All breach types, including info stealer logs, database dumps, combo lists, and cookies, share a single, consistent JSON structure for simplified parsing and integration.
Access newly added combo lists (URL, username, password combinations) and cookies data (cookie name, value, and expiration).
Find exactly what you need with advanced query parameters such as dual-domain search, password filters, data-type filters, and searching by breach UUID, date range, or infection timeframe.