The full set of threat types that can be determined in the API is listed below:

Name Is Malicious
C2 true
Botnet true
Hijacked true
Phishing true
Malware true
Exploit true
Scanner true
Zombie true
Spam true
Suspicious true
Compromised true
Whitelist false
Brute Force true
Info false

Suspicious subcategory

Name Is Malicious
Suspicious Application false
Suspicious Website false
Reverse Proxy false
C2 Panel false
Name Is Malicious
MiningPool true
CoinMiner true

Phishing subcategory

Name Is Malicious
Fake Website true

C2 (Remote Control) subcategory

Name Is Malicious
Sinkhole C2 true

Brute Force subcategory

Name Is Malicious
SSH Brute Force true
FTP Brute Force true
SMTP Brute Force true
Http Brute Force true
Web Login Brute Force true

Info subcategory

Name Is Malicious
Bogon false
FullBogon false
Gateway false
IDC false
Dynamic IP false
Edu false
DDNS false
Mobile false
Search Engine Crawler false
CDN false
Advertisement false
DNS false
BTtracker false
Backbone false
ICP false
IoT Device false
Game Server false
CloudWAF false
HTTP Proxy false
Socks Proxy false
VPN false
Tor false