What is the default time frame, if not defined by the GET parameter mentioned above?
If not defined, the query will retrieve content from the entire DBD pool (up to 5 years of compromised PII data).
How is API data sorted?
- Sort Order: Results are sorted from newest to oldest based on the crawled date.
- Data Appearance Order:
- Stealer logs data always appears first.
- Data breaches data follows, also ordered by crawled date.
Is there a way to retrieve results from the latest crawled leaks?
using the &since HTTP GET parameter and setting it to the desired Unix timestamp in milliseconds, the retrieved data will match the queried time frame - From the defined since GET parameter, until now.
How are objects ordered within the response?
If both stealer logs and data breach records appear on the same JSON page:
- The data breach object (
docs
) is displayed first. - The stealer logs object (
stealerLogs
) follows.
How does pagination work?
- Use the
next
string at the bottom of the JSON response to retrieve the next set of results. - Once all available data is consumed and you reach a page with zero results, the next URL becomes
null
. - At this point, you must issue a new query (i.e., create a new request URL with an updated timestamp) to fetch fresh data.
Do API calls count when no results are returned?
Yes. Even if a query returns 0 results, it is still counted as an API call.
How is PII access controlled?
- To comply with privacy regulations, access to leaked credentials is restricted to assets under pre-approved domains for applicable asset types (
email
,email_login
,login_domain
).- You can use the Authorized Domains API to view, add, or remove approved domains at any time.
- If a top-level domain (TLD) is authorized, all its subdomains are automatically included.
- Passwords, credit card numbers. SSN and passport numbers may be masked or exposed depending on your account configuration.
- Stealer logs: Passwords may be partially masked or fully visible. Access level is controlled by Webz per your account settings.
- Data breaches: Passwords are always partially masked (e.g.,
Si*********25
).- Because masking is applied by default, authorized domains restrictions do not apply to data breaches.