All Products
Search
Document Center

Security Center:GetAttackEventDetail

Last Updated:Mar 24, 2026

Get Attack Analysis Event Details

Try it now

Try this API in OpenAPI Explorer, no manual signing needed. Successful calls auto-generate SDK code matching your parameters. Download it with built-in credential security for local usage.

Test

RAM authorization

No authorization for this operation. If you encounter issues with this operation, contact technical support.

Request parameters

Parameter

Type

Required

Description

Example

Id

string

No

The unique identifier ID for the alert event.

18825544674********

Lang

string

No

The language type for requesting and receiving messages. Values:

  • zh: Chinese.

  • en: English.

zh

Response elements

Element

Type

Description

Example

object

PageResult

Data

object

Returned data.

Payload

string

Attack payload.

301f02010104067075626c6963a51202017602010002017f3007300506012b0500

CveBeans

array<object>

List of CVE vulnerabilities associated with the attack.

object

Id

string

ID of the CVE vulnerability.

CVE-2023-39964

Name

string

Name of the CVE vulnerability.

1Panel loadfile backend file read vulnerability

Success

boolean

Indicates whether this request was successful. Values:

  • true: The API call was successful

  • false: The API call failed

true

Code

string

Result code, 200 indicates success, any other value indicates failure. The caller can use this field to determine the reason for the failure.

200

Message

string

Export result prompt message. Fixed value: success. Indicates that the export was successful.

successful

RequestId

string

The ID of this request, which is a unique identifier generated by Alibaba Cloud for the request. It can be used for troubleshooting and problem localization.

F8B6F758-BCD4-597A-8A2C-DA5A552C****

HttpStatusCode

integer

HTTP status code of the request result.

200

Examples

Success response

JSON format

{
  "Data": {
    "Payload": "301f02010104067075626c6963a51202017602010002017f3007300506012b0500",
    "CveBeans": [
      {
        "Id": "CVE-2023-39964",
        "Name": "1Panel loadfile backend file read vulnerability"
      }
    ]
  },
  "Success": true,
  "Code": "200",
  "Message": "successful",
  "RequestId": "F8B6F758-BCD4-597A-8A2C-DA5A552C****",
  "HttpStatusCode": 200
}

Error codes

HTTP status code

Error code

Error message

Description

500 ServerError ServerError
403 NoPermission caller has no permission You are not authorized to do this operation.

See Error Codes for a complete list.

Release notes

See Release Notes for a complete list.