Retrieves a traffic time series data over a set of domains. The response is suitable for plotting a time series chart. This method allows filtering the traffic data by various criteria.
Documentation Index
Fetch the complete documentation index at: https://gcore.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
API key for authentication. Make sure to include the word apikey, followed by a single space and then your token.
Example: apikey 1234$abcdef
List of domain IDs. Empty list means all domains belonging to the current account.
Domain ID
[1, 2, 3]Specifies the granularity of the result data.
daily, hourly, minutely Optional explicit aggregation bucket width in seconds. When supplied, bucket_size supersedes resolution for aggregation granularity.
60, 300, 600, 900, 1800, 3600, 7200, 10800, 21600, 43200, 86400 Filter data items starting from a specified date in ISO 8601 format
"2024-04-13T00:00:00+01:00"
Filter data items up to a specified end date in ISO 8601 format. If not provided, defaults to the current date and time.
"2024-04-14T12:00:00Z"
Filter traffic data by client IP.
["1.2.3.4", " 2001:678:194::3c25:ddad"]Filter by URL path with a glob-like pattern.
"/home"
Filter data by a country code of the originating IP address in ISO 3166-1 alpha-2 format.
^\w{2}$["DE", "MY"]Filter data by HTTP response status code.
100 <= x <= 599["403", "499"]Filter by HTTP methods
An HTTP method of a request.
DELETE, GET, HEAD, OPTIONS, PATCH, POST, PUT, TRACE ["GET", "HEAD"]Filter data by reference IDs.
^[a-f0-9]{32}$Filter data by request IDs.
^[a-f0-9]{32}-[0-9]{6}$Filter data by session IDs.
^[a-f0-9]{32}$Filter data by name of a security rule matched the request.
100^[a-zA-Z0-9_ ~!@#$%^&*()+\[\]{}|.,;:<>?/-]*$["SQL injection"]Filter data by decision.
Filter data by the event decision.
blocked, monitored, allowed, passed ["allowed", "blocked"]Filter data by optional action.
Filter data by the optional action.
captcha, challenge ["captcha", "challenge"]Exclude traffic data by client IP.
["1.2.3.4", "2001:678:194::3c25:ddad"]Exclude data by a country code of the originating IP address in ISO 3166-1 alpha-2 format.
^\w{2}$["DE", "MY"]Exclude data by session IDs.
^[a-f0-9]{32}$Exclude data by reference IDs.
^[a-f0-9]{32}$Exclude data by name of a security rule matched the request.
100^[a-zA-Z0-9_ ~!@#$%^&*()+\[\]{}|.,;:<>?/-]*$["SQL injection"]Exclude data by domain ID.
Filter by JA3 TLS client fingerprint. When present, the value must be exactly 32 hexadecimal characters (mixed case allowed) and is case-folded to lowercase when the backend filter is built. Omit the parameter entirely to apply no JA3 filter.
^[0-9a-fA-F]{32}$"e7d705a3286e19ea42f587b344ee6865"
Include entries whose user agent contains the supplied text, case-insensitive partial match. Omit the parameter to apply no user agent text filter.
300"Mozilla/5.0"
Include entries whose parsed user agent client exactly equals any supplied value. Omit or provide an empty list to apply no user agent client filter.
1050["Chrome", "Firefox"]Include entries whose parsed user agent device exactly equals any supplied value. Omit or provide an empty list to apply no user agent device filter.
1050["mac", "Nokia", "PlayStation"]Include entries whose tag exactly equals any supplied value. Omit or provide an empty list to apply no tag filter.
550["evasiveclient", "injectionattack"]Include entries whose organization exactly equals any supplied value. Omit or provide an empty list to apply no organization filter.
10100["Example Org", "Acme Corp"]Exclude entries whose user agent contains the supplied text, case-insensitive partial match. Omit the parameter to apply no user agent text exclusion.
300"python-requests"
Exclude entries whose parsed user agent client exactly equals any supplied value. Omit or provide an empty list to apply no user agent client exclusion.
1050["OpenAI GPTBot", "Uptimerobot"]Exclude entries whose parsed user agent device exactly equals any supplied value. Omit or provide an empty list to apply no user agent device exclusion.
1050["SMART TV"]Exclude entries whose JA3 TLS client fingerprint equals the supplied value. Must be exactly 32 hexadecimal characters (mixed case allowed) and is case-folded to lowercase when the backend filter is built. Omit the parameter to apply no JA3 exclusion.
^[0-9a-fA-F]{32}$"e7d705a3286e19ea42f587b344ee6865"
Exclude entries whose tag exactly equals any supplied value. Omit or provide an empty list to apply no tag exclusion.
550["mousedevice"]Exclude entries whose organization exactly equals any supplied value. Omit or provide an empty list to apply no organization exclusion.
10100["Acme corp"]Successful Response
UNIX timestamp indicating when the traffic data was recorded
Traffic (number of requests) that was passed to the origin and didn't trigger any rules
Traffic blocked by a security policy, custom rule, or DDoS protection
Traffic that was identified as malicious by security policies (for monitored domains)
Traffic passed due to a permissive security rule