b1td Usage

Examples

Todo

These examples are placeholders, useful, but actual example set here is on the todo.

bloxone.utils.reverse_labels("www.infoblox.com")

import bloxone
t = bloxone.b1td('/Users/marrison/configs/emea.ini')
t.version
bloxone.__version__
t.tide_url
t.threat_classes().json()
t.threat_properties().json()
t.threat_properties(threatclass="malwareC2").json()
t.threat_properties(threatclass="malwareC2").:wjson()