Phish.net API Documentation

Phish.net

What is the Phish.net API?The gold standard for historical Phish data

Phish.Net features a Javascript/HTTP based API (Application Programming Interface). The API endpoint is located at https://api.phish.net/api.js. For maximum compatibility, you may request the api with any file extension you'd like. For example, you can make requests for "api.json" or "api.php". For public methods, all variables sent to the API should be sent via GET or POST parameters. In the event of a conflict, POST variables will win, which is a change from API version 1.0.

Version 2.0 of the Phish.net API is a major improvement over the 1.0 release in that we have made an effort to open up much more of the core Phish.net data for remote use. The new API introduces several new methods. API keys are now granted in seconds and can be used to access all the data necessary to build a robust application using Phish.net as the data platform. API version 2 now includes so-called "writable" methods, which means that the new API includes methods that can write data into our database.

Version 2.0 introduces application level security. All writable operations must be authorized by a user. Each application must request authority from a user, and upon approval, that user will be assigned an authority key - or "authkey" - specific to that user and that application. In order for an API method to write data, it will need to provide an API key, a username, and that user's individual authority key. Without all three unique pieces of information, the operation will fail. We highly recommend you read our piece on application authority for programmers.

Another feature of Phish.net API 2.0 is namespacing. While namespacing doesn't provide an immediate benefit, it sets the groundwork for the API to be expanded beyond just Phish.net, and potentially to other information we store now and in the future, such as side-projects, Mockingbird Foundation related news, and more.

The Phish.net API continues to have two types of methods. Public methods are available at all times, with no limit, with no API key. Typically, this information comes from regularly cached data. You may request this data at any time without any fear of hitting a limit. Protected methods (sometimes referred to as "private methods") are available only with the use of an API key. API keys assigned for use with Version 1 will continue to work. Requests to the API are rate limited. If you believe your application or site will request large amounts of information, please contact us and we can make appropriate arrangements.

We have provided several API demonstrations and API tutorials for you. You can feel free to use our hosted callback functions if you'd like. Our calbacks are very basic, but you can modify them and self-host them to fit the look-and-feel of your site. API methods change from time to time, will not change; but while new versions will certainly be released, as long as you pass the associated API version, your scripts will continue to output data in the same format.

API version 1 has been deprecated and is no longer supported.

Terms of UsePlease note our terms of use

All use of the Phish.net APIs is subject to our Terms of Service ("ToS"), which are contained in full here http://api.phish.net/keys.

All material on phish.net except for forum comments is (c) The Mockingbird Foundation, Inc. and may be reproduced on non-commercial websites by use of the APIs, with attribution, under the royalty-free general license contained in the ToS.

Other uses may be prohibited, require written permission of the Foundation or a further developer's license (e.g, smartphone apps). This is only a summary of the Phish.net API ToS. For the complete terms of the Phish.net ToS, please refer to the ToS. Any questions relating to permitted use or licenses under the API may be directed to the Foundation's counsel per the notice provisions of the ToS.

Keyboard Shortcuts

The keys are working if the search field has focus or your mouse cursor is in the navigation area. ESC key is global.

UP      - Previous category / Previous item
DOWN    - Next category / Next item
ENTER   - Open category / Load selected item
ESC     - Clear search field and set focus

HelpYeah, we can help.

We welcome questions and encourage you to contact us if you have a question about using our data in your web site or application. You can email us at any time with inquiries.

We offer our intellectual property for commercial projects as well. Please contact us for details if you're interested in building an application using our data on- or offline.

Thanks

Thanks to the jQAPI project, whose downloadable web structure serves as the basis for our API documentation.