public static final class DescribeAttackAnalysisDataRequest.Builder extends Object
| 限定符和类型 | 方法和说明 |
|---|---|
DescribeAttackAnalysisDataRequest.Builder |
base64(String base64)
Specifies whether to encode the value of the client_url field in the query results by using the Base64 algorithm.
|
DescribeAttackAnalysisDataRequest |
build() |
DescribeAttackAnalysisDataRequest.Builder |
currentPage(Integer currentPage)
The number of the page to return.
|
DescribeAttackAnalysisDataRequest.Builder |
data(String data)
The condition that is used to filter attack events.
|
DescribeAttackAnalysisDataRequest.Builder |
endTime(Long endTime)
The timestamp when the attack stops.
|
DescribeAttackAnalysisDataRequest.Builder |
lang(String lang)
The language of the content within the request and response.
|
DescribeAttackAnalysisDataRequest.Builder |
pageSize(Integer pageSize)
The number of entries to return on each page.
|
DescribeAttackAnalysisDataRequest.Builder |
startTime(Long startTime)
The timestamp at which the attack starts.
|
DescribeAttackAnalysisDataRequest.Builder |
type(String type)
The details of attack analysis.
|
public DescribeAttackAnalysisDataRequest.Builder base64(String base64)
Specifies whether to encode the value of the client_url field in the query results by using the Base64 algorithm. Valid values:
true
public DescribeAttackAnalysisDataRequest.Builder currentPage(Integer currentPage)
The number of the page to return. Pages start from page 1.
example:If the Type parameter is set to DETAILS, you must specify the CurrentPage parameter.
1
public DescribeAttackAnalysisDataRequest.Builder data(String data)
The condition that is used to filter attack events.
The following list describes the valid values of crack_type:
3: brute-force attack on MySQL
4: FTP brute-force attack
5: SSH brute-force attack
6: RDP brute-force attack
9: brute-force attack on Microsoft SQL Server
101: intercepted attack on Java Struts 2
102: intercepted attack on Redis
103: communication with AntSword Webshell
104: communication with China Chopper Webshell
133: communication with XISE Webshell
sqli: SQL injection
codei: code execution
xss: cross-site scripting (XSS)
lfi: local file inclusion
rfi: remote file inclusion
webshell: trojan script
upload: vulnerability upload
path: directory traversal
bypass: unauthorized access
csrf: cross-site request forgery (CSRF)
crlf: carriage return line feed (CRLF)
other: others
{"crack_type":"9"}
public DescribeAttackAnalysisDataRequest.Builder endTime(Long endTime)
The timestamp when the attack stops. Unit: seconds.
This parameter is required.
example:1649040221
public DescribeAttackAnalysisDataRequest.Builder lang(String lang)
The language of the content within the request and response. Default value: zh. Valid values:
zh
public DescribeAttackAnalysisDataRequest.Builder pageSize(Integer pageSize)
The number of entries to return on each page.
example:If the Type parameter is set to DETAILS, you must specify the PageSize parameter.
10
public DescribeAttackAnalysisDataRequest.Builder startTime(Long startTime)
The timestamp at which the attack starts. By default, the statistics of the previous seven days are queried. Unit: seconds.
The start time that you specify must be within the previous 40 days.
This parameter is required.
example:1644027670
public DescribeAttackAnalysisDataRequest.Builder type(String type)
The details of attack analysis. Valid values:
If the Type parameter is set to DETAILS, you must specify the CurrentPage and PageSize parameters.
This parameter is required.
example:DETAILS
public DescribeAttackAnalysisDataRequest build()
Copyright © 2026. All rights reserved.