文档中心>API 中心>主机安全>其他接口>主机视角应用防护事件列表

主机视角应用防护事件列表

最近更新时间:2026-03-18 01:37:17

我的收藏

1. 接口描述

接口请求域名: cwp.tencentcloudapi.com 。

应用防护事件列表接口

默认接口请求频率限制:20次/秒。

推荐使用 API Explorer
点击调试
API Explorer 提供了在线调用、签名验证、SDK 代码生成和快速检索接口等能力。您可查看每次调用的请求内容和返回结果以及自动生成 SDK 调用示例。

2. 输入参数

以下请求参数列表仅列出了接口请求参数和部分公共参数,完整公共参数列表见 公共请求参数

参数名称 必选 类型 描述
Action String 公共参数,本接口取值:DescribeRaspEventCWP。
Version String 公共参数,本接口取值:2018-02-28。
Region String 公共参数,此参数为可选参数。
Filters.N Array of Filter 过滤条件:Keywords: ip或者主机名, VulKeywords漏洞名或者CveId模糊查询;AttackTypeKeywords攻击类型名模糊查询;Quuid,VulId,EventType,Status精确匹配,CreateBeginTime,CreateEndTime时间段查询
Source区分内存马注入和漏洞防御,rasp:漏洞防御,memshell_inject:内存马注入
示例值:[{ "Name": "Keywords", "Values": ["127.0.0.1"], "ExactMatch": false },{ "Name": "Source", "Values": ["rasp"], "ExactMatch": false }]
Offset Integer 数据偏移
示例值:0
Limit Integer 数据限制
示例值:10
Order String 排序,大小写无关:asc 升序,desc降序
示例值:asc
By String 排序列,严格相等:CreateTime创建时间,MergeTime合并时间,Count事件数量
示例值:CreateTime

3. 输出参数

参数名称 类型 描述
TotalCount Integer 数据总数
示例值:1
List Array of RaspEvent 漏洞防御事件列表
RequestId String 唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。

4. 示例

示例1 漏洞防御告警事件-主机

漏洞防御告警事件-主机

输入示例

POST / HTTP/1.1
Host: cwp.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeRaspEventCWP
<公共请求参数>

{}

输出示例

{
    "Response": {
        "List": [
            {
                "Alias": "v_llzlu微隔离测试(millionlan)",
                "AttackPort": 8080,
                "AttackType": 15,
                "AttackTypeName": "命令执行",
                "City": "局域网",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 4,
                "CreateTime": "2025-05-20 20:12:30",
                "CveId": "",
                "Id": 13153488,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-j7vumfb6",
                "MergeTime": "2025-05-20 20:48:11",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "10.0.1.233",
                "PublicIp": "43.138.142.208",
                "Quuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "SourceIp": "172.17.0.3",
                "Status": 1,
                "Uuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "v_llzlu微隔离测试(millionlan)",
                "AttackPort": 8080,
                "AttackType": 15,
                "AttackTypeName": "命令执行",
                "City": "局域网",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 2,
                "CreateTime": "2025-05-20 19:46:43",
                "CveId": "",
                "Id": 13153486,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-j7vumfb6",
                "MergeTime": "2025-05-20 20:09:33",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "10.0.1.233",
                "PublicIp": "43.138.142.208",
                "Quuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "SourceIp": "10.0.1.233",
                "Status": 1,
                "Uuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "v_llzlu微隔离测试(millionlan)",
                "AttackPort": 8080,
                "AttackType": 15,
                "AttackTypeName": "命令执行",
                "City": "局域网",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 1,
                "CreateTime": "2025-05-19 12:05:50",
                "CveId": "",
                "Id": 13153485,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-j7vumfb6",
                "MergeTime": "2025-05-19 12:05:50",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "10.0.1.233",
                "PublicIp": "43.138.142.208",
                "Quuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "SourceIp": "10.0.1.233",
                "Status": 0,
                "Uuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "v_llzlu微隔离测试(millionlan)",
                "AttackPort": 0,
                "AttackType": 15,
                "AttackTypeName": "命令执行",
                "City": "局域网",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 2,
                "CreateTime": "2025-05-16 10:07:46",
                "CveId": "",
                "Id": 13153483,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-j7vumfb6",
                "MergeTime": "2025-05-16 10:12:42",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "10.0.1.233",
                "PublicIp": "43.138.142.208",
                "Quuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "SourceIp": "10.0.1.233",
                "Status": 1,
                "Uuid": "acdd5474-6360-4fd4-bfc7-843162cb8116",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "harborV2_yancyw",
                "AttackPort": 0,
                "AttackType": 0,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 4,
                "CreateTime": "2025-01-20 14:28:45",
                "CveId": "CVE-2021-44228",
                "Id": 13153468,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-4iasf49u",
                "MergeTime": "2025-01-20 14:28:45",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.51.209",
                "PublicIp": "139.199.178.171",
                "Quuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "SourceIp": "",
                "Status": 1,
                "Uuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "VulId": 101824,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            },
            {
                "Alias": "harborV2_yancyw",
                "AttackPort": 0,
                "AttackType": 0,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 4,
                "CreateTime": "2025-01-13 14:29:28",
                "CveId": "CVE-2021-44228",
                "Id": 13153464,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-4iasf49u",
                "MergeTime": "2025-01-13 14:29:28",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.51.209",
                "PublicIp": "139.199.178.171",
                "Quuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "SourceIp": "",
                "Status": 3,
                "Uuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "VulId": 101824,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            },
            {
                "Alias": "harborV2_yancyw",
                "AttackPort": 0,
                "AttackType": 0,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 4,
                "CreateTime": "2025-01-06 14:29:25",
                "CveId": "CVE-2021-44228",
                "Id": 13153425,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-4iasf49u",
                "MergeTime": "2025-01-06 14:29:25",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.51.209",
                "PublicIp": "139.199.178.171",
                "Quuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "SourceIp": "",
                "Status": 1,
                "Uuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "VulId": 101824,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            },
            {
                "Alias": "harborV2_yancyw",
                "AttackPort": 0,
                "AttackType": 0,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 4,
                "CreateTime": "2024-12-30 14:29:20",
                "CveId": "CVE-2021-44228",
                "Id": 13153417,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-4iasf49u",
                "MergeTime": "2024-12-30 14:29:20",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.51.209",
                "PublicIp": "139.199.178.171",
                "Quuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "SourceIp": "",
                "Status": 1,
                "Uuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "VulId": 101824,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            },
            {
                "Alias": "harborV2_yancyw",
                "AttackPort": 0,
                "AttackType": 0,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 32,
                "CreateTime": "2024-12-17 16:28:47",
                "CveId": "CVE-2021-44228",
                "Id": 13153369,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-4iasf49u",
                "MergeTime": "2024-12-17 16:28:57",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.51.209",
                "PublicIp": "139.199.178.171",
                "Quuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "SourceIp": "",
                "Status": 1,
                "Uuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "VulId": 101824,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            },
            {
                "Alias": "harborV2_yancyw",
                "AttackPort": 0,
                "AttackType": 0,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "",
                "ContainerName": "",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 4,
                "CreateTime": "2024-12-16 14:29:10",
                "CveId": "CVE-2021-44228",
                "Id": 13153361,
                "ImageId": "",
                "ImageName": "",
                "InstanceID": "ins-4iasf49u",
                "MergeTime": "2024-12-16 14:29:10",
                "NodeId": "",
                "NodeName": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.51.209",
                "PublicIp": "139.199.178.171",
                "Quuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "SourceIp": "",
                "Status": 1,
                "Uuid": "380add75-bb06-4cc4-84c5-cf806d102fba",
                "VulId": 101824,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            }
        ],
        "RequestId": "32a708bf-79e6-42b7-8b56-1729fd64933b",
        "TotalCount": 1586
    }
}

5. 开发者资源

腾讯云 API 平台

腾讯云 API 平台 是综合 API 文档、错误码、API Explorer 及 SDK 等资源的统一查询平台,方便您从同一入口查询及使用腾讯云提供的所有 API 服务。

API Inspector

用户可通过 API Inspector 查看控制台每一步操作关联的 API 调用情况,并自动生成各语言版本的 API 代码,也可前往 API Explorer 进行在线调试。

SDK

云 API 3.0 提供了配套的开发工具集(SDK),支持多种编程语言,能更方便的调用 API。

命令行工具

6. 错误码

该接口暂无业务逻辑相关的错误码,其他错误码详见 公共错误码