Get users scan-result filters
Retrieve the Team ID from: https://cloud.projectdiscovery.io/settings/team
The number of items to skip before starting to collect the result set
The numbers of items to return
specific scan_id results filters
comma separated severity e.g. severities=info,high
comma separated templates e.g. templates=tech-detect,azure-takeover
comma separated host e.g. hosts=https://example.com,https://x.com
comma separated domain names e.g-> domain=domain1.com,domain2.com
comma separated ports e.g. ports=80,443
search term
type of filter
filter by time ( last_day, last_week, last_month )
comma separated vuln_status e.g vuln_status=open,fixed
comma separated ascending sorting e.g sort_asc=created_at,severity
comma separated descending sorting e.g sort_desc=created_at,severity
comma separated tags e.g tags=xss,cve
comma separated hosts that should not be returned e.g. not_hosts=https://example.com,https://x.com
comma separated severity that should not be returned e.g. not_severity=info,high
comma separated templates that should not be returned e.g. not_templates=tech-detect,azure-takeover
filter by comma separated labels e.g labels=p1,p2
filter by comma separated categories e.g category=cve,xss
filter by is_regression
time filter start date
time filter end date
Example response
The response is of type object
.