Trending Actors
To monitor for trending actors, use the actors index page, with the 'sort' parameter set to one of the following:
trending_1d
trending_7d
trending_30d
Endpoint to browse for threat actors, with filters on some criteria.
A string used to filter threat actors. It can start with specific prefixes to indicate the type of filter:
name:: Filter by Name, case-insensitive.uuid:: Filter by UUID, case-insensitive. If no prefix is provided, it defaults to filtering on the display_name or name fields. Examples:name:APTname:lazarus_grouplazarus_groupLazarus Group
The number of items to skip before starting to collect the result set.
0Field to sort by - either name, created_at, updated_at, enriched_at, trending_1d, trending_7d, or trending_30d
created_atPattern: ^(name|created_at|updated_at|enriched_at|trending_1d|trending_7d|trending_30d)$Sort order - either asc or desc
descPattern: ^(asc|desc)$The maximum number of items to return.
100Successful Response
Not found
Validation Error
GET /v1/actors HTTP/1.1
Host:
Accept: */*
{
"total": 1,
"offset": 1,
"limit": 1,
"message": "text",
"data": [
{
"uuid": "text",
"created_at": "2025-10-25T05:15:52.298Z",
"updated_at": "2025-10-25T05:15:52.298Z",
"enriched_at": "2025-10-25T05:15:52.298Z",
"name": "text",
"description": "text",
"display_name": "text",
"misp_uuid": "text",
"provenance": "text",
"motivation": "text",
"sponsor": "text",
"family_name": "text",
"gen_description": "text"
}
]
}Once you've identified the ideal aperature, and you'd like more detail about /why/ they are trending, you can simply build a list of the actor uuids and request each one individually, the response contains the recent mentions.
The unique UUID or name of the threat actor to retrieve
Successful Response
Not found
Validation Error
GET /v1/actors/{identifier} HTTP/1.1
Host:
Accept: */*
{
"uuid": "text",
"created_at": "2025-10-25T05:15:52.298Z",
"updated_at": "2025-10-25T05:15:52.298Z",
"enriched_at": "2025-10-25T05:15:52.298Z",
"name": "text",
"description": "text",
"display_name": "text",
"misp_uuid": "text",
"provenance": "text",
"motivation": "text",
"sponsor": "text",
"family_name": "text",
"gen_description": "text",
"mentions_count": 0,
"synonyms_count": 0,
"mentions": [
{
"uuid": "text",
"created_at": "2025-10-25T05:15:52.298Z",
"updated_at": "2025-10-25T05:15:52.298Z",
"published_at": "2025-10-25T05:15:52.298Z",
"overview": "text",
"context": "text",
"reference_uuid": "text",
"reference_url": "text",
"reference_source": "text",
"reference_topic": "text",
"reference_user_generated_content": true,
"threat_actor_uuid": "text",
"threat_actor_name": "text",
"threat_actor_display_name": "text"
}
],
"synonyms": [
{
"uuid": "text",
"created_at": "2025-10-25T05:15:52.298Z",
"updated_at": "2025-10-25T05:15:52.298Z",
"enriched_at": "2025-10-25T05:15:52.298Z",
"name": "text",
"description": "text",
"display_name": "text",
"misp_uuid": "text",
"provenance": "text",
"motivation": "text",
"sponsor": "text",
"family_name": "text",
"gen_description": "text"
}
]
}Last updated
