文档首页/ DDoS防护 AAD/ API参考/ DDoS高防API/ DDoS高防-概览/ 查询DDoS攻击事件列表 - ListDDoSAttackEventV2
更新时间:2025-12-02 GMT+08:00
分享

查询DDoS攻击事件列表 - ListDDoSAttackEventV2

功能介绍

查询DDoS攻击事件列表

调用方法

请参见如何调用API

授权信息

账号具备所有API的调用权限,如果使用账号下的IAM用户调用当前API,该IAM用户需具备调用API所需的权限。

  • 如果使用角色与策略授权,具体权限要求请参见AAD权限和授权项
  • 如果使用身份策略授权,当前API调用无需身份策略权限。

URI

POST /v2/aad/instances/{instance_id}/ddos-info/attack/events

表1 路径参数

参数

是否必选

参数类型

描述

instance_id

String

实例id

请求参数

表2 请求Header参数

参数

是否必选

参数类型

描述

X-Auth-Token

String

token

Content-Type

String

Content-Type

表3 请求Body参数

参数

是否必选

参数类型

描述

start_time

String

开始时间

end_time

String

结束时间

offset

Integer

限制条数

limit

Integer

起始位

ip

String

ip

attack_types

Array of strings

攻击类型,"SYN Flood", "ACK Flood", "SYN-ACK Flood", "FIN/RST Flood", "TCP ConcurConn Flood", "TCP NewConn Flood", "TCP Fragment Flood", "TCP Fragment Flood", "TCP Bandwidth Overflow", "UDP Flood", "UDP Fragment Flood", "UDP Fragment Flood", "UDP Bandwidth Overflow", "ICMP Flood", "Other Protocol Flood", "DstIP Bandwidth Overflow", "HTTPS Flood", "HTTP Flood", "DNS Query Flood", "DNS Reply Flood", "SIP Flood", "Blacklist Dropped Traffic", "HTTP Flood", "TCP Fragment Abnormal", "TCP Abnormal", "UDP Fragment Abnormal", "UDP Abnormal", "ICMP Abnormal", "Other Protocol Abnormal", "TCP Connection Flood", "DNS Domain Hijacking", "DNS Cache Poisoning", "DNS Reflection", "Large DNS Packet", "SrcIP DNS Query Rate Abnormal", "SrcIP DNS Response Rate Abnormal", "DNS Query Domain Rate Abnormal", "DNS Response Domain Rate Abnormal", "DNS TTL Abnormal", "DNS Malformed", "DNS Cache Match", "Port Scanning", "TCP Malformed", "SrcIP Traffic Overflow", "UDP Garbage Flood", "DNS NXDOMAIN Flood", "Other Flood", "Zone Bandwidth Overflow", "HTTP Connection Flood", "Botnets/Trojan horses/Worms Attack", "Malicious Domains Attack", "Filter-rule Dropped Traffic", "Web Attack", "SrcIP SIP Rate Abnormal", "Anti-Malware", "Botnet Traffic", "GeoIP Dropped Traffic", "DstIP NewConn Rate Limit", "TCP Traffic Block", "UDP Traffic Block", "ICMP Traffic Block", "Other Protocol Traffic Block", "Host Traffic Over Flow", "UDP Malformed", "TCP Dport Traffic Limit", "TCP Dport Relation Defense", "Filter-rule Dropped Traffic", "Hardware-filter-rule Dropped Carpet-bombing Traffic"

attack_flow_low

String

攻击流量最小值

attack_flow_up

String

攻击流量最大值

attack_status

String

攻击状态,attack-攻击;normal-结束攻击

响应参数

状态码:200

表4 响应Body参数

参数

参数类型

描述

total

Integer

total

data

Array of ListDDoSEventData objects

data

表5 ListDDoSEventData

参数

参数类型

描述

zone_ip

String

防护IP

start_time

String

开始时间

end_time

String

结束时间

max_drop_kbps

String

攻击流量峰值,单位“kbps”

max_drop_pps

String

攻击报文数峰值,单位“pps”

max_in_kbps

String

入流量峰值,单位“kbps”

max_in_pps

String

入报文数峰值,单位“pps”

attack_types

String

攻击类型,"SYN Flood", "ACK Flood", "SYN-ACK Flood", "FIN/RST Flood", "TCP ConcurConn Flood", "TCP NewConn Flood", "TCP Fragment Flood", "TCP Fragment Flood", "TCP Bandwidth Overflow", "UDP Flood", "UDP Fragment Flood", "UDP Fragment Flood", "UDP Bandwidth Overflow", "ICMP Flood", "Other Protocol Flood", "DstIP Bandwidth Overflow", "HTTPS Flood", "HTTP Flood", "DNS Query Flood", "DNS Reply Flood", "SIP Flood", "Blacklist Dropped Traffic", "HTTP Flood", "TCP Fragment Abnormal", "TCP Abnormal", "UDP Fragment Abnormal", "UDP Abnormal", "ICMP Abnormal", "Other Protocol Abnormal", "TCP Connection Flood", "DNS Domain Hijacking", "DNS Cache Poisoning", "DNS Reflection", "Large DNS Packet", "SrcIP DNS Query Rate Abnormal", "SrcIP DNS Response Rate Abnormal", "DNS Query Domain Rate Abnormal", "DNS Response Domain Rate Abnormal", "DNS TTL Abnormal", "DNS Malformed", "DNS Cache Match", "Port Scanning", "TCP Malformed", "SrcIP Traffic Overflow", "UDP Garbage Flood", "DNS NXDOMAIN Flood", "Other Flood", "Zone Bandwidth Overflow", "HTTP Connection Flood", "Botnets/Trojan horses/Worms Attack", "Malicious Domains Attack", "Filter-rule Dropped Traffic", "Web Attack", "SrcIP SIP Rate Abnormal", "Anti-Malware", "Botnet Traffic", "GeoIP Dropped Traffic", "DstIP NewConn Rate Limit", "TCP Traffic Block", "UDP Traffic Block", "ICMP Traffic Block", "Other Protocol Traffic Block", "Host Traffic Over Flow", "UDP Malformed", "TCP Dport Traffic Limit", "TCP Dport Relation Defense", "Filter-rule Dropped Traffic", "Hardware-filter-rule Dropped Carpet-bombing Traffic"

attack_ips

String

攻击源IP

attack_ips_desc

String

攻击IP描述

attack_status

String

攻击状态,attack-攻击;normal-结束攻击

状态码:400

表6 响应Body参数

参数

参数类型

描述

error_code

String

错误码

error_description

String

错误描述

请求示例

响应示例

状态码:200

OK

{
  "data" : [ {
    "attack_ips" : "",
    "attack_ips_desc" : "",
    "attack_status" : "NORMAL",
    "attack_types" : "Location Attack",
    "end_time" : "1719194207000",
    "max_drop_kbps" : "417",
    "max_drop_pps" : "594",
    "max_in_kbps" : "426",
    "max_in_pps" : "606",
    "star_time" : "1719193603000",
    "zone_iP" : "10.10.10.10"
  } ],
  "total" : 1
}

状态码

状态码

描述

200

OK

400

Error response

相关文档