## Get reclassify submissions `email_security.submissions.list(SubmissionListParams**kwargs) -> SyncV4PagePaginationArray[SubmissionListResponse]` **get** `/accounts/{account_id}/email-security/submissions` This endpoint returns information for submissions to made to reclassify emails. ### Parameters - `account_id: str` Account Identifier - `customer_status: Optional[Literal["escalated", "reviewed", "unreviewed"]]` - `"escalated"` - `"reviewed"` - `"unreviewed"` - `end: Optional[Union[str, datetime]]` The end of the search date range. Defaults to `now` if not provided. - `original_disposition: Optional[Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", 3 more]]` - `"MALICIOUS"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"NONE"` - `outcome_disposition: Optional[Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", 3 more]]` - `"MALICIOUS"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"NONE"` - `page: Optional[int]` The page number of paginated results. - `per_page: Optional[int]` The number of results per page. - `query: Optional[str]` - `requested_disposition: Optional[Literal["MALICIOUS", "SUSPICIOUS", "SPOOF", 3 more]]` - `"MALICIOUS"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"NONE"` - `start: Optional[Union[str, datetime]]` The beginning of the search date range. Defaults to `now - 30 days` if not provided. - `status: Optional[str]` - `submission_id: Optional[str]` - `type: Optional[Literal["TEAM", "USER"]]` - `"TEAM"` - `"USER"` ### Returns - `class SubmissionListResponse: …` - `requested_ts: datetime` deprecated as of 2026-04-01, use `requested_at` instead. - `submission_id: str` - `customer_status: Optional[Literal["escalated", "reviewed", "unreviewed"]]` - `"escalated"` - `"reviewed"` - `"unreviewed"` - `escalated_as: Optional[Literal["MALICIOUS", "MALICIOUS-BEC", "SUSPICIOUS", 7 more]]` - `"MALICIOUS"` - `"MALICIOUS-BEC"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"ENCRYPTED"` - `"EXTERNAL"` - `"UNKNOWN"` - `"NONE"` - `escalated_at: Optional[datetime]` - `escalated_by: Optional[str]` - `escalated_submission_id: Optional[str]` - `original_disposition: Optional[Literal["MALICIOUS", "MALICIOUS-BEC", "SUSPICIOUS", 7 more]]` - `"MALICIOUS"` - `"MALICIOUS-BEC"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"ENCRYPTED"` - `"EXTERNAL"` - `"UNKNOWN"` - `"NONE"` - `original_edf_hash: Optional[str]` - `original_postfix_id: Optional[str]` - `outcome: Optional[str]` - `outcome_disposition: Optional[Literal["MALICIOUS", "MALICIOUS-BEC", "SUSPICIOUS", 7 more]]` - `"MALICIOUS"` - `"MALICIOUS-BEC"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"ENCRYPTED"` - `"EXTERNAL"` - `"UNKNOWN"` - `"NONE"` - `requested_at: Optional[datetime]` - `requested_by: Optional[str]` - `requested_disposition: Optional[Literal["MALICIOUS", "MALICIOUS-BEC", "SUSPICIOUS", 7 more]]` - `"MALICIOUS"` - `"MALICIOUS-BEC"` - `"SUSPICIOUS"` - `"SPOOF"` - `"SPAM"` - `"BULK"` - `"ENCRYPTED"` - `"EXTERNAL"` - `"UNKNOWN"` - `"NONE"` - `status: Optional[str]` - `subject: Optional[str]` - `type: Optional[str]` ### Example ```python import os from cloudflare import Cloudflare client = Cloudflare( api_email=os.environ.get("CLOUDFLARE_EMAIL"), # This is the default and can be omitted api_key=os.environ.get("CLOUDFLARE_API_KEY"), # This is the default and can be omitted ) page = client.email_security.submissions.list( account_id="023e105f4ecef8ad9ca31a8372d0c353", ) page = page.result[0] print(page.submission_id) ``` #### Response ```json { "errors": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "messages": [ { "code": 1000, "message": "message", "documentation_url": "documentation_url", "source": { "pointer": "pointer" } } ], "result": [ { "requested_ts": "2019-12-27T18:11:19.117Z", "submission_id": "submission_id", "customer_status": "escalated", "escalated_as": "MALICIOUS", "escalated_at": "2019-12-27T18:11:19.117Z", "escalated_by": "escalated_by", "escalated_submission_id": "escalated_submission_id", "original_disposition": "MALICIOUS", "original_edf_hash": "original_edf_hash", "original_postfix_id": "original_postfix_id", "outcome": "outcome", "outcome_disposition": "MALICIOUS", "requested_at": "2019-12-27T18:11:19.117Z", "requested_by": "requested_by", "requested_disposition": "MALICIOUS", "status": "status", "subject": "subject", "type": "type" } ], "result_info": { "count": 1, "page": 1, "per_page": 20, "total_count": 2000 }, "success": true } ```