Request method is HTTP GET.
URL Structure
https://api.webz.io/breachesr?token=XXXXX-XXXXX&format=json&crawled_from=XXXXXX&crawled_to=XXXXXX&email_domain=[Compromised Email Domain]
HTTP GET Parameters
Parameter | Description | Example |
---|---|---|
token | (Required) Your unique API authentication token, received when you signed up. This token verifies your access to the Webz.io API. | &token=[MY TOKEN] |
format | The default format is JSON only. | &format=json |
crawled_from | Returns entities crawled after this Unix timestamp (in milliseconds). Here is a Timestamp/Date converter • If neither • If | &crawled_from=1578504734000 |
crawled_to | Returns entities crawled before this Unix timestamp (in milliseconds). Here is a Timestamp/Date converter • If neither • If | &crawled_to=1758382842000 |
breach_from | Returns entities with an official breach date (for data breaches & combo lists) / infection date (for stealer logs) is earlier than this specified Unix timestamp (in milliseconds). Timestamp/Date converter | &breach_from=1578504734000 |
breach_to | Returns entities with an official breach date (for data breaches & combo lists) / infection date (for stealer logs) is later than this specified Unix timestamp (in milliseconds). Timestamp/Date converter | &breach_to=1758382842000 |
Search compromised data by a specific email address. | &email= | |
*email_domain | Search compromised data by email domain. (*The email_domain can be used with login_domain,) | &email_domain=mydomain.com |
*login_domain | Search compromised data by login domain. Returns all leaked credentials that were used to log into the specified domain, including credentials linked to that domain through a data breach. • If • If (*The login_domain can be used with email_domain.) | &login_domain=mydomain.com |
data_type | Search compromised data by the breach sub type. Accepted values: If | &data_type=data_breach |
sub_type | Search compromised data by the breach sub type. Accepted values: If | &sub_type=stealer_logs |
breach_uuid | Search compromised data by the *Relevant only for | &breach_uuid=XXXXXXXXXXX |
has_password | Filter compromised data by password existence. | &has_password=true |
password_type | Filter compromised data by password type. Accepted values: | &password_type=plaintext |
is_premium | Filter infostealer data by premium channels. | &is_premium=true |
sort_by | Defines the field used for sorting results. default is | &sort_by=crawled |
order_by | Defines the sorting direction. | &order_by=asc |
- At least one of
email
,email_domain
, orlogin_domain
must be provided in the request URL.