Search
The /v4/events
endpoint provides a convenient way to search for past events based on specific parameters. Typical use cases and queries include:
- Searching for events associated with a single
event_id
within a time range to get historical behavior of a visitor. - Searching for events associated with a single
linked_id
within a time range to get all events associated with your internal account identifier. - Excluding all bot traffic from the query (
good
andbad
bots)
If you don't provide start
or end
parameters, the default search range is the last 7 days.
Filtering events with thesuspect
flag
suspect
flagThe /v4/events
endpoint unlocks a powerful method for fraud protection analytics. The suspect
flag is exposed in all events where it was previously set by the update API.
You can also apply the suspect
query parameter as a filter to find all potentially fraudulent activity that you previously marked as suspect
. This helps identify patterns of fraudulent behavior.
Environment scoping
If you use a secret key that is scoped to an environment, you will only get events associated with the same environment. With a workspace-scoped environment, you will get events from all environments. Smart Signals not activated for your workspace or are not included in the response.