文档中心>API 中心>主机安全>其他接口>容器视角应用防护事件列表

容器视角应用防护事件列表

最近更新时间:2026-03-18 01:37:16

我的收藏

1. 接口描述

接口请求域名: cwp.tencentcloudapi.com 。

应用防护事件列表接口

默认接口请求频率限制:20次/秒。

推荐使用 API Explorer
点击调试
API Explorer 提供了在线调用、签名验证、SDK 代码生成和快速检索接口等能力。您可查看每次调用的请求内容和返回结果以及自动生成 SDK 调用示例。

2. 输入参数

以下请求参数列表仅列出了接口请求参数和部分公共参数,完整公共参数列表见 公共请求参数

参数名称 必选 类型 描述
Action String 公共参数,本接口取值:DescribeRaspEventTCSS。
Version String 公共参数,本接口取值:2018-02-28。
Region String 公共参数,此参数为可选参数。
Filters.N Array of Filter 过滤条件:Keywords: ip或者主机名, VulKeywords漏洞名或者CveId模糊查询;AttackTypeKeywords攻击类型名模糊查询;Quuid,VulId,EventType,Status精确匹配,CreateBeginTime,CreateEndTime时间段查询
示例值:[{ "Name": "Keywords", "Values": [“127.0.0.1”], "ExactMatch": false }]
Offset Integer 数据偏移
示例值:0
Limit Integer 数据限制
示例值:10
Order String 排序,大小写无关:asc 升序,desc降序
示例值:asc
By String 排序列,严格相等:CreateTime创建时间,MergeTime合并时间,Count事件数量
示例值:CreateTime

3. 输出参数

参数名称 类型 描述
TotalCount Integer 数据总数
示例值:1
List Array of RaspEvent 漏洞防御事件列表
RequestId String 唯一请求 ID,由服务端生成,每次请求都会返回(若请求因其他原因未能抵达服务端,则该次请求不会获得 RequestId)。定位问题时需要提供该次请求的 RequestId。

4. 示例

示例1 容器视角应用防护事件列表

输入示例

POST / HTTP/1.1
Host: cwp.tencentcloudapi.com
Content-Type: application/json
X-TC-Action: DescribeRaspEventTCSS
<公共请求参数>

{}

输出示例

{
    "Response": {
        "List": [
            {
                "Alias": "eklet-subnet-0xubkp3m-cxta723y",
                "AttackPort": 8080,
                "AttackType": 28,
                "AttackTypeName": "内存马注入",
                "City": "局域网",
                "ClusterId": "cls-57v6lmfy",
                "ClusterName": "tcss-serverless",
                "ContainerId": "ea7107e1acca9ed1472ad2b375b6fd446dd08b417a741a382d9c852c2c761893",
                "ContainerName": "tomcat",
                "ContainerNetStatus": "NORMAL",
                "ContainerStatus": "RUNNING",
                "Count": 2,
                "CreateTime": "2025-06-25 16:22:27",
                "CveId": "",
                "EventType": 1,
                "Id": 106286,
                "ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
                "ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw:javamemhorse_scan_and_inject",
                "InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
                "MergeTime": "2025-06-25 16:57:28",
                "NodeId": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeName": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeType": "SUPER",
                "NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
                "Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
                "PocID": "",
                "PodIp": "10.0.0.61",
                "PodName": "tomcat-deployment-7b5599d474-jpcps",
                "PrivateIp": "",
                "PublicIp": "",
                "Quuid": "e6b85182-534c-4d80-8c4e-d5548636e279",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.0.0.61:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
                "SourceIp": "10.0.0.32",
                "Status": 0,
                "Url": "http://10.0.0.61:8080/shell_inject.jsp",
                "Uuid": "e6b85182-534c-4d80-8c4e-d5548636e279",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "eklet-subnet-0xubkp3m-xve59hdg",
                "AttackPort": 8080,
                "AttackType": 28,
                "AttackTypeName": "内存马注入",
                "City": "局域网",
                "ClusterId": "cls-57v6lmfy",
                "ClusterName": "tcss-serverless",
                "ContainerId": "634c6324bfec618430f58304f3e372c3a169b00f0bf6d6bd5474a5f4d38bb34c",
                "ContainerName": "tomcat",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 1,
                "CreateTime": "2025-06-24 16:52:24",
                "CveId": "",
                "EventType": 1,
                "Id": 106263,
                "ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
                "ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw@sha256:0f20d56d544e04a60fb21feecddc7f256d3eaef3a34a9b9380082ca67f229d73",
                "InstanceID": "eklet-subnet-0xubkp3m-xve59hdg",
                "MergeTime": "2025-06-24 16:52:24",
                "NodeId": "eklet-subnet-0xubkp3m-xve59hdg",
                "NodeName": "eklet-subnet-0xubkp3m-xve59hdg",
                "NodeType": "SUPER",
                "NodeUniqueID": "",
                "Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
                "PocID": "",
                "PodIp": "10.0.0.79",
                "PodName": "tomcat-deployment-7b5599d474-r24hn",
                "PrivateIp": "",
                "PublicIp": "",
                "Quuid": "e9c09e92-d7bb-494f-915d-d790d56acf5f",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.0.0.79:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
                "SourceIp": "10.0.0.32",
                "Status": 0,
                "Url": "http://10.0.0.79:8080/shell_inject.jsp",
                "Uuid": "e9c09e92-d7bb-494f-915d-d790d56acf5f",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "容器tcss - yancyw",
                "AttackPort": 8080,
                "AttackType": 28,
                "AttackTypeName": "内存马注入",
                "City": "局域网",
                "ClusterId": "bd4c542c12cc1379051fbaa785edac24",
                "ClusterName": "yancyw自建",
                "ContainerId": "d3a3afee5898b7c0c65b1b0b5ab373fe4485ea874d7982148125076825e340b0",
                "ContainerName": "/k8s_tomcat_tomcat-deployment-7869cf68f8-lbkmn_default_100c0737-f874-41f9-aaf2-d876efc7d844_0",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 1,
                "CreateTime": "2025-06-24 16:23:36",
                "CveId": "",
                "EventType": 1,
                "Id": 106262,
                "ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
                "ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw:javamemhorse_scan_and_inject",
                "InstanceID": "ins-p9dtz756",
                "MergeTime": "2025-06-24 16:23:36",
                "NodeId": "ins-p9dtz756",
                "NodeName": "容器tcss - yancyw",
                "NodeType": "NORMAL",
                "NodeUniqueID": "",
                "Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
                "PocID": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.48.109",
                "PublicIp": "43.139.121.191",
                "Quuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.96.65.126:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
                "SourceIp": "172.16.48.109",
                "Status": 0,
                "Url": "http://10.96.65.126:8080/shell_inject.jsp",
                "Uuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "容器tcss - yancyw",
                "AttackPort": 8080,
                "AttackType": 28,
                "AttackTypeName": "内存马注入",
                "City": "局域网",
                "ClusterId": "bd4c542c12cc1379051fbaa785edac24",
                "ClusterName": "yancyw自建",
                "ContainerId": "7c53ddedb5a3b94924f4f17a0eb8618ee8a814db50ea4918bf9b9fc3c10591a6",
                "ContainerName": "/k8s_tomcat_tomcat-deployment-7869cf68f8-wrw84_default_ba02ced0-d4fe-4661-a986-f17a24127f01_0",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 2,
                "CreateTime": "2025-06-24 16:13:34",
                "CveId": "",
                "EventType": 1,
                "Id": 106260,
                "ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
                "ImageName": "ccr.ccs.tencentyun.com/os_images/yancyw:javamemhorse_scan_and_inject",
                "InstanceID": "ins-p9dtz756",
                "MergeTime": "2025-06-24 16:14:19",
                "NodeId": "ins-p9dtz756",
                "NodeName": "容器tcss - yancyw",
                "NodeType": "NORMAL",
                "NodeUniqueID": "",
                "Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
                "PocID": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.16.48.109",
                "PublicIp": "43.139.121.191",
                "Quuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.96.65.126:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
                "SourceIp": "172.16.48.109",
                "Status": 0,
                "Url": "http://10.96.65.126:8080/shell_inject.jsp",
                "Uuid": "1fb8340e-5bf1-4b1d-959a-1a2987e57a36",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "eklet-subnet-0xubkp3m-rf316qva",
                "AttackPort": 8080,
                "AttackType": 28,
                "AttackTypeName": "内存马注入",
                "City": "局域网",
                "ClusterId": "cls-57v6lmfy",
                "ClusterName": "tcss-serverless",
                "ContainerId": "f53646ba8712b54b3a3bf3a027679fec9a61495e426112903c515419042e1edd",
                "ContainerName": "tomcat",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 1079,
                "CreateTime": "2025-06-24 10:22:13",
                "CveId": "",
                "EventType": 1,
                "Id": 105069,
                "ImageId": "sha256:c0a5af934728ff3589773fa3a19c30d77aee4f5df42811db09b3908d8d973231",
                "ImageName": "testss",
                "InstanceID": "eklet-subnet-0xubkp3m-rf316qva",
                "MergeTime": "2025-06-24 11:31:20",
                "NodeId": "eklet-subnet-0xubkp3m-rf316qva",
                "NodeName": "eklet-subnet-0xubkp3m-rf316qva",
                "NodeType": "SUPER",
                "NodeUniqueID": "",
                "Poc": "b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy",
                "PocID": "",
                "PodIp": "10.0.0.42",
                "PodName": "tomcat-deployment-7b5599d474-vbthg",
                "PrivateIp": "",
                "PublicIp": "",
                "Quuid": "b9bd26ce-fda8-436c-8097-f605b93e3741",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://10.0.0.42:8080/shell_inject.jsp\"},{\"name\":\"Poc\",\"value\":\"b3JnLmFwYWNoZS5qc3Auc2hlbGxfMDA1ZmluamVjdF9qc3AkTWFsaWNpb3VzRmlsdGVy\"}]",
                "SourceIp": "10.0.0.32",
                "Status": 0,
                "Url": "http://10.0.0.42:8080/shell_inject.jsp",
                "Uuid": "b9bd26ce-fda8-436c-8097-f605b93e3741",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "eklet-subnet-0xubkp3m-cxta723y",
                "AttackPort": 0,
                "AttackType": 1,
                "AttackTypeName": "",
                "City": "",
                "ClusterId": "cls-57v6lmfy",
                "ClusterName": "tcss-serverless",
                "ContainerId": "440fb71ea10b531dd8eed3057e472596a6ab31f7e234ebc318f72e4a384985dc",
                "ContainerName": "solr-container",
                "ContainerNetStatus": "NORMAL",
                "ContainerStatus": "RUNNING",
                "Count": 21,
                "CreateTime": "2025-06-23 17:55:55",
                "CveId": "CVE-2021-44228",
                "EventType": 1,
                "Id": 74692,
                "ImageId": "sha256:052794134d434bc2db0775211589beb372412af333a262dbf7977d28ec8d2142",
                "ImageName": "docker.io/vulhub/solr:8.11.0",
                "InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
                "MergeTime": "2025-06-23 22:50:31",
                "NodeId": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeName": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeType": "SUPER",
                "NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
                "Poc": "bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==",
                "PocID": "pcmgr-333393",
                "PodIp": "10.0.0.85",
                "PodName": "solr-deployment-5f5c757bc4-tfrsq",
                "PrivateIp": "",
                "PublicIp": "",
                "Quuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==\"}]",
                "SourceIp": "",
                "Status": 0,
                "Url": "na",
                "Uuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
                "VulId": 333393,
                "VulName": "Apache log4j2 远程代码执行漏洞 (CVE-2021-44228)"
            },
            {
                "Alias": "eklet-subnet-0xubkp3m-cxta723y",
                "AttackPort": 0,
                "AttackType": 9,
                "AttackTypeName": "任意文件读取",
                "City": "",
                "ClusterId": "cls-57v6lmfy",
                "ClusterName": "tcss-serverless",
                "ContainerId": "440fb71ea10b531dd8eed3057e472596a6ab31f7e234ebc318f72e4a384985dc",
                "ContainerName": "solr-container",
                "ContainerNetStatus": "NORMAL",
                "ContainerStatus": "RUNNING",
                "Count": 1,
                "CreateTime": "2025-06-23 15:56:13",
                "CveId": "",
                "EventType": 1,
                "Id": 74668,
                "ImageId": "sha256:052794134d434bc2db0775211589beb372412af333a262dbf7977d28ec8d2142",
                "ImageName": "docker.io/vulhub/solr:8.11.0",
                "InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
                "MergeTime": "2025-06-23 15:56:13",
                "NodeId": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeName": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeType": "SUPER",
                "NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
                "Poc": "L2V0Yy9qYXZhLTgtb3Blbmpkay9uZXQucHJvcGVydGllcw==",
                "PocID": "",
                "PodIp": "10.0.0.85",
                "PodName": "solr-deployment-5f5c757bc4-tfrsq",
                "PrivateIp": "",
                "PublicIp": "",
                "Quuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"L2V0Yy9qYXZhLTgtb3Blbmpkay9uZXQucHJvcGVydGllcw==\"}]",
                "SourceIp": "",
                "Status": 0,
                "Url": "na",
                "Uuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "eklet-subnet-0xubkp3m-cxta723y",
                "AttackPort": 0,
                "AttackType": 14,
                "AttackTypeName": "JNDI注入",
                "City": "",
                "ClusterId": "cls-57v6lmfy",
                "ClusterName": "tcss-serverless",
                "ContainerId": "440fb71ea10b531dd8eed3057e472596a6ab31f7e234ebc318f72e4a384985dc",
                "ContainerName": "solr-container",
                "ContainerNetStatus": "NORMAL",
                "ContainerStatus": "RUNNING",
                "Count": 39,
                "CreateTime": "2025-06-23 15:56:13",
                "CveId": "",
                "EventType": 1,
                "Id": 74667,
                "ImageId": "sha256:052794134d434bc2db0775211589beb372412af333a262dbf7977d28ec8d2142",
                "ImageName": "docker.io/vulhub/solr:8.11.0",
                "InstanceID": "eklet-subnet-0xubkp3m-cxta723y",
                "MergeTime": "2025-06-23 22:50:31",
                "NodeId": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeName": "eklet-subnet-0xubkp3m-cxta723y",
                "NodeType": "SUPER",
                "NodeUniqueID": "19312f17bdfe56d44739f2b4dfc0417f",
                "Poc": "bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==",
                "PocID": "",
                "PodIp": "10.0.0.85",
                "PodName": "solr-deployment-5f5c757bc4-tfrsq",
                "PrivateIp": "",
                "PublicIp": "",
                "Quuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"bGRhcDovLzEuOC4wXzEwMi5leGFtcGxlLmNvbQ==\"}]",
                "SourceIp": "",
                "Status": 0,
                "Url": "na",
                "Uuid": "c8ff4e00-b293-42fd-ac93-80d8179d35b5",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "dy-test-linux2-rasp测试中勿动",
                "AttackPort": 0,
                "AttackType": 38,
                "AttackTypeName": "其他类型反序列化漏洞",
                "City": "",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "38c145520c6ba6ec8698dc0be1fb353c93a7e0001624ce1799c90e547de71d58",
                "ContainerName": "/nacos-standalone-mysql",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 1,
                "CreateTime": "2025-06-23 15:51:58",
                "CveId": "",
                "EventType": 2,
                "Id": 74666,
                "ImageId": "sha256:440657d52bc38d9436aef0c8148abd381a2f88832f043a7691e08365511c2be3",
                "ImageName": "ccr.ccs.tencentyun.com/vultarget/nacos_jraft_rce:2.2.0",
                "InstanceID": "ins-hbzudk94",
                "MergeTime": "2025-06-23 15:51:58",
                "NodeId": "ins-hbzudk94",
                "NodeName": "dy-test-linux2-rasp测试中勿动",
                "NodeType": "NORMAL",
                "NodeUniqueID": "",
                "Poc": "amF2YXguc3dpbmcuVUlEZWZhdWx0cw==",
                "PocID": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.17.17.11",
                "PublicIp": "43.136.74.150",
                "Quuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"na\"},{\"name\":\"Poc\",\"value\":\"amF2YXguc3dpbmcuVUlEZWZhdWx0cw==\"}]",
                "SourceIp": "",
                "Status": 1,
                "Url": "na",
                "Uuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
                "VulId": 0,
                "VulName": ""
            },
            {
                "Alias": "dy-test-linux2-rasp测试中勿动",
                "AttackPort": 8080,
                "AttackType": 26,
                "AttackTypeName": "恶意外链",
                "City": "局域网",
                "ClusterId": "",
                "ClusterName": "",
                "ContainerId": "1ed5588c3c9720e892e5c34b4d42acfe3186148f64f4aa391c1d5b3daa7d654b",
                "ContainerName": "/vultarget-jira-1",
                "ContainerNetStatus": "",
                "ContainerStatus": "",
                "Count": 1,
                "CreateTime": "2025-06-23 15:50:28",
                "CveId": "",
                "EventType": 2,
                "Id": 74636,
                "ImageId": "sha256:96cd3224e4e45966046be09a63efed90ac9290d17056122bd05ebd9aa1202ea2",
                "ImageName": "ccr.ccs.tencentyun.com/vultarget/jira_ssrf-cve_2017_9506:latest",
                "InstanceID": "ins-hbzudk94",
                "MergeTime": "2025-06-23 15:50:28",
                "NodeId": "ins-hbzudk94",
                "NodeName": "dy-test-linux2-rasp测试中勿动",
                "NodeType": "NORMAL",
                "NodeUniqueID": "",
                "Poc": "aHR0cDovL2Ruc2xvZy5jbg==",
                "PocID": "",
                "PodIp": "",
                "PodName": "",
                "PrivateIp": "172.17.17.11",
                "PublicIp": "43.136.74.150",
                "Quuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
                "RaspDetail": "[{\"name\":\"Url\",\"value\":\"http://127.0.0.1:8080/plugins/servlet/oauth/users/icon-uri\"},{\"name\":\"Poc\",\"value\":\"aHR0cDovL2Ruc2xvZy5jbg==\"}]",
                "SourceIp": "172.18.0.1",
                "Status": 1,
                "Url": "http://127.0.0.1:8080/plugins/servlet/oauth/users/icon-uri",
                "Uuid": "470dd074-4d37-47bf-a204-c4fec27ef152",
                "VulId": 0,
                "VulName": ""
            }
        ],
        "RequestId": "6c565545-b0aa-4572-b6f7-08b0daa791bd",
        "TotalCount": 444
    }
}

5. 开发者资源

腾讯云 API 平台

腾讯云 API 平台 是综合 API 文档、错误码、API Explorer 及 SDK 等资源的统一查询平台,方便您从同一入口查询及使用腾讯云提供的所有 API 服务。

API Inspector

用户可通过 API Inspector 查看控制台每一步操作关联的 API 调用情况,并自动生成各语言版本的 API 代码,也可前往 API Explorer 进行在线调试。

SDK

云 API 3.0 提供了配套的开发工具集(SDK),支持多种编程语言,能更方便的调用 API。

命令行工具

6. 错误码

该接口暂无业务逻辑相关的错误码,其他错误码详见 公共错误码