Search for identification events, including Smart Signals, using multiple filtering criteria. If you don't provide start
or end
parameters, the default search range is the last 7 days.
Please note that events include mobile signals (e.g. rootApps
) even if the request originated from a non-mobile platform. We recommend you ignore mobile signals for such requests.
Search
The /events/search
endpoint provides a convenient way to search for past events based on specific parameters. Typical use cases and queries include:
- Searching for events associated with a single
visitorId
within a time range to get historical behavior of a visitor. - Searching for events associated with a single
linkedId
within a time range to get all events associated with your internal account identifier. - Excluding all bot traffic from the query (
good
andbad
bots)
By default, the search is performed on events that are one week old.
Filtering events with thesuspect
flag
suspect
flagThe /search
endpoint unlocks a powerful method for fraud protection analytics. The suspect
flag is exposed in all events where it was previously set by the update API.
You can also apply the suspect
query parameter as a filter to find all potentially fraudulent activity that you previously marked as suspect
. This helps identify patterns of fraudulent behavior.