SikkerAPI provides a free STIX 2.1 threat intelligence feed served over the TAXII 2.1 protocol. Every malicious IP detected by our honeypot network is published as a STIX Indicator with confidence scores, behavioral labels, and MITRE ATT&CK references. Connect your SIEM — Splunk, Microsoft Sentinel, Elastic Security, or IBM QRadar — and start receiving automated IP reputation updates.
SikkerAPI provides a TAXII 2.1 compatible endpoint that serves threat intelligence as STIX 2.1 indicators. This allows direct integration with SIEMs and threat intelligence platforms that support TAXII, including Splunk, Microsoft Sentinel, Elastic Security, and QRadar.
Each observed IP in our database is represented as a STIX Indicator with a risk-based confidence score, behavioral labels, MITRE ATT&CK references, and kill chain phase mappings.
Discovery and collection metadata endpoints are public. Object endpoints require an API key.
curl "https://api.sikkerapi.com/taxii2/" \
-H "Accept: application/taxii+json;version=2.1"All TAXII responses use the content type application/taxii+json;version=2.1.
| Method | Endpoint | Auth | Description |
|---|---|---|---|
| GET | /taxii2/ | None | TAXII discovery document. |
| GET | /taxii2/collections/ | None | List available collections. |
| GET | /taxii2/collections/{id}/ | None | Collection metadata. |
| GET | /taxii2/collections/{id}/objects/ | API Key | Paginated STIX indicator feed. |
| GET | /taxii2/collections/{id}/objects/{ip}/ | API Key | Single IP as STIX bundle. |
The collection ID is sikker-threat-intel.
{
"title": "SikkerNet TAXII Server",
"description": "TAXII 2.1 interface for SikkerNet threat intelligence",
"default": "/taxii2/collections/sikker-threat-intel/"
}{
"id": "sikker-threat-intel",
"title": "SikkerNet Threat Intelligence",
"description": "IP reputation indicators from SikkerNet honeypot network",
"can_read": true,
"can_write": false,
"media_types": ["application/stix+json;version=2.1"]
}The objects endpoint returns STIX indicators in a TAXII envelope with cursor-based pagination. Use the next value from each response to fetch subsequent pages.
| Parameter | Type | Description |
|---|---|---|
| added_after | string | ISO 8601 timestamp. Only return indicators updated after this time. |
| limit | integer | Page size (default 100, max 1000). |
| next | string | Opaque cursor from previous response for pagination. |
The envelope includes more: true when additional pages are available. The first page includes the SikkerNet identity object; subsequent pages contain only indicators.
curl "https://api.sikkerapi.com/taxii2/collections/sikker-threat-intel/objects/?limit=10" \
-H "Authorization: Bearer sk_free_..." \
-H "Accept: application/taxii+json;version=2.1"curl "https://api.sikkerapi.com/taxii2/collections/sikker-threat-intel/objects/?added_after=2026-02-01T00:00:00Z&limit=50" \
-H "Authorization: Bearer sk_free_..." \
-H "Accept: application/taxii+json;version=2.1"Returns a STIX bundle containing the SikkerNet identity and a single indicator for the requested IP address. Returns 404 if the IP has no recorded activity.
This is equivalent to the IP Check endpoint but formatted as STIX 2.1, making it suitable for SIEM ingestion pipelines.
curl "https://api.sikkerapi.com/taxii2/collections/sikker-threat-intel/objects/203.0.113.42/" \
-H "Authorization: Bearer sk_free_..." \
-H "Accept: application/taxii+json;version=2.1"Each IP is represented as a STIX 2.1 Indicator object with the following fields:
| Field | Type | Description |
|---|---|---|
| type | string | Always indicator. |
| id | string | Deterministic UUID v5 (same IP always produces same ID). |
| pattern | string | STIX pattern, e.g. [ipv4-addr:value = '1.2.3.4']. |
| confidence | integer | Confidence level (0-100), mapped directly from SikkerNet scoring. |
| indicator_types | array | Derived from behavior severity: malicious-activity, anomalous-activity, or benign. |
| labels | array | Behavior names (e.g. credential-stuffing, wget-download). |
| kill_chain_phases | array | MITRE ATT&CK kill chain phases derived from protocols (e.g. initial-access, execution). |
| external_references | array | MITRE ATT&CK technique references for mapped behaviors. |
| valid_from | string | ISO 8601 timestamp of earliest observed activity. |
| created_by_ref | string | Reference to the SikkerNet identity object. |
{
"type": "indicator",
"id": "indicator--a1b2c3d4-...",
"spec_version": "2.1",
"created": "2026-01-15T08:30:00.000Z",
"modified": "2026-02-07T14:22:00.000Z",
"name": "Suspicious IP: 203.0.113.42",
"description": "IP 203.0.113.42 observed by SikkerNet...",
"pattern": "[ipv4-addr:value = '203.0.113.42']",
"pattern_type": "stix",
"valid_from": "2026-01-15T08:30:00.000Z",
"indicator_types": ["malicious-activity"],
"confidence": 78,
"labels": ["credential-stuffing", "wget-download"],
"kill_chain_phases": [
{ "kill_chain_name": "mitre-attack", "phase_name": "initial-access" }
],
"external_references": [
{
"source_name": "SikkerNet",
"url": "https://sikkerapi.com"
},
{
"source_name": "mitre-attack",
"external_id": "T1110.001",
"url": "https://attack.mitre.org/techniques/T1110/001"
}
],
"created_by_ref": "identity--d3a2e6f1-..."
}Configure your SIEM to poll the TAXII feed for automatic threat intelligence ingestion:
| SIEM | Setup |
|---|---|
| Splunk | Add a TAXII 2 data input under Settings > Data Inputs > Threat Intelligence. Set the collection URL to https://api.sikkerapi.com/taxii2/collections/sikker-threat-intel/. |
| Microsoft Sentinel | Use the Threat Intelligence - TAXII data connector. Set the API root to https://api.sikkerapi.com/taxii2/ and collection ID to sikker-threat-intel. |
| Elastic Security | Configure a Threat Intel Indicator Match rule pointing at the TAXII feed URL with your API key in the Authorization header. |
| QRadar | Add a TAXII 2.1 reference set via the Threat Intelligence app. Use the discovery URL to auto-detect collections. |
Use the added_after parameter with your last poll timestamp for incremental updates. A typical polling interval is 15-60 minutes.
{
"more": true,
"next": "1707300000000:203.0.113.42",
"objects": [
{ "type": "identity", ... },
{ "type": "indicator", ... },
{ "type": "indicator", ... }
]
}Get started — Connect your SIEM to real-time threat intelligence. Free tier includes 1,000 STIX indicators per day. Create free API key →