Friday, October 17, 2025
HomeLanguagesPython – API.get_list() in Tweepy

Python – API.get_list() in Tweepy

Twitter is a popular social network where users share messages called tweets. Twitter allows us to mine the data of any user using Twitter API or Tweepy. The data will be tweets extracted from the user. The first thing to do is get the consumer key, consumer secret, access key and access secret from twitter developer available easily for each user. These keys will help the API for authentication.

API.get_list()

The get_list() method of the API class in Tweepy module is used to fetch a specified list.

Syntax : API.get_list(list_id/slug, owner_id/owner_screen_name)

Parameters :

  • list_id : ID of the list.
  • slug : slug of the list.
  • owner_id : ID of the owner of the list.
  • owner_screen_name : screen name of the owner of the list.

Returns : an object of class List

Example 1 : Fetch a list and print its name and description.




# import the module
import tweepy
  
# assign the values accordingly
consumer_key = ""
consumer_secret = ""
access_token = ""
access_token_secret = ""
  
# authorization of consumer key and consumer secret
auth = tweepy.OAuthHandler(consumer_key, consumer_secret)
  
# set access to user's access key and access secret 
auth.set_access_token(access_token, access_token_secret)
  
# calling the api 
api = tweepy.API(auth)
  
# the ID of the list
list_id = 
  
# fetching the list
list = api.get_list(list_id = list_id)
  
# printing the information
print("The name of the list is : " + list.name)
print("The description of the list is : " + list.description)


Output :

The name of the list is : Modified List
The description of the list is : This list is to test the Twitter API.

Example 2 : Exception is raised on fetching a non-existent list.




# the ID of the non-existent list
list_id = 
  
# fetching the list
list = api.get_list(list_id = list_id)


Output :

raise TweepError(error_msg, resp, api_code=api_error_code)
tweepy.error.TweepError: [{'code': 34, 'message': 'Sorry, that page does not exist.'}]
Last Updated :
10 Jun, 2020
Like Article
Save Article

<!–

–>

Similar Reads
Related Tutorials
Dominic
Dominichttp://wardslaus.com
infosec,malicious & dos attacks generator, boot rom exploit philanthropist , wild hacker , game developer,
RELATED ARTICLES

Most Popular

Dominic
32361 POSTS0 COMMENTS
Milvus
88 POSTS0 COMMENTS
Nango Kala
6728 POSTS0 COMMENTS
Nicole Veronica
11892 POSTS0 COMMENTS
Nokonwaba Nkukhwana
11954 POSTS0 COMMENTS
Shaida Kate Naidoo
6852 POSTS0 COMMENTS
Ted Musemwa
7113 POSTS0 COMMENTS
Thapelo Manthata
6805 POSTS0 COMMENTS
Umr Jansen
6801 POSTS0 COMMENTS