Internal Logs Don't See Client-Side Threats
Structured Threat Evidence for Instant Ingestion
Quttera provides raw threat intelligence. SIEM/XDR platforms enrich and operationalize it.
{
"error": 200,
"errorstr": "success",
"status": {
"blacklisted": "no",
"scanner_result": "undef",
"state": "DOWNLOAD",
"url": "target-domain.com"
}
}{
"error": 200,
"errorstr": "success",
"report": {
"url": "external-script-alpha.com",
"state": "DONE",
"scanner_result": "malicious",
"threat_summary": {
"threat_type": "obfuscated_script_injection",
"threat_status": "active",
"detection_time": "2026-04-20 18:52:05"
}
}
}{
"error": 200,
"errorstr": "success",
"report": {
"url": "external-script-alpha.com",
"state": "DONE",
"scanner_result": "malicious",
"blacklist": {
"blacklist_status": "NoThreat",
"providers": [
{ "name": "Google Safe Browsing", "status": "NoThreat" },
{ "name": "Yandex Safe Browsing", "status": "NoThreat" }
]
},
"threat_summary": {
"threat_type": "obfuscated_script_injection",
"threat_status": "active",
"detection_time": "2026-04-20 18:52:05"
}
}
}The following example shows how Quttera API data can be transformed by your SIEM/SOAR into actionable alerts.
{
"alert": {
"severity": "Critical",
"playbook_id": "PB_WEB_02",
"recommended_action": "quarantine_asset",
"affected_asset": "external-script-alpha.com",
"vector": "browser-side",
"source_data": {
"scanner_result": "malicious",
"threat_type": "obfuscated_script_injection"
}
}
}| Domain | Threat type | Severity | Vector | Status |
|---|---|---|---|---|
| external-script-alpha.com | obfuscated_script_injection | Critical | browser-side | active |
| thirdparty-redirect.net | malicious_redirect | High | redirect-chain | active_drift |
| cdn-obfuscated.io | cloaked_content | Medium | browser-response variance | under_review |
| client-site-clean.com | — | Clean | — | clear |
{
"alert": {
"source": "Quttera Web Malware Scanner",
"severity": "Critical",
"category": "Malicious Web Content",
"asset": "external-script-alpha.com",
"description": "Obfuscated script injection detected — active",
"playbook_id": "PB_WEB_02",
"evidence_url": "scannerapi.quttera.com/.../report/external-script-alpha.com",
"timestamp": "2026-04-20T18:52:05Z"
}
}{
"incident": {
"name": "Quttera: Script injection — external-script-alpha.com",
"type": "Malicious Web Threat",
"severity": 4, // 4 = Critical "playbookId": "PB_WEB_02",
"labels": [
{ "type": "Domain", "value": "external-script-alpha.com" },
{ "type": "ThreatType", "value": "obfuscated_script_injection" },
{ "type": "Compliance", "value": "SOC2:CC6.1" }
]
}
}{
"compliance_evidence": {
"scan_id": "QT-2026-04-20-001",
"domain": "external-script-alpha.com",
"generated_at": "2026-04-20T18:52:05Z",
"frameworks": [
{
"standard": "SOC2",
"controls": [
{ "id": "CC6.1", "finding": "Unauthorized script detected" },
{ "id": "CC7.2", "finding": "Anomalous system component" }
]
},
{
"standard": "PCI_DSS",
"controls": [
{ "id": "Req 6.4", "finding": "Malicious browser-side script" }
]
},
{
"standard": "ISO_27001",
"controls": [
{ "id": "A.12.2", "finding": "Malware protection failure" }
]
}
],
"export_formats": ["JSON", "PDF", "CSV"]
}
}Findings are automatically categorized as Clean, Potentially Suspicious, Suspicious, or Malicious — and mapped to the relevant control. Export on demand for GRC and SIEM platforms.
// Select a domain and run scan...
Where Quttera Fits in Your Security Stack
SOC teams enriching alerts with external threat intelligence
API-Based Integration
SIEM platforms (Splunk, Sentinel, Elastic)
SOAR systems (Cortex XSOAR, FortiSOAR)
security data pipelines