Skip to main content
The explore endpoint lets you find specific indicators across Pulsedive’s entire dataset. Use it to investigate suspicious activity, hunt for related infrastructure, or export targeted intelligence for analysis.

Building Search Queries

Pulsedive provides a powerful way to search across our data using a flexible query language that supports boolean logic, comparison operators, and wildcard matching for highly specific search criteria. You can search indicators by:
  • Value
  • Type
  • Risk
  • Last seen timestamp
  • Threat
  • Feed
  • Attribute
  • Property
These filters can be combined to create rich, precise searches.
For a full description of supported operators, fields, and syntax, visit Query Language.

Making a Request

The process of making a request is simple and flexible. Provide a valid query in the q parameter and URI-encode it. Optionally, include a limit to control the size of the result set. Limits let you keep responses efficient, especially when working with complex queries or broad match conditions.

Exporting to CSV

Export results in CSV format for analysis in spreadsheets, SIEM workflows, or custom pipelines. CSV export includes the same fields as the standard JSON response, formatted for tabular processing.

Exporting to STIX 2.1

Export results as STIX 2.1 objects for interoperability with security platforms and CTI tools. This format provides indicator-level objects that align with structured threat intelligence standards.