Method: threatLists.list
Mit Sammlungen den Überblick behalten
Sie können Inhalte basierend auf Ihren Einstellungen speichern und kategorisieren.
Listet die zum Download verfügbaren Safe Browsing-Bedrohungslisten auf.
HTTP-Anfrage
GET https://safebrowsing.googleapis.com/v4/threatLists
Die URL verwendet die Syntax der gRPC-Transcodierung.
Anfragetext
Der Anfragetext muss leer sein.
Antworttext
Wenn der Vorgang erfolgreich ist, enthält der Antworttext Daten mit folgender Struktur:
Felder |
threatLists[] |
object (ThreatListDescriptor )
Die Listen, die vom Client heruntergeladen werden können.
|
ThreatListDescriptor
Beschreibt eine einzelne Bedrohungsliste. Eine Liste wird durch drei Parameter definiert: die Art der Bedrohung, die Art der Plattform, auf die sich die Bedrohung bezieht, und die Art der Einträge in der Liste.
Felder |
threatType |
enum (ThreatType )
Der Bedrohungstyp, der in den Listeneinträgen enthalten ist.
|
platformType |
enum (PlatformType )
Der Plattformtyp, auf den die Einträge der Liste ausgerichtet sind.
|
threatEntryType |
enum (ThreatEntryType )
Die in der Liste enthaltenen Eintragstypen.
|
Sofern nicht anders angegeben, sind die Inhalte dieser Seite unter der Creative Commons Attribution 4.0 License und Codebeispiele unter der Apache 2.0 License lizenziert. Weitere Informationen finden Sie in den Websiterichtlinien von Google Developers. Java ist eine eingetragene Marke von Oracle und/oder seinen Partnern.
Zuletzt aktualisiert: 2025-07-25 (UTC).
[null,null,["Zuletzt aktualisiert: 2025-07-25 (UTC)."],[[["\u003cp\u003eThis API lists the Safe Browsing threat lists available for download.\u003c/p\u003e\n"],["\u003cp\u003eIt uses a GET request to \u003ccode\u003ehttps://safebrowsing.googleapis.com/v4/threatLists\u003c/code\u003e with an empty request body.\u003c/p\u003e\n"],["\u003cp\u003eThe response provides a list of \u003ccode\u003eThreatListDescriptor\u003c/code\u003e objects, each describing a threat list with its type, platform, and entry type.\u003c/p\u003e\n"],["\u003cp\u003eEach \u003ccode\u003eThreatListDescriptor\u003c/code\u003e helps identify the specific threats, platforms affected, and the kind of entries within each list.\u003c/p\u003e\n"]]],["This document outlines how to retrieve a list of available Safe Browsing threat lists. A `GET` request to `https://safebrowsing.googleapis.com/v4/threatLists` is used, with an empty request body. The successful response contains a JSON array of `threatLists`, each described by a `ThreatListDescriptor` object. This descriptor specifies the `threatType`, `platformType`, and `threatEntryType` of each list, defining the characteristics of the threats it contains.\n"],null,["# Method: threatLists.list\n\n- [HTTP request](#body.HTTP_TEMPLATE)\n- [Request body](#body.request_body)\n- [Response body](#body.response_body)\n - [JSON representation](#body.ListThreatListsResponse.SCHEMA_REPRESENTATION)\n- [ThreatListDescriptor](#ThreatListDescriptor)\n - [JSON representation](#ThreatListDescriptor.SCHEMA_REPRESENTATION)\n\nLists the Safe Browsing threat lists available for download.\n\n### HTTP request\n\n`GET https://safebrowsing.googleapis.com/v4/threatLists`\n\nThe URL uses [gRPC Transcoding](https://google.aip.dev/127) syntax.\n\n### Request body\n\nThe request body must be empty.\n\n### Response body\n\nIf successful, the response body contains data with the following structure:\n\n| JSON representation |\n|--------------------------------------------------------------------------------------------------------------------|\n| ``` { \"threatLists\": [ { object (/safe-browsing/reference/rest/v4/threatLists/list#ThreatListDescriptor) } ] } ``` |\n\n| Fields ||\n|-----------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| `threatLists[]` | `object (`[ThreatListDescriptor](/safe-browsing/reference/rest/v4/threatLists/list#ThreatListDescriptor)`)` The lists available for download by the client. |\n\nThreatListDescriptor\n--------------------\n\nDescribes an individual threat list. A list is defined by three parameters: the type of threat posed, the type of platform targeted by the threat, and the type of entries in the list.\n\n| JSON representation |\n|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|\n| ``` { \"threatType\": enum (/safe-browsing/reference/rest/v4/ThreatType), \"platformType\": enum (/safe-browsing/reference/rest/v4/PlatformType), \"threatEntryType\": enum (/safe-browsing/reference/rest/v4/ThreatEntryType) } ``` |\n\n| Fields ||\n|-------------------|----------------------------------------------------------------------------------------------------------------------------|\n| `threatType` | `enum (`[ThreatType](/safe-browsing/reference/rest/v4/ThreatType)`)` The threat type posed by the list's entries. |\n| `platformType` | `enum (`[PlatformType](/safe-browsing/reference/rest/v4/PlatformType)`)` The platform type targeted by the list's entries. |\n| `threatEntryType` | `enum (`[ThreatEntryType](/safe-browsing/reference/rest/v4/ThreatEntryType)`)` The entry types contained in the list. |"]]