GET /api/v1/sites/{site_id}/rogues/events/search
Operation ID: searchSiteRogueEvents
Auth: unknown
Description
Search Rogue Events
Parameters (11)
(string, query, optional)
mac of the device that had strongest signal strength for ssid/bssid pair
(string, query, optional)
bssid of the network detected as threat
(integer, query, optional)
channel over which ap_mac heard ssid/bssid pair
(string, query, optional, default: 1d)
For historical stats and/or logs where time range is needed, you can specify the time range in a few different ways: * ?start=1430000000&end=1430864000 specify the start / end * ?end=1430864000&duration=1d specify end time and duration * ?duration=1d specify duration, end will be now() in seconds
(integer, query, optional, default: 0)
Constraints: {'minimum': 0}
(integer, query, optional, default: 100)
Constraints: {'minimum': 0}
(boolean, query, optional)
whether the reporting AP see a wireless client (on LAN) connecting to it
(string, path, required)
(string, query, optional)
ssid of the network detected as threat
(integer, query, optional, default: 0)
Constraints: {'minimum': 0}
(string, query, optional)
Constraints: {'enum': ['honeypot', 'lan', 'others', 'spoof']}
No probe data for this endpoint yet.