AlienVault Open Threat Exchange (OTX) Python API Docs | dltHub
Build a AlienVault Open Threat Exchange (OTX)-to-database pipeline in Python using dlt with AI Workbench support for Claude Code, Cursor, and Codex.
Last updated:
AlienVault Open Threat Exchange (OTX) API provides IP, domain, and URL reputation data. The OTX DirectConnect API synchronizes threat intelligence to monitoring tools. An API key is not required for general indicator information. The REST API base URL is https://otx.alienvault.com/api and All authenticated requests require the X-OTX-API-KEY HTTP header..
dlt is an open-source Python library that handles authentication, pagination, and schema evolution automatically. dlthub provides AI context files that enable code assistants to generate production-ready pipelines. Install with uv pip install "dlt[workspace]" and start loading AlienVault Open Threat Exchange (OTX) data in under 10 minutes.
What data can I load from AlienVault Open Threat Exchange (OTX)?
Here are some of the endpoints you can load from AlienVault Open Threat Exchange (OTX):
| Resource | Endpoint | Method | Data selector | Description |
|---|---|---|---|---|
| pulses | /v1/pulses | GET | results | List pulses (paginated; response has count, next, results). |
| subscribed_pulses | /v1/pulses/subscribed | GET | results | List pulses you are subscribed to (paginated). |
| pulse | /v1/pulses/{pulse_id} | GET | Retrieve a single pulse by id (single object). | |
| pulse_indicators | /v1/pulses/{pulse_id}/indicators | GET | results | List indicators inside a specific pulse (paginated). |
| indicators_search | /v1/indicators | GET | results | Search / list indicators; many endpoints are paginated and return count/next/results. |
| indicator_type | /v1/indicators/IPv4/{ip}/{section} | GET | Retrieve indicator detail pages (single object). | |
| users_me | /v1/users/me | GET | Validate API key and return authenticated user info (single object). | |
| pulses_events | /v1/pulses/events | GET | results | List pulse-related events (paginated). |
How do I authenticate with the AlienVault Open Threat Exchange (OTX) API?
API key must be sent in the X-OTX-API-KEY HTTP header for authenticated requests; unauthenticated requests may return public data but many endpoints require the header.
1. Get your credentials
- Create or sign in to an OTX account at https://otx.alienvault.com. 2) Open your user account/settings where API keys are managed. 3) Create or copy the X-OTX-API-KEY value and use it as the API key in requests.
2. Add them to .dlt/secrets.toml
[sources.alienvault_open_threat_exchange_otx_source] api_key = "YOUR_OTX_API_KEY_HERE"
dlt reads this automatically at runtime — never hardcode tokens in your pipeline script. For production environments, see setting up credentials with dlt for environment variable and vault-based options.
How do I set up and run the pipeline?
Set up a virtual environment and install dlt:
uv venv && source .venv/bin/activate uv pip install "dlt[workspace]"
1. Install the dlt AI Workbench:
dlt ai init --agent <your-agent> # <agent>: claude | cursor | codex
This installs project rules, a secrets management skill, appropriate ignore files, and configures the dlt MCP server for your agent. Learn more →
2. Install the rest-api-pipeline toolkit:
dlt ai toolkit rest-api-pipeline install
This loads the skills and context about dlt the agent uses to build the pipeline iteratively, efficiently, and safely. The agent uses MCP tools to inspect credentials — it never needs to read your secrets.toml directly. Learn more →
3. Start LLM-assisted coding:
Use /find-source to load data from the AlienVault Open Threat Exchange (OTX) API into DuckDB.
The rest-api-pipeline toolkit takes over from here — it reads relevant API documentation, presents you with options for which endpoints to load, and follows a structured workflow to scaffold, debug, and validate the pipeline step by step.
4. Run the pipeline:
python alienvault_open_threat_exchange_otx_pipeline.py
If everything is configured correctly, you'll see output like this:
Pipeline alienvault_open_threat_exchange_otx_pipeline load step completed in 0.26 seconds 1 load package(s) were loaded to destination duckdb and into dataset alienvault_open_threat_exchange_otx_data The duckdb destination used duckdb:/alienvault_open_threat_exchange_otx.duckdb location to store data Load package 1749667187.541553 is LOADED and contains no failed jobs
Inspect your pipeline and data:
dlt pipeline alienvault_open_threat_exchange_otx_pipeline show
This opens the Pipeline Dashboard where you can verify pipeline state, load metrics, schema (tables, columns, types), and query the loaded data directly.
Python pipeline example
This example loads pulses and indicators from the AlienVault Open Threat Exchange (OTX) API into DuckDB. It mirrors the endpoint and data selector configuration from the table above:
import dlt from dlt.sources.rest_api import RESTAPIConfig, rest_api_resources @dlt.source def alienvault_open_threat_exchange_otx_source(api_key=dlt.secrets.value): config: RESTAPIConfig = { "client": { "base_url": "https://otx.alienvault.com/api", "auth": { "type": "api_key", "api_key": api_key, }, }, "resources": [ {"name": "pulses", "endpoint": {"path": "v1/pulses", "data_selector": "results"}}, {"name": "indicators", "endpoint": {"path": "v1/indicators", "data_selector": "results"}} ], } yield from rest_api_resources(config) def get_data() -> None: pipeline = dlt.pipeline( pipeline_name="alienvault_open_threat_exchange_otx_pipeline", destination="duckdb", dataset_name="alienvault_open_threat_exchange_otx_data", ) load_info = pipeline.run(alienvault_open_threat_exchange_otx_source()) print(load_info)
To add more endpoints, append entries from the resource table to the "resources" list using the same name, path, and data_selector pattern.
How do I query the loaded data?
Once the pipeline runs, dlt creates one table per resource. You can query with Python or SQL.
Python (pandas DataFrame):
import dlt data = dlt.pipeline("alienvault_open_threat_exchange_otx_pipeline").dataset() sessions_df = data.pulses.df() print(sessions_df.head())
SQL (DuckDB example):
SELECT * FROM alienvault_open_threat_exchange_otx_data.pulses LIMIT 10;
In a marimo or Jupyter notebook:
import dlt data = dlt.pipeline("alienvault_open_threat_exchange_otx_pipeline").dataset() data.pulses.df().head()
See how to explore your data in marimo Notebooks and how to query your data in Python with dataset.
What destinations can I load AlienVault Open Threat Exchange (OTX) data to?
dlt supports loading into any of these destinations — only the destination parameter changes:
| Destination | Example value |
|---|---|
| DuckDB (local, default) | "duckdb" |
| PostgreSQL | "postgres" |
| BigQuery | "bigquery" |
| Snowflake | "snowflake" |
| Redshift | "redshift" |
| Databricks | "databricks" |
| Filesystem (S3, GCS, Azure) | "filesystem" |
Change the destination in dlt.pipeline(destination="snowflake") and add credentials in .dlt/secrets.toml. See the full destinations list.
Next steps
Continue your data engineering journey with the other toolkits of the dltHub AI Workbench:
data-exploration— Build custom notebooks, charts, and dashboards for deeper analysis with marimo notebooks.dlthub-runtime— Deploy, schedule, and monitor your pipeline in production.
dlt ai toolkit data-exploration install dlt ai toolkit dlthub-runtime install
Was this page helpful?
Community Hub
Need more dlt context for AlienVault Open Threat Exchange (OTX)?
Request dlt skills, commands, AGENT.md files, and AI-native context.