per page
curl " https://api.vysion.ai/api/v2/feed/darknet/onion?batch=2024-08-04 " \
--header ' Accept: application/json ' \
--header ' x-api-key: YOUR_API_KEY '
' Accept ' : ' application/json ' ,
' x-api-key ' : ' YOUR_API_KEY '
r = requests. get ( ' https://api.vysion.ai/api/v2/feed/darknet/onion/batch=2024-08-04 ' , params = {
"id" : " onion_feed_123456 " ,
"url" : " http://abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefab.onion " ,
"networkProtocol" : " http " ,
"domainName" : " abcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefabcdefab.onion " ,
"signature" : " 9eacm9a3-1b3c-1234-123a-b82212a0221f " ,
"detectionDate" : " 2025-08-04T20:48:08Z " ,
"id" : " onion_feed_987654 " ,
"url" : " http://zyxwvutsrqponmlkjihgfedcbaabcdefabcdefabcdefabcdefabcd.onion " ,
"networkProtocol" : " http " ,
"domainName" : " zyxwvutsrqponmlkjihgfedcbaabcdefabcdefabcdefabcdefabcd.onion " ,
"signature" : " 4fa12c7b-8d9e-4321-9abc-f1234567890a " ,
"detectionDate" : " 2025-07-15T14:22:45Z " ,
Field Type Description idstring Unique identifier for the victim entry companyNamestring Name of the targeted company companyLinkstring URL to the company’s official website urlstring URL where the victim information was found ransomwareGroupstring Name of the ransomware group responsible detectionDatestring When the victim was detected (ISO 8601) textstring Extracted text about the victim countrystring Country code where the company is located naicsstring NAICS industry classification code industrystring Human-readable industry classification
Field Type Description idstring Unique identifier for the feed entry telegramarray List of detected Telegram channel/group links detectionDatestring When the channels were detected (ISO 8601) urlstring Source URL where the Telegram links were found pathstring Path component of the source URL networkstring Network type (tor, clearnet)
Field Type Description idstring Unique identifier for the feed entry urlstring Source URL where the wallet addresses were found detectionDatestring When the wallets were detected (ISO 8601) networkstring Network type (tor, clearnet) titlestring Title of the source page tagarray Tags associated with the detection bitcoin_addressarray Detected Bitcoin addresses
Wallet addresses are returned as objects with a value field:
Field Type Description valuestring The cryptocurrency address
Field Type Description idstring Unique identifier for the feed entry urlarray Source URL where the wallet addresses were found pathstring Path component of the source URL detectionDatestring When the wallets were detected (ISO 8601) networkstring Network type (tor, clearnet) tagarray Tags associated with the detection
URL objects are returned as objects with several fields:
Field Type Description urlstring Source URL where the wallet addresses were found networkProtocolstring The protocol used for URL connection domainNamestring Domain name obtained from the URL pathstring Path component of the source URL signaturestring Path component of the source URL networkstring Network type (tor, clearnet)
from datetime import datetime, timedelta
yesterday = (datetime. now () - timedelta ( days = 1 )). strftime ( ' %Y-%m- %d ' )
feeds = [ ' ransomware ' , ' telegram ' , ' wallets ' ]
response = requests. get ( f 'https://api.vysion.ai/api/v2/feed/ {feed_type} ' ,
params = { ' batch ' : yesterday} ,
headers = { ' x-api-key ' : ' YOUR_API_KEY ' } )
print ( f " {feed_type} feed: {data [ ' data ' ] [ ' total ' ] } new entries" )
def get_complete_feed ( feed_type , batch_date , api_key ) :
response = requests. get ( f 'https://api.vysion.ai/api/v2/feed/ {feed_type} ' ,
headers = { ' x-api-key ' : api_key} )
hits = data[ ' data ' ] [ ' hits ' ]
if len ( hits ) < page_size:
Set up daily cron jobs to fetch new feed data
Use the previous day’s date as the batch parameter
Store feed data locally to avoid re-processing
Implement retry logic for failed requests
Check for empty feeds (some days may have no new data)
Monitor feed freshness and alert on missing batches
Deduplicate entries across feeds
Enrich data with additional context from other APIs
Correlate wallet addresses across different feed types
Format feed data for your SIEM system
Create alerts for high-priority ransomware groups
Track trends in victim industries and locations
Network Description torTor hidden services (.onion domains) clearnetRegular internet domains
Feed endpoints may return these error codes:
Status Error Code Description 400 Bad Request Invalid batch date format 401 Unauthorized Invalid or missing API key 404 Not Found No data available for the specified batch date 422 Unprocessable Entity Invalid parameters 429 Too Many Requests Rate limit exceeded 500 Internal Server Error Server error
Feed data is typically available for the past 30 days
Historical data beyond 30 days may require special access
Contact support for bulk historical data requests