Querying the List of Defense Statuses of EIPs
Function
Querying the List of Defense Statuses of EIPs
Debugging
You can use API Explorer to debug this API.
URI
GET /v1/{project_id}/antiddos
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| project_id | Yes | String | poject id Minimum: 32 Maximum: 64 |
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| status | No | String | status |
| limit | No | String | Maximum number of returned results. The value ranges from 1 to 100. |
| offset | No | String | Offset. The value ranges from 0 to 2147483647. |
| ip | No | String | IP address. Both IPv4 and IPv6 addresses are supported. For example, if you enter ?ip=192.168, the defense status of EIPs corresponding to 192.168.111.1 and 10.192.168.8 is returned. |
Request Parameters
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| X-Auth-Token | Yes | String | token Minimum: 32 Maximum: 2097152 |
| Content-Type | Yes | String | Default: application/json;charset=utf8 |
Response Parameters
Status code: 200
| Parameter | Type | Description |
|---|---|---|
| total | Integer | total count |
| ddosStatus | Array of DDosStatus objects | Anti-DDoS status |
| Parameter | Type | Description |
|---|---|---|
| floating_ip_id | String | ID of an EIP |
| floating_ip_address | String | IP address. Both IPv4 and IPv6 addresses are supported. For example, if you enter ?ip=192.168, the defense status of EIPs corresponding to 192.168.111.1 and 10.192.168.8 is returned. |
| network_type | String | EIP type. The value can be: EIP: EIP that is bound or not bound with ECS. ELB: EIP that is bound with ELB. |
| status | String | Defense status |
| blackhole_endtime | Long | The end time of blackhole |
| protect_type | String | Protect type |
| traffic_threshold | Long | Threshold of traffic |
| http_threshold | Long | Threshold of http traffic |
Example Requests
None
Example Responses
None
Status Codes
| Status Code | Description |
|---|---|
| 200 | OK |
Error Codes
See Error Codes.
Last Article: Anti-DDoS Controller
Next Article: Querying Optional Anti-DDoS Defense Policies
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.